Previous Topic: Elements of ProcedureNext Topic: Plan Emergency and Troubleshooting Procedures


Conclusion Regarding Developing a Procedure for Handling Violations

Your procedure for handling violations must be tailored to your organization, and the sensitivity of the information available. You must also take into account the suspected users. Often, a user may simply be accident-prone and incur excessive but unrelated violations.

A procedure such as the one discussed might sound severe. However, with such a procedure in place, employees become quickly aware of how seriously your organization is facing security issues.

You might not discourage the disgruntled employee or the dedicated internal hacker, but you can discourage the casual inquisitive employee. Even if you do not discourage disgruntled employees and hackers, you are least prepared to take disciplinary action and enforce the security that you are taking so much time to implement.