5.2.1 - The repository shall maintain a systematic analysis of security risk factors associated with data, systems, personnel, and physical plant.
Supporting Text
This is necessary to ensure ongoing and uninterrupted service to the designated community.
Examples of Ways the Repository can Demonstrate it is Meeting this Requirement
Introduction
A summary of our practices in relation to our objectives, commitments, and context. May include:
- Standards met or industry best practices employed, and their applicability to Scholars Portal; certifications achieved or audits undertaken if applicable
- Differences from standards or best practices and our rationale for those differences if applicable
- Parties involved in the creation of the document if applicable\
The complete text of the SOMETHING is available through the link below. The SOMETHING fulfills all or part of this criteria by describing SOMETHING, SOMETHING, and SOMETHING. (repeat for all documents linked)
Responsibility
Wiki Markup |
---|
\[Who in Scholars Portal/OCUL is/are chiefly responsible for this issue at the present time? *DELETE*\] |
FirstName LastName, Title
Potential Risks (delete if not needed)
Significant risks, threats, changes, or dependencies that could affect our ability to satisfy this criteria or deliver this service in the future. How are we addressing these risks?
Monitoring Commitments (delete if not needed)
How frequently we intend to monitor the situation or review the document. Mention automated reports if applicable.
Future Plans (delete if not needed)
Things we are planning to do in the future. Things we would like to do in the future.
Relevant Document(s) (delete if not needed)
- Document Title (link)
Key Resources Consulted (delete if not needed)
BibliographyRepository employs the codes of practice found in the ISO 27000 series of standards system control list; risk, threat, or control analysis.