Describe the purpose of an acceptable use policy you have

Assignment Help Management Information Sys
Reference no: EM132046761 , Length: 3

Case Study : Acceptable Use Policy

An Acceptable Use Policy (AUP) is a very important policy within organizations to define acceptable employee behavior when accessing company resources.

Additionally, there are also legal implications within AUPs. Use an existing AUP that you are familiar with, such as from a current or previous workplace, or search on the Internet for an example AUP to complete this case study.

Write a three to five (3-5) page paper in which you:

1. Describe the purpose of an Acceptable Use Policy you have selected and explain how the AUP helps provide confidentiality, integrity, and availability within the organization.

2. Critique the AUP you selected and provide recommendations for improving the AUP.

3. Explain methods that organizations can implement to help ensure compliance with the AUP, mitigate their risk exposure, and minimize liability. Describe how your selected AUP accomplishes these goals.

4. Describe methods for increasing the awareness of the AUP, and other policies, within the organization.

5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Analyze how security policies help mitigate risks and support business processes in various domains in the information technology (IT) infrastructure.

• Describe the different ISS policies associated with the user domain.

• Describe different issues related to implementing and enforcing ISS policies.

• Use technology and information resources to research issues in security strategy and policy formation.

• Write clearly and concisely about Information Systems Security Policy topics using proper writing mechanics and technical style conventions.

Reference no: EM132046761

Questions Cloud

Describe ways that technology and social media : Identify the three findings and describe ways that technology and social media have changed the roles of managers since Mintzberg's 1960 study.
What is the three day value at risk for the portfolio : A portfolio consists of $450,000 in Google stock and $600,000 in Disney stock. Volatility on a daily basis are 2.2 % and 1.4% respectively with a correlation.
Representative responsible for negotiating wages and benefit : What are some things that a union representative responsible for negotiating wages and benefits should want to see placed in a work agreement?
What is a service blueprint : What is a service blueprint, and how does a "poke-yoke" fit into the design of a service blueprint?
Describe the purpose of an acceptable use policy you have : Explain methods that organizations can implement to help ensure compliance with the AUP, mitigate their risk exposure, and minimize liability.
What is the expected return on the portfolio : You own a portfolio that is 35 percent invested in Stock X, 20 percent in Stock Y, and 45 percent in Stock Z. The expected returns on these three stocks.
What are the three vertical integration of a business : What are the three vertical integration of a business and why is it vital to organizational success?
How you will communicate with stakeholders : Identify and describe the critical success factors, goals or objectives for areas included in scope -
What are some ideas for a procurement : What are some ideas for a procurement, operations, and marketing strategy?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Discuss about managerial issues of a networked organization

Research at least two articles on the topic of managerial issues of a networked organization. Write a brief synthesis and summary of the two artcles.

  Give two examples for protecting the equipment

What control policy is required in order to prevent unauthorized access and damage to facilities?

  How do you configure bgp in your network while preventing

You have been asked to configure BGP in your network. How do you configure BGP in your network while preventing a common problem, such as the exit router becoming a transit hub? Explain another common problem that you may need to address when tryi..

  What factors use the it professionals use

Explain the candidates research to other students, potential committee members etc..What factors use the IT professionals use to determine the purchase?

  Analyze the difference between a use case and a scenario

Outline the primary ways in which the traditional approach to modeling a use case differs from an object-oriented approach. Develop a scenario in which you would use the traditional approach over the object-oriented approach, and explain your reas..

  Define the job you are looking to apply for

Define the job you are looking to apply for and how you would use operation security in that job position.

  Identify a freeware tool that can monitor the entire network

Identify a freeware tool that can monitor the entire network and show status of each computer in the network. Install and explore this freeware.

  What is the typical it implementation process

Read "Case: Concerns and Workarounds with a Clinical Documentation System." What is the typical IT implementation process? What are the roles and responsibilities involved in system implementation

  Show the interactions of global organizations

This solution shows leadership in a company that works with multiple countries and cultures. A thorough discussion regarding the related cultural elements is provided

  Improve a team members performance

Explain the steps you would take, and the techniques you would use, to mold a group of individuals into a team. Justify your response.

  Why should a business use microsoft xp proi want a respose

why should a business use microsoft xp pro?i want a respose showing why a business should use microsoft xp pro instead

  Provide key suggestions for mitigating or eliminating risks

CIS 558 - provide key suggestions for mitigating or eliminating those risks from an auditor's perspective. Suggest key methods for measuring the effectiveness of your solutions.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd