Describe the purpose of an acceptable use policy

Assignment Help Management Information Sys
Reference no: EM131681314 , Length: 5

An Acceptable Use Policy (AUP) is a very important policy within organizations to define acceptable employee behavior when accessing company resources.

Additionally, there are also legal implications within AUPs. Use an existing AUP that you are familiar with, such as from a current or previous workplace, or search on the Internet for an example AUP to complete this case study.

Write a three to five (3-5) page paper in which you:

Describe the purpose of an Acceptable Use Policy you have selected and explain how the AUP helps provide confidentiality, integrity, and availability within the organization.

Critique the AUP you selected and provide recommendations for improving the AUP.

Explain methods that organizations can implement to help ensure compliance with the AUP, mitigate their risk exposure, and minimize liability.

Describe how your selected AUP accomplishes these goals.

Describe methods for increasing the awareness of the AUP, and other policies, within the organization.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Analyze how security policies help mitigate risks and support business processes in various domains in the information technology (IT) infrastructure.

Describe the different ISS policies associated with the user domain.

Describe different issues related to implementing and enforcing ISS policies.

Use technology and information resources to research issues in security strategy and policy formation.

Write clearly and concisely about Information Systems Security Policy topics using proper writing mechanics and technical style conventions.

Reference no: EM131681314

Questions Cloud

Write a function to print common multiples of given numbers : Write a function to print all the common multiples of 6 and 10, less than 100. In general, the function should take three input parameters.
What are the major theories of human behavior : What are the major theories that support the process of goal setting in our everyday human behavior
Improving the weaknesses of the selected program : Step 1. Research a prevention program from a health plan. (You may use your own health insurance plan for your response.)
Define human services professional in an elementary school : a human services professional in an elementary school or community-based setting with a large population of at-risk students
Describe the purpose of an acceptable use policy : Describe the purpose of an Acceptable Use Policy you have selected and explain how the AUP helps provide confidentiality, integrity, and availability.
Define what is the unconditioned response : Every afternoon, you feed your cat canned cat food that you must open with a can opener. One afternoon, before it's time to feed your cat
Write a c program for salaries of salespeople : (Sales Commissions) Use a single-subscripted array to solve the following problem. A company pays its salespeople on a commission basis.
Objective frameworks for organizational analysis : Compare the similarities and differences between 'subjective' and objective frameworks for organizational analysis.
Determine the fundamental obstacles : Analyze the main advantages and disadvantages of using data analytics within the industry or company that you have chosen.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Describe how one would overcome the resistance

Change resistance - Describe how one would overcome the resistance. (Provide specific steps or ideas. Indicate how one would apply this to the hypothetical example above.)

  Provide a description of the company you are assigned

Provide a description of the company you are assigned. What was some of the major technologies that this company implemented in the last 5 - 20 years?

  Patch managementsoftware distribution trouble ticketingi

patch managementsoftware distribution trouble ticketingi need to know the market status in 2007 and the growing until

  Discuss one advantage a database has over a spreadsheet

A DBMS is software that interacts with the user to analyze the data that is inside of a database (Anjard, 1994).

  How e-business has affected selected organizations business

Write a 700- to 1,050-word paper explaining how e-business has affected your selected organization's business processes.

  Symmetric-key system and a public-key system

From a service perspective, what is an important difference between a symmetric-key system and a public-key system

  Generate five descriptive statements from the case study

Generate five descriptive statements from the case study descriptions of the library. Generate five prescriptive statements from the case study descriptions of the library.

  Explain the duties of a network manager

Duties of a Network Manager - This solution describes the duties of a network manager, and also explains the implications of regulation on electronic documents.

  Trends in technology for entrepreneursthe eight business

trends in technology for entrepreneursthe eight business technology trends to watch article from mckinsey quarterly

  What are the main components of a cisco router

Refer to the exhibit below. The network administrator for a small advertising company has chosen to use 192.168.5.96/27 network for internal LAN addressing. As shown in the exhibit, a static IP address is assigned to the company printer. However, ..

  Will government health care privacy initiatives

Will government health care privacy initiatives -- such as the Health Insurance Portability and Accountability Act (HIPAA) in the U.S. and similar laws in the U.K. encourage the development of new security techniques or technology?

  Will wimax defeat the other wan wireless technologies

In 2003, McCaw started a new venture, Clearwire, by buying rights to technology based on WiMax, to address what is called the "problem of the last mile." Will WiMax defeat the other WAN wireless technologies?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd