Free Essay

Policies Guidelines That Describe Acceptable

In:

Submitted By jdorsetdorcett
Words 438
Pages 2
Policies guidelines that describe acceptable and unaccepted employee behaviors in a workplace function as organizational laws. It complete with penalties, judicial practices, and sanctions to require compliance. In a company policies function as laws, they must be crafted and implemented with the same care to ensure that they are complete, appropriate, and fairly applied to everyone in the workplace. You must know the difference between policies and laws. Policy must meet the following five criteria. Dissemination, Review, Comprehension, Compliance, Uniform enforcement. Dissemination is distribution, the organization must be able to demonstrate that the relevant policy has been made readily available for review by the employee. Most common distribution techniques hard copy and electronic distribution. Review is the organization must be able to demonstrate the document in an intelligible form, including version for illiterate, non-English reading, and reading impaired employees. Comprehension is the organization must able to demonstrate that the employee understood the requirements and content of the policy. Compliance is the organization must be able to demonstrate that the employee agreed to comply with the policy through act or affirmation. Uniform enforcement is when the organization must be able to demonstrate that the policy has been uniformly enforced, regardless of employee status or assignment. There a lots laws when you working for and IT Company. Civil law is a nation or state that deal with relationships and conflict between organization entities and people. Criminal law is conduct harmful to society and is enforced by the state. Next you have a public law regulates the structure and administration of government agencies and their relationships with citizens, employees, and other governments. The United State has been the leader in the development and implementation of information security legislation to prevent misuse and exploitation of information and information technology. Then you have General Computer Crime Laws, which is several key laws relevant to the field of information security. The Computer Fraud and Abuse Act of 1986 is the cornerstone of many computer related federal laws and enforcement efforts. In October 1996 by the National Information Infrastructure Protection Act of 1996. Which was modified several sections of the previous act and increased the penalties for selected crimes. The punishment for some offense prosecuted under this statute can varies from fines to imprisonment up 20 years. Also you have USA PATRIOT Act, which provides law enforcement agencies with broader latitude in order to combat terrorism related activities. One of the hottest topics in information security is Privacy. A lot of organization are collecting, swapping, and selling personal information as commodity, and many people are looking to government for protection of their privacy.

Similar Documents

Premium Essay

Information Systems Mid Term Study Questions

...individual data being gathered, stored, and sold. Should businesses be allowed to gather as much as they want? Should individuals have more control over their data that are gathered? 

  4.     Describe the five technology drivers of the infrastructure evolution. Which do you think has been the most influential in helping us achieve the level of technology we enjoy today? 

  5.     Use your imagination and come up with ideas of how your organization or company can use a wireless network. What current processes will you have to change to incorporate your idea? 

  6.     Discuss the elements of a good security policy that every business should have. The elements of a good security policy that every business should cover are acceptable use, user authorization, and authorization management systems. The security policy should include statements ranking information risks, identify acceptable security goals, and identify mechanisms for achieving the goals. The policy should describe who generates and controls information, what existing security policies are in place to protect information, what level of risk is management willing to accept for each asset, and estimates of how much it will cost to achieve an acceptable level of risk. * Acceptable Use Policy: defines acceptable uses of the company’s information resources and computing equipment, networks, telephone, and associated resources....

Words: 652 - Pages: 3

Premium Essay

Acceptable Use Policy Breakdown

...Introduction - A general description and scope of the contents of the policy. #Acceptable Use Policy This policy is used to establish a culture of trust and integrity amongst the employees and users of the network. The acceptable use policy should contain an overview, purpose, scope, general use & ownership and un-acceptable use sub-sections. Email Policy The policy defines standards for conducting communications within the corperate network email system. These standards minimize the potential exposure to the company from unsolicited email messages and attachments. The email policy should contain a purpose and enforcement sub-sections. Anti-Virus Policy The policy defines standards for protecting the company’s network from any threat related to maleware Identity Policy The policy defines rules and practices for protecting the corporate network from unauthorized access. The Identity policy identifies who each user is and what resources they are allowed to access. The identity policy should contain sub-sections on purpose, employee training, visitors (i.e.temps, contractors and consultants,) and prohibited practices. Password Policy Passwords are an important aspect of netwok security. They are the front line of protection for user accounts. The password policy should contain sub-sections on purpose, scope, policies, guidelines and enforcement. Encryption Policy This policy provides guidance so that encryption efforts will use only those algorithms...

