Do employee know their responsibilities under those policies

Assignment Help Management Information Sys
Reference no: EM131420266

Project : IT Audit Policy and Plans

Company Background & Operating Environment

Use the assigned case study for information about "the company."

Policy Issue & Plan of Action

The corporate board was recently briefed by the Chief Information Officer concerning the company's IT Security Program and how this program contributes to the company's risk management strategy. During the briefing, the CIO presented assessment reports and audit findings from IT security audits. These audits focused upon the technical infrastructure and the effectiveness and efficiency of the company's implementation of security controls. During the discussion period, members of the corporate board asked about audits of policy compliance and assessments as to the degree that employees were

(a) aware of IT security policies and

(b) complying with these policies.

The Chief Information Officer was tasked with providing the following items to the board before its next quarterly meeting:

(a) Issue Specific Policy requiring an annual compliance audit for IT security policies as documented in the company's Policy System

(b) Audit Plan for assessing employee awareness of and compliance with IT security policies

a. Are employees aware of the IT security policies in the Employee Handbook?

b. Do employees know their responsibilities under those policies?

(c) Audit Plan for assessing the IT security policy system

a. Do required policies exist?

b. Have they been updated within the past year?

c. Are the policies being reviewed and approved by the appropriate oversight authorities (managers, IT governance board, etc.)?

Your Task Assignment

As a staff member supporting the CISO, you have been asked to research this issue (auditing IT security policy compliance) and then prepare an "approval draft" for a compliance policy.You must also research and draft two separate audit plans

(a) employee compliance and

(b) policy system audit.

The audit policy should not exceed two typed pages in length so you will need to be concise in your writing and only include the most important elements for the policy. Make sure that you include a requirement for an assessment report to be provided to company management and the corporate board of directors.

• For the employee compliance assessment, you must use an interview strategy which includes 10 or moremultiple choice questions that can be used to construct a web-based survey of all employees. The questions should be split between (a) awareness of key policies and (b) awareness of personal responsibilities in regards to compliance.

• For the policy system audit, you should use a documentation assessment strategy which reviews the contents of the individual policies to determine when the policy was last updated, who "owns" the policy, who reviewed the policy, and who approved the policy for implementation.

Research:

1. Review the weekly readings including the example audit assessment report.

2. Review work completed previously in this course which provides background about the IT Policy System and specific policies for the case study company.

3. Find additional resources which discuss IT compliance audits and/or policy system audits.

Write:

1. Prepare briefing package with approval drafts of the three required documents. Place all three documents in a single MS Word (.doc or .docx) files.

2. Your briefing package must contain the following:

• Executive Summary

• "Approval Drafts" for

o Issue Specific Policy for IT Security Policy Compliance Audits

o Audit Plan for IT Security Policy Awareness & Compliance (Employee Survey)

o Audit Plan for IT Security Policies Audit (Documentation Review)

As you write your policy and audit plans, make sure that you address security issues using standard cybersecurity terminology (e.g.5 Pillars of IA, 5 Pillars of Information Security). See the resources listed under Course Resources > Cybersecurity Concepts Review for definitions and terminology.

3. Use a professional format for your policy documents and briefing package. Your policy documents should be consistently formatted and easy to read.

4. Common phrases do not require citations. If there is doubt as to whether or not information requires attribution, provide a footnote with publication information or use APA format citations and references.

5. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.

Attachment:- rcr.rar

Reference no: EM131420266

Questions Cloud

Analyze which poor policy can disrupt business continuity : Analyze the overall manner in which poor cybersecurity policy can disrupt business continuity. Provide at least two examples of such disruption to support your response.
Example of institutional racism in the workplace : Make up one original example of individual racism and one original example of institutional racism in the workplace. Clearly label each. Do not use examples in the text.
Determine the possible reductions of human capital : Assess expected cost savings in hardware infrastructure. Determine the possible reductions of human capital that can be realized from implementing cloud and virtualization technologies
Calculate the shear strain for the operation : In an orthogonal cutting operation, the tool has a rake angle = 15°.
Do employee know their responsibilities under those policies : The corporate board was recently briefed by the Chief Information Officer concerning the company's IT Security Program and how this program contributes to the company's risk management strategy. During the briefing, the CIO presented assessment re..
Definition of economic freedom changed after the revolution : Explain how the definition of economic freedom changed after the Revolution and identify who benefited from the changes. Minimum 120 words
Problem regarding the american independence : Identify the key events that marked the move toward American independence. Minimum 120 words
Examine the pros and cons of an ipo for galaxy international : Examine the pros and cons of an IPO for Galaxy International. Recommend whether the company should or should not proceed with an IPO.
Determining the competitive value of information technology : Identify three factors to consider in determining the competitive value of information technology. Justify the selected factors. Of the factors selected, determine if each factor is applicable to all businesses and industries, and explain why or why ..

Reviews

Write a Review

Management Information Sys Questions & Answers

  What are some strengths of computer systems

Strengths of computer systems and What are some strengths of computer systems and technology use, including hardware and software?

  Compare and contrast a business case and a business plan

Select a business case template that you like and tell me why you selected that business case template. I want you to reference at least three different business case templates and select the one you believe to be the best.

  Supply chain selection of vendorsscenariothe time frame for

supply chain selection of vendorsscenariothe time frame for receiving proposals passed yesterday. you received 10

  Description of the influences of power and politics

Discuss how a DSS/BI system can help in each process - Description of the influences of power and politics within the organization on the decision making process

  How a system could improve efficiency

As the new manager of a convenience store, you have noticed issues with the manual method of tracking sales using paper sales tickets and spreadsheets, as well as, shortages on some of the more popular items carried in the store. How a system coul..

  Steps found in business process engineeringreview the steps

steps found in business process engineeringreview the steps found in business process engineering. review the lesson

  Characteristics of a general computer system

General computer system security - How do the characteristics of a general computer system

  How do you know that you have captured the right data1 how

how do you know that you have captured the right data1 how do you know that you have captured the right data

  Find average carrier power required to maintain an average

Find the average carrier power required to maintain an average probability of error Pe £ 10-4 for the Binary PSK using coherent detection schemes.

  Social media sites to blame for lost productivity

Statistics showed that 70% of adults have used social media sites to connect with relatives in other states, and 57% of teens have reported making new friendships on social media sites which is amazing for some students who are socially uncomforta..

  Consider the apple watch series 2

Consider the Apple Watch Series 2 (picture shown above). The users of iPhones have a choice of interacting with an Apple Watch (assuming the user owns both) to perform some tasks where they have a choice of using the iPhone or the Apple Watch.

  Description of the project

You will carry out your project and produce a final report which should consist (at least) of the following elements: Description of the project, Comprehensive literature review and Data collected and results obtained (depending on the chosen project..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd