Describe how your selected aup accomplishes these goals

Assignment Help Management Information Sys
Reference no: EM131806094 , Length: 5

Case Study : Acceptable Use Policy

An Acceptable Use Policy (AUP) is a very important policy within organizations to define acceptable employee behavior when accessing company resources.

Additionally, there are also legal implications within AUPs. Use an existing AUP that you are familiar with, such as from a current or previous workplace, or search on the Internet for an example AUP to complete this case study.

Write a three to five (3-5) page paper in which you:

Describe the purpose of an Acceptable Use Policy you have selected and explain how the AUP helps provide confidentiality, integrity, and availability within the organization.

Critique the AUP you selected and provide recommendations for improving the AUP.

Explain methods that organizations can implement to help ensure compliance with the AUP, mitigate their risk exposure, and minimize liability.

Describe how your selected AUP accomplishes these goals.

Describe methods for increasing the awareness of the AUP, and other policies, within the organization.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Analyze how security policies help mitigate risks and support business processes in various domains in the information technology (IT) infrastructure.

Describe the different ISS policies associated with the user domain.

Describe different issues related to implementing and enforcing ISS policies.

Use technology and information resources to research issues in security strategy and policy formation.

Write clearly and concisely about Information Systems Security Policy topics using proper writing mechanics and technical style conventions.

Reference no: EM131806094

Questions Cloud

How to plan the presentation to garner management : Prepare a presentation to the Board of Directors on your main duties for the company and how your position could help protect the business.
What are some of the commands in server core : What are some of the commands in Server Core that you would use to install roles and do other operations?
What items of profit does the company report : What items of profit does the company report? From the notes to the accounts, briefly describe the company's policy on revenue recognition.
Variable cost and fixed cost and breakeven point : Define the following terms used to determine marketing finances Variable Cost, Fixed Cost and Breakeven point
Describe how your selected aup accomplishes these goals : An Acceptable Use Policy (AUP) is a very important policy within organizations to define acceptable employee behavior when accessing company resources.
Major features of the programing language : Provide two (2) reasons for your choice of programming language for the project.
Does the total fund balance at the beginning of the year : Prepare a schedule, similar to that illustrated in the text, of changes in unassigned fund balance
Network operating system in one page : What are the functions performed by a network operating system in one page with references?
Explain the positioning approach used by benihana : Explain the positioning approach used by Benihana. Identify the core target audience for Benihana.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Visits the federal trade commission''s

Focus on Technology - Phishing scams also victimize businesses. Visits the Federal Trade Commission's Website to learn how businesses can deal with this problem and discuss recommendations for marketers who face this threat.

  What is the motivation of the research

What related work has been performed? How the research was conducted, both how data were collected and analyzed?

  Explaining robert anthony hierarchy of management activity

Explaining robert anthony hierarchy of management activity

  Assignment on impression management

In what situation are you most likely to use impression management? What situation are you most likely not going to work to use impression management? What is the typical difference between these two situations?

  What is business process management

What is business process management (BPM)? Why do processes need management? What are BPM activities?

  Who are key participants in the bia

WAN recovery and contingency can be a complex design requirement. Discuss three options that companies should consider to ensure WAN availability. Write two to three sentences for each option you discuss.

  Describe phases of system design

Phases of System Design - Explain what phases are included in the systems design?

  Recommend the firewall and vpn solutions for new company

Fundamentals of firewalls and VPNs. Recommendations for firewall and VPN solutions for the new company. Recommendations for implementing your proposed solution.

  Did you play a role in resolving the issue

What characteristics made that person an effective or ineffective leader?How did the leader assist in working through it?

  Choose a tool for social networking

Choose a tool for social networking that allows you to create a free account. It is not a tool you have used before. It connects you with other people

  Determine the average amount of time that a guest spends

Determine the average amount of time that a guest spends checking in. How would this change under each of the stated options? -  Which option do you recommend?

  Estimate the length of time of the management plan

You have recently started your own software design company. You discover that your local DMV is looking to build a system that will allow receptionists.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd