Creating company E-mail and wifi-internet use policies

Assignment Help Basic Computer Science
Reference no: EM132397957

1) Creating company E-mail and wifi/internet use policies

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview

2. Purpose

3. Scope

4. Policy

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

Reference no: EM132397957

Questions Cloud

Emerging enterprise network applications : Research at least two articles on the topic of emerging enterprise network applications. Write a brief synthesis and summary of the two articles.
Information security and risk management : How the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment.
Identify a variety of epistemological theory : Identify and apply a variety of epistemological theory. Understand the difference between a rhetorically good argument and a rationally good argument.
Design and implement a secure enterprise wireless : BN303 - Wireless Networks and Security - Design and implement a secure enterprise wireless network, considering the ethical implications
Creating company E-mail and wifi-internet use policies : Creating company E-mail and wifi/internet use policies
Describe the different staffing initiatives : As the authors discussed, evaluating a staffing system allows the organization to objectively assess how well its different staffing initiatives are working.
Critique the finding of the nevada supreme court : In the 1997 case of University and Community College System of Nevada v Farmer, Farmer was initially awarded $40K in damages for violation of the Equal Pay Act.
Security monitoring system : You are a team of security consultants for a small company and the owner would like you to purchase cameras to install as part of a security monitoring system
Discussing use of encryption to protect data at rest : Essay of at least five hundred words discussing the use of encryption to protect data at rest, in motion, and in use.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Edward snowden and patriot act

What is Internet Privacy and examples need to be given on Edward Snowden and Patriot Act and also examples of couple of Court cases related to internet Privacy.

  Drink more water than normal

Explain why someone with diabetes insipidus must drink more water than normal.

  Leverage this methodology in system development

There are various System Development Methodologies. How do you believe you can leverage this methodology in system development?

  Practices for access control methods

What are some of industry's best practices for access control methods? What are some common access control models and the differences between each?

  Honest and transparent with dealings

Toms is a brand that has established itself as humanitarian. Whether the brand takes anything away from other shoe manufacturers, jobs in the community

  Write dimensions of memory containing bytes of storage

Write down the dimensions of a memory containing 1mb(2^20) bytes of storage? How large would the MAR be? how many bits are sent to the row column decoders?

  Product-positioning map

Evaluation of strategies and objectives to achieve most favorable market position Description of how you would implement your strategies Milestones (steps for each major initiative with their timelines

  Experience the expiration of an nol

Net operating losses can be carried forward for 20 years, after which time they expire. Why is it unusual for a firm to experience the expiration of an NOL?

  How many d cell alkaline batteries would be needed for this

How many D cell alkaline batteries would be needed for this?

  Frontier of agreements that may form the basis of a cartel

Suppose a discount factor of 0.96 and a duopoly structure on agreements. What is the Pareto frontier of agreements that may form the basis of a cartel?

  When considering a programming language

when considering a programming language, what do you think are some of the things to look at in regards to what their strengths

  Explaining the tasks an investigator should perform

Write at least two pages explaining the tasks an investigator should perform.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd