Prepare briefing package with technology policies and plans

Assignment Help Computer Network Security
Reference no: EM131625961

Cybersecurity Policy, Plans, and Programs Project: Employee Handbook

Company Background & Operating Environment

Use the assigned case study for information about "the company."

Policy Issue & Plan of Action

The company has grown substantially over the past few years. The current Employee Handbook was created from a set of templates purchased from a business services firm. The policies in the handbook were reviewed by the company's attorney at the time of purchase. The attorney raised no objections at that time. During a recent legal review, the company's corporate counsel advised that the company update the Employee Handbook to better address its current operating environment. The Chief Executive Officer has tasked the Chief of Staff to oversee the handbook updates including obtaining all necessary approvals from the Corporate Governance Board.

The Chief of Staff met with the full IT Governance Board to discuss the required policy updates. (The IT Governance Board is responsible for providing oversight for all IT matters within the company). The outcome of that meeting was an agreement that the CISO and CISO staff will update and/or create IT related policies for the employee handbook. These policies include:

  • Acceptable Use Policy for Information Technology
  • Bring Your Own Device Policy
  • Digital Media Sanitization, Reuse, & Destruction Policy

Your Task Assignment

As a staff member supporting the CISO, you have been asked to research what the three policies should contain and then prepare an "approval draft" for each one. No single policy should exceed two typed pages in length so you will need to be concise in your writing and only include the most important elements for each policy.

The policies are to be written for EMPLOYEES and must explain employee obligations and responsibilities. Each policy must also include the penalties for violations of the policy and identify who is responsible for compliance enforcement.

Your "approval drafts" will be submitted to the IT Governance Board for discussion and vetting. If the board accepts your policies, they will then be reviewed and critiqued by all department heads and executives before being finalized by the Chief of Staff's office. The policies will also be subjected to a thorough legal review by the company's attorneys. Upon final approval by the Corporate Governance Board, the policies will be adopted and placed into the Employee Handbook.

Write:

1. Prepare briefing package with approval drafts of the three IT related policies for the Employee Handbook. Your briefing package must contain the following:

Executive Summary

"Approval Drafts" for

  • Acceptable Use Policy for Information Technology
  • Bring Your Own Device Policy
  • Digital Media Sanitization, Reuse, & Destruction Policy

As you write your policies, make sure that you address security issues using standard cybersecurity terminology (e.g.5 Pillars of IA, 5 Pillars of Information Security). See the resources listed under Course Resources > Cybersecurity Concepts Review for definitions and terminology.

2 pages per topic listed.

Reference no: EM131625961

Questions Cloud

Discuss whether or not technology should be a requirement : Discuss whether or not technology should be a requirement in all classrooms. Defend whether the use of technology is or is not helpful to all types of learners.
Define manufacture defective products that cause injury : Are punitive damages a deterrent to companies who manufacture defective products that cause injury. Should there be a cap on punitive damages one can receive
What lessons about life did douglass learn as a slave : What lessons about life did Douglass learn as a slave, and what did he hope for others to learn from his story?
Explain the upper limit on misstatements calculations : Upper Limit on Misstatements Calculations: Monetary Unit Sampling. Clyde Billy is conducting the audit of Hoops Inc. and is examining Hoops's inventory.
Prepare briefing package with technology policies and plans : CSIA 413: Cybersecurity Policy, Plans, and Programs Project: Employee Handbook. Prepare briefing package with approval drafts of the three IT related policies
Write an in-depth analysis using your own ideas : Write an in-depth analysis using your own ideas and excerpts from the text in the form of quotes, paraphrase, or summary.
Define the companys legal risk : What best practices did or should Millicent's undertake to minimize the company's legal risk
Reach the full employment level of income : Question = By how much must government spending increase in order to reach the full employment level of income?
How cell culture can help to understand drug : Discuss how cell culture can help to understand drug-induced adverse effects observed in a patient - affect the results obtained from this assay.

Reviews

len1625961

9/4/2017 3:04:32 AM

Topic: Info Technology Policies and Plans. 2 pages per topic listed (per policy). Research: 1. Review the Week 1 & 2 readings. 2. Review the sample policies and procedures provided in Week 1. 3. Find additional sources which provide information about the policy statements which should be covered in three policies for the Employee Handbook. Use a professional format for your policy documents and briefing package. A recommended format is provided in the assignment template file(see the recommended template under Course Resources).

len1625961

9/4/2017 3:04:26 AM

Common phrases do not require citations. If there is doubt as to whether or not information requires attribution, provide a footnote with publication information or use APA format citations and references. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. Submit your Employee Handbook approval draft in MS Word format (.docx or .doc file) for grading using your assignment folder. (Attach the file.)

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd