Requirements for the protection of information contained in government information systems, as well as other information systems that contain (processed) information that is owned by government agencies or government corporations, are established by the federal executive body for security and the federal executive body authorized in the field of countering foreign technical intelligence services and technical protection of information within their authority. When creating and operating such information systems, the methods and methods used to protect information should comply with the specified requirements.
1) the designation by the operator of persons responsible for the organization of information protection, as well as for the planning and development, implementation, monitoring, maintenance and improvement of information protection measures;
2) the publication by the operator of documents defining the policy of ensuring the protection of information, including local acts for organizing information security, as well as local acts establishing procedures to ensure the protection of information in accordance with this Federal Law;
4) implementation of internal control (audit) of compliance of information protection with information protection requirements ..., operator's policy to ensure information protection, operator's local acts;
5) familiarization of the operator’s employees who directly process and protect the information with the information protection requirements, documents defining the operator’s policy to ensure the protection of information, local acts of the operator and training of these workers.
Operators of state information systems, as well as other information systems, in which, on the basis of contracts or other legal grounds, contain (processed) information that is owned by state bodies or state corporations, inform the federal executive body in the field of security and the federal executive body, authorized in the field of countering foreign technical intelligence and technical protection of information on security events and, as a result of which the functioning of the information system is interrupted or terminated and (or) the security of the information processed in the information system (computer incidents) is impaired.
Source: https://habr.com/ru/post/304772/
All Articles