Words: 476 - Pages: 2

Premium Essay

Is4550 Week 1 Lab

...------------------------------------------------- Week 1 Laboratory Part 1: Craft an Organization-Wide Security Management Policy for Acceptable Use Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Define the scope of an acceptable use policy as it relates to the User Domain * Identify the key elements of acceptable use within an organization as part of an overall security management framework * Align an acceptable use policy with the organization’s goals for compliance * Mitigate the common risks and threats caused by users within the User Domain with the implementation of an acceptable use policy (AUP) * Draft an acceptable use policy (AUP) in accordance with the policy framework definition incorporating a policy statement, standards, procedures, and guidelines Part 1 – Craft an Organization-Wide Security Management Policy for Acceptable Use Worksheet Overview In this hands-on lab, you are to create an organization-wide acceptable use policy (AUP) that follows a recent compliance law for a mock organization. Here is your scenario: * Regional ABC Credit union/bank with multiple branches and locations thrrxampexoughout the region * Online banking and use of the Internet is a strength of your bank given limited human resources * The customer service department is the most critical business function/operation for the organization * The organization wants to...

Words: 639 - Pages: 3

Free Essay

A Ban of Facebook Between Students and Teachers

...teachers and students to be "friends" on Facebook and most other online networking sites will remain in place under an updated social media policy the School Committee is slated to take up Tuesday. Meanwhile, an accompanying new acceptable-use policy will expand guidelines for ways that students, staff and other school employees may use the Internet in city school. The revamped policies are going to be designed to be more current with today's technology and social media/Internet practices. "Some teachers have had a great deal of success engaging students through electronic means and we want to accommodate that success where possible", said School Committee member LaDonna Crow. Many other area school districts are in the process of updating policies covering online networking, including Belchertown, Hampshire Regional, Northampton and Pioneer Valley Performing Arts Charter Public School. In the Hadley schools, a policy adopted in April prohibited teachers and students from being "friends" on social networking sites other than those approved by the district. Easthampton's social media policy takes a similar approach, stating that school staff may not list current students as "friends" on networking sites unless the sites are hosted or approved by the school district. The previous ban referred only to teachers. The proposed policy stated that all "e-contacts with students" should be made through the district's computer and telephone system, except for emergency situations...

Words: 416 - Pages: 2

Premium Essay

Security Plan

...Important Disclaimer: The Aerospace Industries Association of America, Inc. (“AIA”) has no intellectual property or other interest in this Aerospace Industry Guideline for Developing a Security Plan for Unclassified Data. By developing this Aerospace Industry Guideline for Developing a Security Plan for Unclassified Data Plan and making it freely available to anyone, AIA assumes no responsibility for this Guideline’s content or use, and disclaims any potential liability associated therewith. Executive Overview From time to time an AIA member company may be requested to provide the DOD, a prime contractor or an industry partner an Information Technology Security Plan for unclassified data. This security plan could be required at the enterprise, program or application level depending on the unique requirements of the request. This request might be challenging for those members that have never been required to provide such a document. This “Aerospace Industry Guideline for Developing a Security Plan for Unclassified Data” provides a template and guidance to assist member companies in the development of a security plan to meet their customers or partners needs. Please keep in mind that this document is provided as a guideline and not a mandatory standard. AII member companies are encouraged to use this guideline. Use of this industry-wide best practice will provide the following benefits: 1. Simplify development of the security plan by the provider to meet...

Words: 2097 - Pages: 9

Free Essay

Intro to Comuter Security 3

...define socially acceptable behaviors. 2. Civil law comprises a wide variety of laws that govern a nation or state and deal with the relationships and conflicts between organizational entities and people. 3. Criminal, administrative, and constitutional law. 4. National information infrastructure protection act of 1996, modified several sections of the pervious act and increased the penalties for selected crimes. 5. Security and freedom through encryption act of 1997. 6. In this context is not absolute freedom from obeservation, but rather is a more precise "state of being free from us sanctioned intrusion." 7. health insurance portability and accountability act of 1996, requires organizations to use information security mechanisms,a swell as policies and procedures. 8. Gramm-Leach-Bliley Act of 1999; requires due notice to customers, so they can request that their information not be shared with third party organizations. 9. Provides law enforcement agencies with broader latitude in order to combat terrorism-related activities. 10. No electronic theft act 11. IP is the ideas of controls over the tangible or virtual representation of those ideas. It is afforded the same protection in al the countries. The US and Europe contributed The Digital Millennium Copyright Act. 12. Enforces accountability for executives at publicly traded companies. 13. When a organization makes sure that ever employee knows what is acceptable or unacceptable...

