Preview

You Decide Assignment

Good Essays
Open Document
Open Document
755 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
You Decide Assignment
You Decide Assignment As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed. The first policy I will be talking about is the general use and ownership. There are four major parts in this policy that are significant to its ruling. The first being that the "Company 's network administration desires to provide a reasonable level of privacy, users should be aware that the data they create on the corporate systems remains the property of the company" (it-security-policy.com, 2010). The company has the ownership of the equipment that the employees are using, any information that the employees leave in the system is considered to be the company 's property. Employees need to practice good judgment on what to save in the company system. Next, any information that is important to the company and considered to be vulnerable needs to be encrypted. This will prevent any sensitive information to be stolen, and will keep any data protected. Third, the company has the option to run an audit with its respected networks and systems. It 's a procedure that is used to ensure that all policies are met and followed. And lastly, "Employees are responsible for exercising good judgment regarding the reasonable of personal use"(Merkow, 2005, p. 377). From email usage, to data entry, as a company, employees are responsible for our own awareness, and be cautious about what we 're doing. The next


Bibliography: http://it-security-policy.com. (2010, Nov 29). http://it-security-policy.com. Retrieved Sept 11, 2011, from http://it-security-policy.com Merkow, M. (2004). Information Security Principles and Practices.

You May Also Find These Documents Helpful

  • Powerful Essays

    Mutandum Corporation Case

    • 963 Words
    • 4 Pages

    There are numerous reasons to retire our computer technology. Some systems become obsolete due to current technological advances. Some are replaced because they become infected with viruses or otherwise no longer function properly. And others simply just don’t meet the requirements of our business. In order to retire these systems in an efficient, safe and economical manner, we must take into consideration numerous factors that would otherwise but our business at risk. The following policy includes the implementation of recommendations that will keep sensitive information secure while ensuring that we remain in compliance with federal regulations all the while keeping to our business model centering on efficiency.…

    • 963 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    At Richman Investments the personnel is accountable for the appropriate use of IT assets. Therefore, it is in the best interest of the organization to ensure employees handle security procedures with integrity. It is essential to create a strong AUP (Acceptable Use Policy) procedure and as part of the process, require employees sign an agreement to guarantee they understand and conform to implemented rules and regulations. In addition, the company will conduct security awareness training, annual security exercises, notices about securing information, and constant reminders security is everyone’s responsibility.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cross 9e TBB U05

    • 464 Words
    • 3 Pages

    the ethical and legal implications of breaching company policy on the use of electronic data…

    • 464 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The user domain is the employees who access the organization network and IT infrastructure. There should be a policy in place that defines what the employee can do inside the organization. A employee handbook would be beneficial and should list all of the guidelines and procedures. Many smack threats can be avoided by the lack of knowledge and security violations. Reminders like emails and periodic meetings can help employees be more aware about threats and technology updates. If there is a security violation the employee should be under watch and have a meeting with their supervisor. Employee’s daily usage should also be supervised periodically to…

    • 347 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The User Domain will enforce an acceptable use policy (AUP) to define what each user can and cannot do with any company data shall he or she have access to it. As well as with company users, any outside contractor or third-party representatives shall also need to agree and comply with the AUP. All users must be properly identified and sign this AUP prior to gaining any access whatsoever to the company network. No exceptions. Any violation will be taken up with company executives and/or the authorities to assess further punitive action.…

    • 471 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Activity 8-9: Evaluate an acceptable use policy. Learn whether the organization where you work or attend school has an acceptable computer use policy for employees or students. Make a list of activities that are permitted and those that are not permitted. Identify on your list those activities that are illegal and those that are not permitted according to organizational policy. Compare your organization’s computer use policy with the University of Oregon’s policy referenced in the chapter. Describe the similarities and differences.…

    • 477 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Wk 5 Alt Assign

    • 384 Words
    • 2 Pages

    It is important for our company to have security and control policies in place to protect valuable information. This information has tremendous value and therefore there can be grave consequences if they are lost, destroyed, or wind up in the wrong hands. Also, inadequate security and control can result in legal liabilities. Not only are we protecting our own information assets, but also those of our customers, employees, and business partners. Failure to comply in this matter can open our company to litigation matters due to data exposure and/or theft.…

