Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 4

first rewind previous Page / 1 next fast forward last

Search results

Search:
in the keywords:  information security policy
help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
EN
The article presents results of a survey concerning Information Security Management Systems (ISMS), which was conducted in Marshal Offices between December 2012 and April 2013. Survey questionnaires were sent to all sixteen Marshal Offices in Poland. The aim of the research was identifying in which government offices information security management systems are implemented, according to which standards are developed and certified and gathering information about factors facilitate the implementation of the ISMS, problems encountered in the implementation of this system and documentation concerning information security.
EN
The article presents results of a survey concerning Information Security Management Systems (ISMS), which was conducted in Marshal Offices between December 2012 and April 2013. The aim of the research was identifying in which government offices ISMS are implemented, according to which standards are developed and certified and gathering information about documentation concerning information security. The article is an extended version of the paper notified at the VIII Scientific Conference „Information Systems In Management”, taking place on 21-22 November 2013.
EN
The EU GDPR Regulation introduced rules and regulations on the protection of individuals with regard to the processing of their personal data regardless of their citizenship or place of residence. The article focuses on issues related directly to the regulation on the protection of personal data and related to documents that regulate the protection of personal data and their processing in public institutions in Poland. The author presents basic estimates about the entry of the GDPR Regulation, indicates the importance of individual Dobies/organisations and entities playing a key role in the protection of personal data on the territory of Poland. It describes the documents that establish minimum standards for personal data protection systems to be developed in public institutions to guarantee security. In this article, the author attempted to indicate the scope and nature of changes in personal data systems in the light of the provisions of the GDPR Regulation.
PL
Informacja we współczesnym świecie stanowi zasób strategiczny, decydujący o przewadze konkurencyjnej państw na arenie międzynarodowej. Dążąc do zapewnienia właściwej jakości posiadanych zasobów informacyjnych oraz procesów i mechanizmów ich pozyskiwania, przetwarzania i ochrony, poszczególne państwa opracowują i wdrażają politykę bezpieczeństwa informacyjnego. Realizacji tej polityki służą różnorodne instrumenty, wśród których na uwagę zasługują nadzór i kontrola Internetu. Celem artykułu jest omówienie nadzoru i kontroli Internetu jako instrumentu polityki bezpieczeństwa informacyjnego, z uwzględnieniem specyfiki państw demokratycznych oraz totalitarnych i autorytarnych. Na potrzeby badań posłużono się metodą analizy literatury przedmiotu oraz metodą syntezy. Dowiedziono, że niezależnie od reżimu politycznego podmioty państwowe wykorzystują nadzór i kontrolę Internetu, zasadnicze cele tych działań są natomiast odmienne. W państwach demokratycznych chodzi przede wszystkim o ochronę i obronę cenionych społecznie wartości i dóbr, w państwach totalitarnych i autorytarnych zaś o realizację partykularnych interesów osób sprawujących władzę.
EN
Information in the modern world is a strategic resource that determines the competitive advantage of countries on the international arena. To ensure the appropriate quality of the information resources held as well as the processes and mechanisms of their acquisition, processing, and protection, individual countries develop and implement an information security policy. The implementation of this policy is supported by various instruments, among which the supervision and control of the Internet deserve attention. The aim of the article is to discuss the supervision and control of the Internet as an instrument of information security policy, considering the specificity of democratic, totalitarian, and authoritarian states. For the purposes of the research, the method of analyzing the literature and the method of synthesis were used. It has been proven that, regardless of the political regime, state-owned entities use Internet supervision and control, while the main objectives of these activities are different. In democratic countries, it is primarily for the protection and defense of cherished social values and goods, in totalitarian and authoritarian countries for the realization of the particular interests of those in power.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.