Words: 353 - Pages: 2

Premium Essay

Security Policy Template

...SECURITY POLICY TEMPLATE A security policy is the essential basis on which an effective and comprehensive security program can be developed. This critical component is the primary way in which the agency security plan is translated into specific, measurable, and testable goals and objectives. The security policies developed must establish a consistent notion of what is and what is not permitted with respect to control of access to your information resources. They must bond with the business, technical, legal, and regulatory environment of your agency. The following is a recommended outline of the components and characteristics of a security policy template. A sample Acceptable Use Policy using this outline is attached for your reference as Appendix A. Section 1 – Introduction: A purpose should be stated in the introduction section. This should provide the reader with a brief description of what this policy will state and why it is needed. The security stance of your agency should be stated here. Section 2 – Roles and Responsibilities: It is important that the policy detail the specific responsibilities of each identifiable user population, including management, employees and residual parties. Section 3 – Policy Directives: This section describes the specifics of the security policy. It should provide sufficient information to guide the development and implementation of guidelines and specific security procedures. Section 4 – Enforcement, Auditing...

Words: 321 - Pages: 2

Premium Essay

Policy Info

...SECURITY POLICY TEMPLATE A security policy is the essential basis on which an effective and comprehensive security program can be developed. This critical component is the primary way in which the agency security plan is translated into specific, measurable, and testable goals and objectives. The security policies developed must establish a consistent notion of what is and what is not permitted with respect to control of access to your information resources. They must bond with the business, technical, legal, and regulatory environment of your agency. The following is a recommended outline of the components and characteristics of a security policy template. A sample Acceptable Use Policy using this outline is attached for your reference as Appendix A. Section 1 – Introduction: A purpose should be stated in the introduction section. This should provide the reader with a brief description of what this policy will state and why it is needed. The security stance of your agency should be stated here. Section 2 – Roles and Responsibilities: It is important that the policy detail the specific responsibilities of each identifiable user population, including management, employees and residual parties. Section 3 – Policy Directives: This section describes the specifics of the security policy. It should provide sufficient information to guide the development and implementation of guidelines and specific security procedures. Section 4 – Enforcement, Auditing...

Words: 321 - Pages: 2

Premium Essay

Hcs 440 Week 2 Learning Team Literature Search

...Strategies in Decision Making contains a solution on following task: "Decisions in Paradise Case Analysis Project Plan. Submit the following: 1) Summary of Case 2) Company selected 3) Action Plan, e.g. who and how will this paper be researched and written. UMUC CMIT 425 Security Policy Project Using the GDI Case Study, complete the Security Policy Document. Provide a seven- to ten-page analysis summarizing the security policy to the executive management team of GDI. The summary should effectively describe the security policy in a manner that will allow the Senior Management to understand the organizational security requirements and make the appropriate decisions to enforce. Guidelines · Using the GDI Case Study, create the security policy document. · The security policy document must be 7 to 10 pages long, conforming to APA standards. See "Writing Guideline" in WebTycho where you'll find help on writing for research projects. · At least three authoritative, outside references are required (anonymous authors or web pages are not acceptable). These should be listed on the last page titled "References." · Appropriate citations are required. See the syllabus regarding plagiarism policies. · This will be graded on quality of research topic, quality of paper information, use of citations, grammar and sentence structure, and creativity. · The paper is due during Week 7 of this course. Background For those that are not familiar with the term, this project...

Words: 362 - Pages: 2

Premium Essay

Title Is Awesome

...IS 471 Policy Development and Security Issues Lab 4 (Due October 22, 2014) Introduction In any company, a security policy helps to mitigate the risks and threats the business encounters. However, unless a company happens to be in the information security industry, the task of identifying, assessing, and categorizing the myriad of risks can be an overwhelming one. Thankfully, a company’s IT infrastructure can be divided in a logical manner to more easily sort the risks. These divisions are the seven IT domains. The purpose of the seven domains of a typical IT infrastructure is to help organize the roles, responsibilities, and accountabilities for risk management and risk mitigation. In this lab, you will identify known risks, threats, and vulnerabilities, and you will determine which domain of a typical IT infrastructure is affected. You will then discuss security policies to address each identified risk and threat within the seven domains of a typical IT infrastructure. You will next determine which appropriate security policy definition will help mitigate the identified risk, threat, or vulnerability. You will organize your results into a framework that can become part of a layered security strategy. Learning Objectives Upon completing this lab, you will be able to: •     Identify risks, threats, and vulnerabilities commonly found in the seven domains of a typical IT infrastructure.      Determine which domain is impacted by the risk, threat, or vulnerability.      Determine...

