Write an organizational policy to address theit-workforce

Assignment Help Management Information Sys
Reference no: EM132021822

Paper B2- Organizational Policy to address an IT-related ethical issue that you wrote about in your matrix for the B1 assignment

Write an organizational policy to address theIT-related ethical workforce privacy issue that's described inMatrix B1, where you mapped key organizational issues and identified how these ethical issues were affected by laws, regulations, and policies.

Please incorporate the instructor's feedback from the review and grade and then use the Matrix B1 you produced as a supporting document.

The following elements must be addressed:

1. Look at other policies to see how they are written. The following site provides examples of templates for policies but an Internet search provides other templates.

2. Your policy should include the following major headings:

a. Overview of the policy

b. Purpose of the policy

c. Scope (roles and responsibilities of stakeholders)

d. Policy Points to follow - (Note: you should be aware that a policy only describes "what,"the staff of an organization will do, while a procedure describes "how," the staff of an organization will accomplish a required action. As a result, this section should only discuss the specific measures, needs, or changes to behavior within the organization in terms of policy points, i.e., what they must do to conform to the policy.

Any procedures that are needed to assist in doing the "what," are usually included by reference later in the policy - procedures should not be included in the policy points).

e. Sanctions/enforcement of policy

3. Prepare a 3-5 page, double-spaced paper with your Organizational Policy.

4. This assignment requires a minimum of three external references. Indicate appropriate APA reference citations forall sources you use.

5. In addition to critical thinking and analysis skills, your paper should reflect appropriate grammar and spelling, good organization, and proper business-writing style.

6. Submit the assignment to the Assignment Folder as a MS Word File

Reference no: EM132021822

Questions Cloud

How you do or could use operations security in your job : If you are currently unemployed or in a job in which you are not able to apply the class concepts, define the job you are looking to apply for.
Probability that the mean weight of those loads : Find the probability that the mean weight of those loads is less than 45.0 tons. Assume that the variable is normally distributed.
Standard deviation value correct : But then I struggle with the math to then get the standard deviation value correct. mean-k(sd)=LL doesn't seem to help me here.
The important elements of what you have just learned : Create a one-day training course that highlights the important elements of what you have just learned within the past ten (10) weeks.
Write an organizational policy to address theit-workforce : Write an organizational policy to address theIT-related ethical workforce privacy issue that's described inMatrix B1.
What is the probability that a student will get : (a) What is the probability that a student will get a grade of C or higher?
What is the probability that a student will get a grade : A professor of English with very large classes anticipates that the percentages of students who will receive grades of A, B, C, D, or F are, respectively.
Define the job you are looking to apply for : Define the job you are looking to apply for and how you would use operation security in that job position.
Write a brief synthesis and summary of the two articles : Research at least two articles on the topic of emerging enterprise network applications. Write a brief synthesis and summary of the two articles.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Determine the different types of firewalls

The senior systems analyst has tasked you to conduct a briefing on the different types of firewalls.

  Identify additional areas of concern for organizations

Analyze the characteristics of wireless LANs and assess the security concerns of this technology in organizations such as universities or hospitals.

  Discuss the concept of alignment in the supply chain process

Show the concept of alignment in the supply chain process. When transporting a product, is the supply chain alignment different for different products such as soft drinks versus clothing?

  What will you do when you gather evidence of an incident

What are the categories of audit standards you will use? What will you do when you gather evidence of an incident? Why do you need to know the positions of duties of IS employees as well as managers in terms of evidence collection?

  What controls may be needed to protect patient data

Consider the support capabilities of a typical health care operation and where employees may access data of various types related to patient needs. What might be accessed, and what controls may be needed to protect patient data?

  Locate an automated assessment tool

Locate an automated assessment tool and detail what attackers use the tool for, the information it provides, and how organizations can protect themselves from it.

  Demonstrate the projects value to centervale apparel

Prepare a proposal using a balanced scorecard approach to demonstrate the project's value to Centervale Apparel.

  Discuss strategies for converting their old erp system

You are preparing to meet with your end users to discuss possible strategies for converting their old ERP system to a new one. Propose two (2) or three (3) alternative strategies, and explore related examples of situations for which each approach ..

  Research the project manager skills

Apply your explanation to the field of information technology by addressing the importance of project management for technology-based initiatives.

  What are the consequences

Using your CIKR paper from the previous assignment, continue the risk analysis of your CIKR being impacted by a natural disaster, terrorism or technological event. Answer the following questions for each type of event: (1) what can happen? (2) how..

  Evaluate online tutorials and online communities

Evaluate online tutorials and online communities in regard to helping users. Create an argument for the approach you find to be the most effective.

  Produce a coherent srategic plan for a fictitious

Producing a Coherent Srategic Plan for a fictitious IS business - Drawing from several resources (the work you did in previous modules, material covered in the reading in this course, and additional research),

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd