Free Essay

Public Policy and Technology

In:

Submitted By maximyershov
Words 1589
Pages 7
Information Technology
Public Policy and Technology
Name
SCHOOL
DATE

Information Technology: Public Policy and Technology
The new U.S. president is counting on technology to help realize his key agenda items. Government policymakers and business leaders also need to consider foundational technology and public policy issues, such as privacy, identity, architecture and the impact of Web 2.0. E-Governments is the future of any nation and as soon as Government moves towards Internet, the internal operations will be faster.
More and More Governments are moving towards cloud computing and Web 2.0 service to implement public policy today. The biggest challenge in this is data security and maintaining the integrity of the data. This is one of the most difficult and important task to do. This is the biggest challenge for the governments all over the world. The last time that research houses published a special report on how technology would affect public policy and vice versa in the U.S. was during the aftermath of the 2000 presidential election. That report led to other special reports on the relationship of technology and public policy in other parts of the world. In those reports, we were optimistic about the prospects of technology's enablement of the public policy, including streamlining government in much the same way that IT has helped to improve efficiency in the private sector, and the prospects for the public's involvement in rule making and legislation. Our predictions at the time were pessimistic about the prospects for e-government citizen-facing portals, freedom from government surveillance through the Internet, and the ability to continue avoiding Internet taxation. Of research houses seven predictions in 2001, they were correct on three (e-government project failures, business outsourcing to IT clusters, and Internet-enabled surveillance) and wrong on two (IT-enabled government streamlining and Internet taxes), and the jury is still out on two (public participation in rule making and legislation online, and new parties and political coalitions emerging through the Web) (Dumas, 2011). This report is focused on technology and public policy in the U.S., but many of these issues are relevant in other regions as well. With a new American president elected in 2008, especially one who used IT very effectively in his campaign, research houses is taking another look at technology and public policy in four categories — government architecture issues, "Government 2.0," fallout from the economic crisis and the U.S. presidential administration's public policy initiatives.
The first category is architecture — what does the U.S. federal government need to do to address some of the most pressing issues of its own back office? Primary among these issues is the need to address its security architecture — if government is to lead a national cybersecurity strategy, then it must first establish effective IT security within its own agencies. Next is the goal of supporting transparency in government operations. (Dumas, 2011) With the advent of e-mail, maintaining an effective records management strategy has become problematic for most agencies, and yet there are strategies that Research houses recommends that can begin to resolve the dilemma of what to retain and how to preserve it. Improving the success of e-government projects is another architectural issue, but it may not require a lot of effort if privacy concerns can be addressed. And, of course, an architect is needed — that should be one of the roles of a federal CTO.
In the not-too-distant future, research houses foresee the emergence of Government 2.0. For the full economic potential of Web 2.0 to be realized, there is a pressing need for governments to establish standards for identification and to sort out the confusing patchwork of privacy protection in the cloud and in social networks. For government agencies themselves, government adaptation to social networks is both a threat to current territorially delineated systems of service delivery, and an opportunity for improving the effectiveness and relevance of services. Information technology intersects with public policy in the fallout from the ongoing economic and financial crises, and both private-sector institutions and government agencies need to consider their IT strategies. Bank CIOs who have large investments from governments and sovereign wealth funds will need to take those investors' interests into account when building the business case for IT initiatives (even employment public policy issues like offshoring and H-1B visas could be factors). They must especially consider the renewed interest in risk management from regulators. To ensure accountability and public trust, government agencies that are disbursing economic stimulus funds also must incorporate effective risk management and so must public- and private-sector organizations that receive the funds. In the future, standardization in financial, and nonfinancial, reporting worldwide will depend on XBRL reporting and common standards for enterprise risk management (Chong, 2009).
Lastly, the new American presidential administration has introduced public policy initiatives addressing some profound issues that depend heavily on IT to make them effective and affordable. Chief among these are healthcare reform and environmental sustainability. This time, we've held back from offering predictions in most of our reports. Public policy proceeds at a snail's pace, except during times of crisis, and while public policy is predictable in its direction, the timeline is challenging. Indubitably, in the U.S. and in other areas around the world, we are in an era of major change, and IT strategies must account for public policy.
In 2009, cloud computing moved from being an overhyped phenomenon to something that governments took seriously from an enterprise wide perspective. While some agencies and departments had already adopted cloud-based solutions to meet selected infrastructure and software requirements, the Obama administration and the new U.S. federal CIO have made this a government wide issue, challenging a status quo where almost every department runs its own IT shop and the largest departments have multiple shops and CIOs. Over the past several months, the U.S. federal government has created the first cloud application store for government, launched a request for quotation to determine the viability of infrastructure-as-a-service offerings, embedded references to cloud computing in the budget, and progressed its agenda on security and portability. At the same time, some agencies have taken the lead in both providing cloud services (the Defence Information Systems Agency, NASA and the National Business Center) and using them (the General Services Administration and Department of Labor), and some states (Utah, Michigan and Colorado) and local governments (the county and city of Los Angeles) have developed plans and started deployments for some specific cloud services. In other parts of the world (the U.K., Netherlands, Denmark, Singapore and Japan), governments are looking into the potential of cloud computing for consolidation and rationalization of IT assets and spending. In spite of all these efforts, many governments struggle with fully articulating the value and risk of cloud computing for different workloads, applications and process requirements. Multiple definitions of what cloud computing is, different levels of maturity in managing external service providers, and different attitudes about the problem of owning and controlling the infrastructure create multiple viewpoints inside and across government organizations, as well as somewhat conflicting positions between central organizations tasked with overseeing enterprise wide IT and individual agencies and departments. Cloud services exist in a continuum of delivery models and may not be necessarily the most appropriate for what government user organizations are trying to accomplish.
In order to make the right decisions about cloud computing, users need to articulate which attributes of cloud computing are needed for what they are trying to accomplish, and explore how cloud computing rates against alternative options (such as traditional hosting or infrastructure utility) that support a subset of the cloud attributes. Governments cannot just "implement cloud," but will implement or acquire one or more cloud technologies or services that provide the right fit between requirements and offering maturity such as software as a service. On software acquisition models that government agencies can use, such as open-source, custom and proprietary off-the-shelf software.

References
Postman, N. (1985). Amusing Ourselves to Death: Public Discourse in the Age of Show Business. London: Penguin Books.
Dumas, L. J. (2011). When Costs Approach Infinity: Microeconomic Theory, Security, and Dangerous Technologies. Chatterji, M., Bo, C., & Misra, R. (ed.) Frontiers of Peace Economics and Peace Science (Contributions to Conflict Management, Peace Economics and Development, 16: pp. 59-71. Emerald Group Publishing Limited.
Hester, P.T. & Mahadevan, S. (2010). A multicriteria approach to critical facility security system design. Lawrence, K. D. & Kleinman, G. (ed.). Applications of Management Science, 14: pp. 105-131. Emerald Group Publishing Limited.
Hong, D. & Chong, C. (2009). The convergence and divergence in perceptions of security issues by military professionals and civilians in South Korea. Caforio, G. (ed.). Conflict Management, Peace Economics and Development, 12: pp. 473-489. Emerald Group Publishing Limited.
Intriligator, M.D, & Coulomb, F. (2008), Global security and human security. Fontanel, J. & Chatterji, M. (ed.). War, Peace and Security (Contributions to Conflict Management, Peace Economics and Development, 6: 53-66. Emerald Group Publishing Limited.
Phillips, D.E. (2008). Terrorism and security in the Caribbean before and after 9/11, in Caforio, G., Kümmel, G., & Purkayastha, B. (ed.). Conflict Management, Peace Economics and Development, 7: pp. 97-138. Emerald Group Publishing Limited.
Razack, S.H. (2007). Your Client has a Profile: Race and National Security in Canada After 9/11. Sarat, A., (ed.). Studies in Law, Politics, and Society, 40: pp. 3-40. Emerald Group Publishing Ltd.

Similar Documents

Premium Essay

Information Systems Security Policy

...Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 ________________________________________________________________________ 1 MICROS Systems, Inc. Enterprise Information Security Policy Version 8.0 Public Table of Contents Overview – Enterprise Information Security Policy/Standards: I. Information Security Policy/Standards – Preface……………....5 I.1 Purpose …………….……………………………………………...5 I.2 Security Policy Architecture ………………….………………….6 I.3 Relation to MICROS Systems, Inc. Policies……………………..6 I.4 Interpretation………………………………………………….…..7 I.5 Violations…………………………………………………….….....7 I.6 Enforcement…………………………………………….................7 I.7 Ownership………………………………………………................7 I.8 Revisions…………………………………………………………..7 II. Information Security Policy - Statement………………………..8 MICROS Enterprise Information Security Policy (MEIP): 1. Information Security Organization Policy (MEIP-001)...……....9 2. Access Management Policy (MEIP-002)…………………………10 3. Systems Security Policy (MEIP-003)...…….…………………......11 4. Network Security Policy (MEIP-004)…………………………….12 ________________________________________________________________________ 2 MICROS Systems, Inc. Enterprise Information Security Policy Version 8.0 Public 5. Application Security Policy (MEIP-005)…..………………………13 6. Data Security/Management Policy (MEIP-006)……………….14-15 7. Security Incident Handling Policy (MEIP-007)..………………....16 ...

Words: 4971 - Pages: 20

Free Essay

E-Procurement

...sciencedirect.com Government Information Quarterly 25 (2008) 155 – 180 E-government policy and practice: A theoretical and empirical exploration of public e-procurement Catherine A. Hardy ⁎, Susan P. Williams Information Policy and Practice Research Group, Discipline of Business Information Systems, Faculty of Economics and Business, The University of Sydney, Sydney, NSW 2006, Australia Available online 19 April 2007 Abstract The purpose of this paper is to theoretically and empirically explore how public e-procurement policies are translated into practice. The theoretical argument draws on actor network theory (ANT), coupled with Colebatch’s [Colebatch, H. K. (2002). Policy (2nd ed.). Maidenhead, Open University Press.] social construct of policy, to analyze the actors, actions, and circumstances through which understanding of public e-procurement comes to stabilize (or not) into a coherent policy for action. Drawing on three case studies of central government agencies in Italy, Scotland, and Western Australia, we suggest new intellectual perspectives and methodological heuristics that may assist researchers and practitioners analytical efforts in examining sociotechnical change and the implications for policy development and implementation. © 2007 Elsevier Inc. All rights reserved. Keywords: E-government; E-procurement; Actor network theory; Social construction of policy 1. Introduction Public e-procurement, as an information system (IS) enabled innovation in government, is...

Words: 12195 - Pages: 49

Premium Essay

Public Policy: Beliefs And Influence

...Public Policy: Beliefs and Influence To start off, how do you define public policy? This question is so simple, yet everyone seems to define it differently from one person to another. According to Thomas A Birkland, a political scientist specializing in the study of public policy, he writes “Considerable debate remains over whether there is one coherent set of principles that can govern the study and understanding of what we call public policy. Since, there are many ways to define public policy”. Laws and public policy should be influenced by cultural and religious beliefs to a certain extent. First off, this country was founded off of Catholicism and Christianity. The majority of our population still actively believes in them to this day. Not only does religion have the capability of keeping people in line, but it gives people an incentive to be good to one another. After all, sinning is bad and the way to go to heaven is through moral actions and projecting love to one another. People have deep rooted beliefs and it makes them scared to do bad things, since there is the possibility of going to hell. The 10 Commandments are a good thing to abide by since they encourage upholding moral action and truth. Because of this, there are some cases in which it is better to have laws and public policy influenced by religion. In these cases, religion would...

Words: 653 - Pages: 3

Premium Essay

Comparative Analysis

...Introduction Public administrators use many communication genres to reach their audiences. These genres range from business cards to governmental proposals. Each one has its own purpose. Each one has its own way of getting information to the audience quickly and efficiently. Each one has been affected by technology. Each has its own discourse conventions associated with it. And each has its own method of distribution—either external or internal. The purpose of this analysis is to compare some of these genres and explain how each one gets information to the intended audience effectively. The Purpose The business card genre introduces a reader to the person named on the card and provides professional information about that person. It helps the reader gain insight to pertinent information concerning the cardholder by providing the cardholder’s name, the agency’s name, an office phone number, address, and e-mail address. The resume, on the other hand, provides information to the reader regarding a candidate’s skills and experience related to potential employment. Information concerning the candidate, such as name, address, and phone number, along with employment experience, beginning with the most recent, aids the reader in comprehending this information quickly. A policy memorandum is an instrument used to aid policymakers with information needed to develop, implement, and evaluate existing policies by analyzing complex issues and alternative actions. A policy memorandum...

Words: 961 - Pages: 4

Premium Essay

Mini Country Report/Romania

...Integration of INNO Policy TrendChart with ERAWATCH (2011-2012) Mini Country Report Thematic Report 2011 under Specific Contract for the Integration of INNO Policy TrendChart with ERAWATCH (2011-2012) December 2011 Author: Marina Ranga, Stanford University Table of Contents Preface ii  Executive Summary iii  1. Innovation policy trends 1  1.1 Trends and key challenges for innovation policy 1  1.2 Innovation governance 7  1.3 Recent changes in the innovation policy mix 12   1.4 Internationalisation of innovation policies 15   1.5 Evidence on effectiveness of innovation policy 16   2. Innovation policy budgets – an overview 19   2.1 Trends in funding of innovation measures 19   2.2 Departmental and implementing agency budgets for innovation policies 2 1  2.3 Future challenges for funding of innovation policy 22  3. Thematic report: Demand-side innovation policies 23  3.1 Trends in the use of demand-side innovation policies 24  3.2 Governance challenges 30  3.3 Recent demand-side innovation policy measures 3 1  3.3.1 Sectoral specificities 3 1  3.3.2 Good practice case 3 1  Appendix A : Plan to increase the efficiency and effectiveness of RDI expenditure (Summary of provisions) 32  Appendix B : Recommendations of World Bank’s Functional Review for the reform of the Romanian RDI system 34  Appendix C : Research and innovation policy measures for Romania ...

Words: 18856 - Pages: 76

Free Essay

Technology Status in Kenya

...Using technology to engage in international development is difficult in a region of the world where the Internet has not reached every sector of the population. However, Kenya is leading the way in transforming information technology usage in Africa. Creative talent, curiosity, and innovative entrepreneurial spirit have helped shape the Kenyan technology community. Constraints to technology growth in Kenya 1. Lack of Connectivity Local Internet Service Providers (ISPs) generally do not offer connectivity in the remote areas and mobile phone data networks often have limited reach and can be prohibitively expensive. 2. Expensive Electricity Rural and other underserved locations rarely have a reliable electrical power infrastructure that can support a standard ICT implementation. Traditional computing systems are therefore cost-prohibitive because they require so much electricity. 3. Lack of technological skills Lack of properly trained staff with the right technological skills has derailed technology growth since there are no people to diffuse the technology and also to train the targeted audience on how to use the new technology effectively. The quality and quantity of available human resource can directly affect the growth of technology. 4. Lack of funds This is one of the main issues affecting technology growth in Kenya. Many people come up with new ideas every day but are hindered from implementing them dye to lack of resources. There has not been enough government...

Words: 1289 - Pages: 6

Premium Essay

Purchasing

...inadequate  business processes to support e-procurement, regulatory and legal controls, security, co-operation of business partners capacity, inadequate e-procurement solutions, upper management support (Chipiro, 2009). Shakir et all, (2007) identified several driver/barriers for adoption of e-procurement;   Economic: Little benefit to vendors, vendors’ concerns about costs, vendors’ fear of competitive bidding because of its adverse effect on price, insufficient internal resources to support e-procurement  Operational: vendors’ concerns about required changes in work processes, lack of skilled personnel, particularly when the vendor is required to  populate, update, and monitor, electronic product catalogues  Environmental: ineffective public infrastructure, restrictive or lack of regulations from domestic governments, differences in language, culture, and legal systems   Technological: low or different levels of IT maturity among vendors, lack of technical and data exchange standards, lack of supporting IT infrastructure, Vendors’ concerns about the...

Words: 3170 - Pages: 13

Free Essay

Future Trends in Public Administration

...Future Trends Impacting Public Administration Introduction Excellent public administration and management of public entities has always been the major responsibility of public officials and administrators of public funds. Throughout the years, the public administration has encountered many challenges and changes that impact the overall society. As the world evolve into new alternatives as is technology and changes in public policy, the administration of such evolves and changes as well. This paper intent to provide the reader with future trends and social changes impacting public administration as well as future public policy challenges for public administration. Future Trends Technology - The implementation of technology in organizations as in public agencies have helped developed many strategies in order to provide services even faster. Technology have also helped through the Internet to connect organizations, computers and users throughout the world. “Mexico recently introduced an advanced system of electronic tendering and procurement, and Korea is launching an electronic system for processing applications which will allow applicants to monitor any movement of their case over the internet” (Wolf, 2000, p. 690). Automation of services if properly implemented will increase overall services provided to the public. But even though technology provides with advances to improve overall services in public administration, it is also noted that provides with alternatives...

Words: 1303 - Pages: 6

Free Essay

Mister

...increasingly becoming a fundamental tool for enhancing public administration. This paper discusses e-government’s implications on public policy formulation and implementation in Kenya. In addition, the challenges of adopting technology and organizational change are examined. Research conducted outside Sub-Saharan Africa showed that information and communication technologies (ICTs) have the potential to enhance efficiency, policy effectiveness, citizens’ participation, and democratic values. Based on the concept of democratic values, the paper explores how e-government impacts the political agenda, rule making, and public service delivery. The central argument is that e-government is not only a tool or platform that enhances delivery of public services but also has the potential to reform the way policies are formulated and implemented in terms of efficiency, accountability, transparency, and citizens’ participation. The Key findings show that the Kenyan government has failed in disseminating information about e-government, sensitizing Kenyans on how to make use of technology to access government services, and providing incentives to encourage use of technology. Hence despite the advantages touted globally for implementing e-government, literature showed no evidence that any of the Kenyan e-government’s objectives: enhancing delivery of public services, improving information flow to citizens, promoting productivity among public servants, and encouraging citizens’ participation has...

Words: 1066 - Pages: 5

Premium Essay

Gm520 Week 2 Assignment Paper

...S. Agency for International Development (USAID) issued a new Scientific Integrity Policy to safeguard the quality and integrity of the Agency's scientific and scholarly activities. This agency is made for the International Development and is in favor of the people around the world which makes me glad and this fact interests me. This proposed regulation will not be affecting me or my work place. It would be a general public benefit which would make everyone feel at ease. 2. Describe the proposal/change. Spurred by a 2009 directive from President Obama and subsequent guidance from the White House, this policy articulates the principles regarding how scientific and scholarly activities are supported and carried out, and how research findings are used and disseminated. Specifically, the policy outlines guiding principles for the entire Agency that will: • Protect the scientific process from misconduct and from inappropriate influence; • Promote access to scientific and technical information; • Maintain a highly skilled technical and scientific staff; • Convene and use federal advisory committees ethically and transparently; and, • Ensure quality, methodological rigor, and ethical standards in all USAID-funded research activities. Many of these principles already align with the high integrity that USAID staff maintain when conducting scholarly activities. The intention of this policy is to capture and employ these best practices throughout the Agency and introduce new...

Words: 789 - Pages: 4

Free Essay

Uganda.Pdf

...THE INTER-SESSIONAL PANEL OF THE UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT 15-17 December 2010 Geneva UGANDA CONTRIBUTION " ICT POLICIES, STRATEGIES AND INITIATIVES PUT IN PLACE IN UGANDA " The views presented here are the participants’ and do not necessarily reflect the views and the position of the United Nations or the United Nations Conference on Trade and Development i      ICT POLICIES, STRATEGIES  AND INITIATIVES PUT IN  PLACE IN UGANDA      NITA‐U  11/2/2010      ii    Table of Contents  1    2  Table of Contents ………………………………………………………………………………………………………………………………………………….iii  INFORMATION COMMUNICATION TECHNOLOGY (ICT) STRATEGIES…………………………………………………………………….1  2.1  3  Creation of the Ministry of ICT……………………………………………………………………………………………………………………..1  AGENCIES UNDER MINISTRY OF ICT………………………………………………………………………………………………………………….....1  3.1  National Information Technology Authority‐Uganda……………………………………………………………………………………1  Functions of the Authority ........................................................................................................................ 1  Initiatives ................................................................................................................................................... 2  3.1.1  3.1.2  3.2  Uganda Communications Commission (UCC)………………………………………………………………………………………………..3  Initiatives ...............................................................................................................

