Reference no: EM133536988
1)Provide an Excellent Executive Summary of
I) Data Breach Response Policy
Ii)Preventing / Controlling Shadow IT Policy
Iii)Management and Use of Corporate Social Media Accounts Policy
Each policy should be introduced and clearly explained
2) I) Provide an excellent introduction of Data Breach Response Policy which addressed five or more specific characteristics of the company's business, legal & regulatory, and/or enterprise IT environments and addressed the reasons why employees must comply with this policy
Ii) Provide an excellent description of the actions required to create and implement a data breach response plan. The policy identified the responsible parties, compliance requirements, and sanctions / disciplinary actions for compliance failures. Contact information is provided for questions about the policy. The policy was clear, concise, easy to understand, and appropriately organized.
3) I) Provide an excellent introduction The Shadow IT Policy which addressed three or more specific characteristics of the company's business, legal & regulatory, and/or enterprise IT environments and addressed the reasons why employees must comply with this policy. Compliance requirements are addressed and contact information is provided for questions about the policy.
ii) Provide an excellent description of the actions required to create and implement a data breach response plan. The policy identified the responsible parties, compliance requirements, and sanctions / disciplinary actions for compliance failures. Contact information is provided for questions about the policy. The policy was clear, concise, easy to understand, and appropriately organized.
4)I) Provide an excellent introduction of Management and Use of Corporate Social Media Accounts Policy which addressed three or more specific characteristics of the company's business, legal & regulatory, and/or enterprise IT environments and addressed the reasons why employees must comply with this policy. Compliance requirements are addressed and contact information is provided for questions about the policy.
ii) Provide an excellent description of the actions required to create and implement a data breach response plan. The policy identified the responsible parties, compliance requirements, and sanctions / disciplinary actions for compliance failures. Contact information is provided for questions about the policy. The policy was clear, concise, easy to understand, and appropriately organized.
5) Provide an Excellent Conclusion of all the above policy and add key references