Preview

You Decide Assignment

Good Essays
Open Document
Open Document
755 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
You Decide Assignment
You Decide Assignment As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed. The first policy I will be talking about is the general use and ownership. There are four major parts in this policy that are significant to its ruling. The first being that the "Company 's network administration desires to provide a reasonable level of privacy, users should be aware that the data they create on the corporate systems remains the property of the company" (it-security-policy.com, 2010). The company has the ownership of the equipment that the employees are using, any information that the employees leave in the system is considered to be the company 's property. Employees need to practice good judgment on what to save in the company system. Next, any information that is important to the company and considered to be vulnerable needs to be encrypted. This will prevent any sensitive information to be stolen, and will keep any data protected. Third, the company has the option to run an audit with its respected networks and systems. It 's a procedure that is used to ensure that all policies are met and followed. And lastly, "Employees are responsible for exercising good judgment regarding the reasonable of personal use"(Merkow, 2005, p. 377). From email usage, to data entry, as a company, employees are responsible for our own awareness, and be cautious about what we 're doing. The next


Bibliography: http://it-security-policy.com. (2010, Nov 29). http://it-security-policy.com. Retrieved Sept 11, 2011, from http://it-security-policy.com Merkow, M. (2004). Information Security Principles and Practices.

You May Also Find These Documents Helpful

  • Good Essays

    The User Domain will enforce an acceptable use policy (AUP) to define what each user can and cannot do with any company data shall he or she have access to it. As well as with company users, any outside contractor or third-party representatives shall also need to agree and comply with the AUP. All users must be properly identified and sign this AUP prior to gaining any access whatsoever to the company network. No exceptions. Any violation will be taken up with company executives and/or the authorities to assess further punitive action.…

    • 471 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    You are a networking intern at Richman Investments. An employee of the company used employer-owned equipment to access the Internet and check his personal Web-based e-mail account. He followed a link in a spam e-mail, downloaded games to his hard disk, and inadvertently infected the computer with malware, which spread to the network server. The security officer at Richman has asked you to research and to define “the acceptable use of Richman assets regarding Internet and e-mail access,” including the actions that are prohibited. The employees must be restricted from using the Internet at work for personal use, other than to occasionally check Web-based personal e-mail accounts. Personal downloads must be strictly prohibited. Your definition will become part of the overall Richman security policy.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cross 9e TBB U05

    • 464 Words
    • 3 Pages

    the ethical and legal implications of breaching company policy on the use of electronic data…

    • 464 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The user domain is the employees who access the organization network and IT infrastructure. There should be a policy in place that defines what the employee can do inside the organization. A employee handbook would be beneficial and should list all of the guidelines and procedures. Many smack threats can be avoided by the lack of knowledge and security violations. Reminders like emails and periodic meetings can help employees be more aware about threats and technology updates. If there is a security violation the employee should be under watch and have a meeting with their supervisor. Employee’s daily usage should also be supervised periodically to…

    • 347 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Wk 5 Alt Assign

    • 384 Words
    • 2 Pages

    It is important for our company to have security and control policies in place to protect valuable information. This information has tremendous value and therefore there can be grave consequences if they are lost, destroyed, or wind up in the wrong hands. Also, inadequate security and control can result in legal liabilities. Not only are we protecting our own information assets, but also those of our customers, employees, and business partners. Failure to comply in this matter can open our company to litigation matters due to data exposure and/or theft.…

    • 384 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Activity 8-9: Evaluate an acceptable use policy. Learn whether the organization where you work or attend school has an acceptable computer use policy for employees or students. Make a list of activities that are permitted and those that are not permitted. Identify on your list those activities that are illegal and those that are not permitted according to organizational policy. Compare your organization’s computer use policy with the University of Oregon’s policy referenced in the chapter. Describe the similarities and differences.…

    • 477 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It 255 Final Project

    • 1588 Words
    • 7 Pages

    I was assigned this project and being that we have 5000 employees operating in different locations and different parts of the country; I have noticed that some of the other branches do not follow the firms’ policies as they should. Some branches operate on their own policies. I have drafted up a new and improved corporate security policy that covers emails, mobile devices, computer usage, email retention policies, passwords, etc.…

