Strategy
Learning Objectives and Outcomes
•
You will explore policy creation and enforcement actions.
•
You will describe policy monitoring and enforcement strategies.
•
You will research automated information technology systems.
•
You will do research and align a selected automated IT system.
Assignment Requirements
For this assignment, imagine that you work for a Department of Defense (DoD) organization with direct ties to the U.S. Government, and you are a sole supplier to them for military products. Your organization has three different levels of management and of those levels two different unions exist.
The majority of your staff is in another non-supervisory union and you also have contractors. Your organization has approximately 7,000 workers who are located across the U.S. in 35 locations.
You have developed a modified Internet use policy along with a physical access policy. You must invoke these policies at the earliest as a recent security breach has been identified from flaws in these policies.
Identify and describe the legal implications of information systems security (ISS) policy enforcement after these new policies are adapted. Describe a policy monitoring and enforcement strategy for your organization. Also describe what an automated IT security policy compliance system would look like for your organization as management is thinking about this as a possible response to recent security compliance incidents.
Submission Requirements
•
Format: Microsoft Word
•
Font: Arial, Size 12, Double-Space
•
Citation Style: Chicago Manual of Style
•
Length: 1–2 pages
Self-Assessment Checklist
•
I have described policy enforcement and monitoring.
•
I have written an academic paper free from grammatical errors or typos.
•
I have provided a strategy for accomplishing the enforcement and monitoring.
© ITT Educational Services
Page 1