Words: 1159 - Pages: 5

Premium Essay

Cyp 3.7 1.2

...2.1 Describe the benefits of healthy eating for children A healthy diet and regular physical activity can balance energy, sharpen the mind and improve children’s mood- allowing children to greaten their potential both inside and outside the setting. 2.2 Describe the possible consequences of an unhealthy diet There an many ways unhealthy diets can affect children. 5 of these are: Behaviour- Children may suffer from problems of a attention deficiency or hyperactivity disorders. Children tend to become tired and very irritable if the diet doesn’t have enough of the 3 main requirements; carbs, fats and proteins. Mental development- This often slow down when children have a door diet. This is not noticed early but with symptoms like delayed speech, delayed coordination and slow learning patterns. Dental- Poor dental health is a common problem that comes with a poor diet. The...

Words: 1492 - Pages: 6

Premium Essay

Ethics

...interrelated nature of ethics, morality, legal responsibility, and social issues. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Boylan, M. (2009). Basic ethics: Basic ethics in action (2nd ed.). Upper Saddle River, NJ: Pearson. Trevino, L. K. & Nelson, K. A. (2007). Managing business ethics: Straight talk about how to do it right (4th ed.). Hoboken, NJ: John Wiley & Sons. All electronic materials are available on the student website. |Week One: Ethical and Moral Perspectives | | |Details |Due |Points | |Objectives |Describe the difference between ethics and morality. |...

Words: 2493 - Pages: 10

Free Essay

Performance Management

...It also can damage the effectiveness of a business. first step is to develop a written policy together with my mangers with in full consultation with the employees. The process of the policy development is as important as the policy statement itself. Joint work between employees and mangers helps to show what causes unwanted behavior, involving employees leads to to develops trust and confidence between employees and mangers. Policy awareness: policy awareness can help employees increase awareness of individual responsibilities. familiarity and understanding of acceptable behavior. recognition of continued commitment by senior management. Training: the success of dealing with the unwanted behavior initiative depends on a planned and systematic education and training program. The content of training programs must fit the needs of employees. Knowledge: explain the type of behaviors marked as unwanted behaviors. Describe what is reasonable and what is unreasonable behavior. Skill: how to recognize bad behavior. How to solve it quickly. Promoting healthy workplace environments: tensions can happen in any job, and in healthy organizational cultures those tensions can viewed as a good thing because it help change the working environment as needed. Mangers play an important role in implementing the rules against the unwanted behaviors. Guidelines for mangers to deal with unwanted behaviors: approach the employee directly before it can effect...

Words: 308 - Pages: 2

Premium Essay

Lot Task2

...Joseph W Costa LOT2 Task 2 5/24/2013 Best Practices in Prevention of DoS/DDoS Attacks This guide is meant to describe best practices for the detection and prevention of denial of service attacks, such as the event that recently occurred at the university. It was determined that based on current security guidelines and current controls in place, the university was still severely vulnerable from an internal aspect and all identified gaps need to be addressed and resolved. Each control described below will provide a more in depth look at the overall strategy of how a network should be protected but still allow for the functionality that is required to maintain normal operations. Know the Signs of an Attack An essential part of network security is knowing what the characteristics of an attack are, so they can be countered or prevented. When the university suffered an overwhelming internal DDoS attack, it required administrators to reevaluate its security guidelines based on what was known about the attack. As seen at the time of attack, certain characteristics were: Network performance unusually slow Website was unavailable for at least 24 hours Thousands of bogus HTTP packets sent to internal web server Taking these factors into account, it can be safe to say it was an actual attack rather than just legitimate network usage. Now that it is known what such an event would look like, identifying similar attacks in the future will be much easier and may allow...

Words: 1264 - Pages: 6

Premium Essay

Service Operations

...Q1. Describe the GOI environment policy towards service industry. Ans1- Environmental issues in Service Sector and their respective guidelines: Sr No | Issue | Guideline Ref | Key Notes | 1 | Biomedical Waste | Bio-Medical Waste (Management and Handling) Rules, 1998. | Apply to all persons who generate, collect, receive, store, transport, treat, dispose, or handle bio medical waste in any form | 2 | Air Pollution | The Air (Prevention and Control of Pollution) Act 1981 | An Act to provide for the prevention, control and abatement of air pollution-Concurrent Subject | 3 | E Waste | E Waste (M&H) Rules, 2011 | Applies to Every producer, Consumer or Bulk Consumer involved in the manufacture, sale , purchase, and processing of electrical and electronic equipment or components except Batteries, MSMEs, & Radioactive Wastes | 4 | Solid Waste (Paper, Glass etc) | Solid Waste Management Rules 2015 | Guidelines on Handling and Management for Solid Waste generated (Segregation, disposal etc) | 5 | Waste Water | The Water (Prevention and Control of Pollution) Rules, 1975. | Rules and Guidelines...

Words: 745 - Pages: 3