ASTM-D8320 2021
$37.38
D8320-21 Standard Practice for Implementing an Information Security Program in a Cannabis Operation
Published By | Publication Date | Number of Pages |
ASTM | 2021 | 20 |
ASTM D8320-21
Active Standard: Standard Practice for Implementing an Information Security Program in a Cannabis Operation
ASTM D8320
Scope
1.1 This practice covers recommendations for implementing an information security program to protect businesses operating in the regulated cannabis industry. An information security program is part of an overall security program that each business should implement.
1.2 This practice applies to any legal business entity that handles cannabis products, including cultivation, processing, manufacturing, transportation, warehousing, lab testing, distribution, retail, home delivery, and waste. This practice will include protections for analog (paper) and digital information assets.
1.3 Actual implementation will vary depending on organizational size and type, information asset types, sensitivity and volume of assets, risk tolerance and resource constraints of the organization, and mandates particular to the organization.
1.4 This standard does not purport to address all of the safety concerns, if any, associated with its use. It is the responsibility of the user of this standard to establish appropriate safety, health, and environmental practices and determine the applicability of regulatory limitations prior to use.
1.5 This international standard was developed in accordance with internationally recognized principles on standardization established in the Decision on Principles for the Development of International Standards, Guides and Recommendations issued by the World Trade Organization Technical Barriers to Trade (TBT) Committee.
Keywords
access control; analog; analysis; assessment; cannabis; continuous improvement; controls; computer; confidentiality; cyber security; cybersecurity; data; detection; digital; electronic; files; hardware; incident; information; information security; monitoring; notification; prevention; privacy; power supply; procedures; records; recovery; response; risk; security; software; testing; threats; two-factor; uninterruptible;
ICS Code
ICS Number Code 35.030 (IT Security)
DOI: 10.1520/D8320-21