    • 1588 Words
    • 7 Pages
    Good Essays
  • Best Essays

    The Sarbanes-Oxley Act

    • 2729 Words
    • 11 Pages

    The missing of a formal acceptable use policy (AUP) did not give user or management a guideline on the day-to-day activities. The incident involving Laura requesting trial software without getting proper security review and authorization shows the lack of security awareness and proper request for exception procedure. According a report from Ernst & Young, over 75% of security breaches are caused by activities by internal users (H. M. P. S. & Wijayanayake, 2009). Misuse of computer resources in work place not only reduced productivities but also bring additional risk to company’s reputation. Activities like surfing the web and participating in social networking sites might bring questionable contents to the work place. These contents can be seen as a form of sexual harassment. The Melissa virus, founded in 1999, was originally planted in an alt.sex Usenet newsgroup message. The billions of dollars of productivity lost and the negative publicity can tarnish the image and the business of Firion. Without a formal review on software request, the IT security organization will not be able to design a security solution to cover the user base. This gap will allow both internal and external intruders to plant software or Trojan to disrupt services or stealing…

    • 2729 Words
    • 11 Pages
    Best Essays
  • Satisfactory Essays

    Assignments

    • 841 Words
    • 5 Pages

    Offer suggestions for how the company might become more customer centric based on the key customer-centric…

    • 841 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    Kim, D., & Solomon, M. (2012). Fundamentals of information systems security. Sudbury, MA: Jones & Bartlett Learning.…

    • 1049 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    For businesses to keep pace with the latest technology, threats and to remain in compliance with current and future regulations or policies need to have effective management of information security in their organization. Information Security Management Frameworks are based on existing accepted standards, guidelines, and collections of practices that should be implemented in an IT department. I will discuss some frameworks of information security management, their pros and cons, some major perspectives to consider in information security management and the benefits of information security management frameworks.…

    • 721 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Individual Assignment

    • 292 Words
    • 2 Pages

    PURPOSE: The purpose of this assignment is to give students an opportunity to show their understanding of advertising principles and apply their creativity through the strategic design of an advertising campaign concept. The designed advertising campaign will aim to address opportunities or problems identified in the ‘advertising brief’ derived from the findings of the group research report. BRIEF: Students are required to develop an advertising campaign designed to meet the goals/objectives identified in the advertising brief developed from the group research report. Students are required to propose a concept or BIG IDEA that communicates the message and execution strategy of the proposed advertising campaign. Students are required to submit a PowerPoint proposal (10-15 slides) that explains how and why they developed advertising campaign that has been designed to meet the goals/objectives of the advertising brief. The proposal should aim to explain the creative strategy, message strategy and execution strategies against the goals/objectives of the advertising brief. Below is the outline of the proposal (based on Chapter 12 of the Advertising Principles & Practice book):        Problem Target audience insights Brand position Communication objectives Proposition or selling idea/USP Media considerations Creative direction (Concept/BIG IDEA) - Creative strategy - Message strategy - Execution strategies…

    • 292 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    INDIVIDUAL ASSIGNMENT

    • 675 Words
    • 3 Pages

    1. Comment on the merit of the paper which is arguing for a separate HRM model for Oman?…

    • 675 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Individual assignment

    • 2710 Words
    • 10 Pages

    Economy system is a blend of the rules or ways into a single unit and used to achieve economy with objectively. To cover the purpose entire processing and society action in effort to need reach their necessary. It refers to the role or model of distribution and production which take place in the society.…

    • 2710 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Information Technology

    • 2139 Words
    • 9 Pages

    Goel, N. (2006). Problems with IT, Bangor Daily News, 9 November, 2006, p.1. Available from: ProQuest at http://www.proquest.com [Accessed: 19 November 2006].…

    • 2139 Words
    • 9 Pages
    Powerful Essays