    • 384 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The houses that I am analyzing are both located in Spring Hill Florida; one in zip-code 34609 and the other in zip-code 34610. The two homes are approximately 12 miles away from each other. My parents relocated to a neighboring area in Hernando County. Every time I visit them I visit them it seems the Spring Hill area calls my name. It is because I have fallen in love with this area over the past few years that I have decided to look into this are for me to relocate to. I have come to know the location, surroundings, and basically the kind of town it is. In addition to the normal size, number of beds and baths, I am looking at potential addition to a home, such as pool (if not included), and increased garage space. It is because of these criteria that I have chosen the two properties I have listed.…

    • 1714 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    The Sarbanes-Oxley Act

    • 2729 Words
    • 11 Pages

    The missing of a formal acceptable use policy (AUP) did not give user or management a guideline on the day-to-day activities. The incident involving Laura requesting trial software without getting proper security review and authorization shows the lack of security awareness and proper request for exception procedure. According a report from Ernst & Young, over 75% of security breaches are caused by activities by internal users (H. M. P. S. & Wijayanayake, 2009). Misuse of computer resources in work place not only reduced productivities but also bring additional risk to company’s reputation. Activities like surfing the web and participating in social networking sites might bring questionable contents to the work place. These contents can be seen as a form of sexual harassment. The Melissa virus, founded in 1999, was originally planted in an alt.sex Usenet newsgroup message. The billions of dollars of productivity lost and the negative publicity can tarnish the image and the business of Firion. Without a formal review on software request, the IT security organization will not be able to design a security solution to cover the user base. This gap will allow both internal and external intruders to plant software or Trojan to disrupt services or stealing…

    • 2729 Words
    • 11 Pages
    Best Essays
  • Better Essays

    Kim, D., & Solomon, M. (2012). Fundamentals of information systems security. Sudbury, MA: Jones & Bartlett Learning.…

    • 1049 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    For businesses to keep pace with the latest technology, threats and to remain in compliance with current and future regulations or policies need to have effective management of information security in their organization. Information Security Management Frameworks are based on existing accepted standards, guidelines, and collections of practices that should be implemented in an IT department. I will discuss some frameworks of information security management, their pros and cons, some major perspectives to consider in information security management and the benefits of information security management frameworks.…

    • 721 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Individual Assignment

    • 292 Words
    • 2 Pages

    PURPOSE: The purpose of this assignment is to give students an opportunity to show their understanding of advertising principles and apply their creativity through the strategic design of an advertising campaign concept. The designed advertising campaign will aim to address opportunities or problems identified in the ‘advertising brief’ derived from the findings of the group research report. BRIEF: Students are required to develop an advertising campaign designed to meet the goals/objectives identified in the advertising brief developed from the group research report. Students are required to propose a concept or BIG IDEA that communicates the message and execution strategy of the proposed advertising campaign. Students are required to submit a PowerPoint proposal (10-15 slides) that explains how and why they developed advertising campaign that has been designed to meet the goals/objectives of the advertising brief. The proposal should aim to explain the creative strategy, message strategy and execution strategies against the goals/objectives of the advertising brief. Below is the outline of the proposal (based on Chapter 12 of the Advertising Principles & Practice book):        Problem Target audience insights Brand position Communication objectives Proposition or selling idea/USP Media considerations Creative direction (Concept/BIG IDEA) - Creative strategy - Message strategy - Execution strategies…

    • 292 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    INDIVIDUAL ASSIGNMENT

    • 675 Words
    • 3 Pages

    1. Comment on the merit of the paper which is arguing for a separate HRM model for Oman?…

    • 675 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Individual assignment

    • 2710 Words
    • 10 Pages

    Economy system is a blend of the rules or ways into a single unit and used to achieve economy with objectively. To cover the purpose entire processing and society action in effort to need reach their necessary. It refers to the role or model of distribution and production which take place in the society.…

    • 2710 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Information Technology

    • 2139 Words
    • 9 Pages

    Goel, N. (2006). Problems with IT, Bangor Daily News, 9 November, 2006, p.1. Available from: ProQuest at http://www.proquest.com [Accessed: 19 November 2006].…

    • 2139 Words
    • 9 Pages
    Powerful Essays