Words: 3997 - Pages: 16

Premium Essay

The Impact of Uk Government Policies on the Public Services

...Kane Gibson BTEC level 3 Extended Diploma in Public Services (Uniforms) Unit 1 Government, Policies and the Public Service 14 January 2016 The impact of UK Government Policies on the Public Services Human rights Each UK citizen has certain rights, these include the rights to: Life, Prohibition of torture, Prohibition of slavery and forced labour, Liberty and security, A fair trial, No punishment without law, Respect for private and family life, Freedom of thought, conscience and religion, Freedom of expression, Freedom of assembly and association, Marry, Prohibition of discrimination, Protection of property, Education, Free elections, and Abolition of the death penalty. Environmental Air quality plan for reducing nitrogen dioxide (NO2) in Greater London urban area listing (UK0001) The Air quality plan is setting out what the government will be doing about improving the air quality in London as well as reduce nitrogen dioxide emissions. Another is “River Thames: application for registration of a launch” The government are setting out a registration for a powered boat to be in the river thames. The boats that are not included are Kayaks, canoes, and other non powered boats. The reason for this is to attempt reduction in emissions and other toxic wastes. All boats kept, rented, or let for hire must be registered with the Environment Agency (Inland Waterways) Order 2010 annually to calculate the amount of emissions entering the water. Affecting the military...

Words: 1814 - Pages: 8

Premium Essay

Comparision Pape

...Public Policing Versus Private Security Comparison Paper AJS/502 November 23, 2013 Public Policing Versus Private Security Comparison Paper An individual seeking employment dealing with police work has the option of either obtaining a job as a private security officer or a police officer. Many similarities and differences exist concerning the two roles of public policing and private security. How private security and police officers operate and work together among the two organizations is different, but both entities display leadership responsibilities. The influences that both organizations have on the criminal justice system would be much better if both entities would join forces and collaborate on strengthening their relationship and working toward protecting society. This paper will highlight the differences and similarities between the two roles, how the leadership differs between the two roles, and what the relationship of each role is with the criminal justice system. The paper will also draw attention to what the essential policies for each role are and identify and discuss the significance of a comprehensive security plan, and what its main components are. Differences Both private security and public security are similar in many ways, but major differences between the two entities do exist. A distortion often exists between the dissimilarities of private and public policing. The individuals who work as private security officers have a mirror...

Words: 1865 - Pages: 8

Premium Essay

Business

...University title Taking Advantage of Technological Good Name Course Tutor’s Name Date Introduction In recent years, the technology has found a place in almost all aspect of life. Its adoption has revolutionized how most individuals, institutions, and state conduct their operations using social media as a means of communication. This has consequently brought about some improvement to the individual, institution and state way of operation. E-commerce has broadened the market for organization, which in turn has improved the country’s economy and individual living standard through tax revenue and job opportunities respectively. Education has been revolutionized and now students with disabilities can study well by use of technology i.e. soundboard for students with writing disabilities and communication disorders. Students can easily find information on the internet and popularization of e-learning has enabled distant learning for those with tight schedule. Individuals can upgrade their skills and knowledge to perfect their competitiveness in the job market by browsing for new ideas on the social media. Policies are now available for citizens and through the state website, it is easy to follow up on new and amended policies mad by the government. State proceedings are also in the public domain, and these helps to enhance transparency and build public trust. Technological a can be channeled to improve the livelihood of the people in the community, challenge their brains and remove...

Words: 2090 - Pages: 9

Free Essay

Case Study 4 Cipa

...are enforcing a policy of Internet safety that includes measures to block or filter Internet access for both minors and adults to certain visual depictions. The relevant authority with responsibility for administration of the eligible school or library must certify the status of its compliance for the purpose of CIPA in order to receive USF support. CIPA requirements are: technology protection measure, internet safety policy, and public notice and hearing. A technology protection measure (Internet filtering software) is a specific technology that block of filters access. It must protect against access by adults and minors to visual depictions that are obscene, child pornography, or with respect to use of computers with Internet access by minors, harmful to minors. For schools, the policy must include monitoring the online activities of minors. Internet safety policy must address: access by minors to inappropriate matter on the Internet and World Wide Web, the safety and security of minors when using electronic mail and other forms of direct electronic communications unauthorized access including hacking and other unlawful activities by minors online, and measures designed to restrict minors’ access to materials harmful to minors. The authority with responsibility for administration of the school or library must provide reasonable public notice and hold at least one public hearing to address a proposed technology protection measure and Internet safety policy. For the purpose...

Words: 545 - Pages: 3