Create two separate policies on use of email and wifi

Assignment Help Management Information Sys
Reference no: EM132190622

Creating Company E-mail and WIFI / Internet Use Policies

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshireand have been asked to write two new security policies for this company.

The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview

2. Purpose

3. Scope

4. Policy

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

Reference no: EM132190622

Questions Cloud

Where can an organization place the information security : What is the typical size of the security staff in a small organization? A medium-sized organization? A large organization? A very large organization?
Discuss about product functionality and product design : BM350 Take a position: Product functionality is the key to brand success versus product design is the key to brand success.
Research in the area of information security awareness : Write a paper summarizing research in the area of Information security awareness.
What are the critical systems that sony organizations depend : What are the critical systems, networks, and data that Sony organizations depend on to achieve their business goals? List them.
Create two separate policies on use of email and wifi : Create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.
Nursing conceptual model and a nursing theory : Discuss the difference between a nursing conceptual model and a nursing theory - How has nursing practice evolved over time? Discuss the key leaders
Determine the storage requirements for your data : This week for your project assignment, you will need to determine the storage requirements for your data.
Conversion of existing traditional network : Conversion to a Virtual Network Organizations that move to virtualized environments has typically done so through conversion of an existing traditional network.
Develop graphic rating scale for retail sales associate : Develop a Graphic Rating Scale for a retail sales associate and a fast-food restaurant manager.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Construct a table that summarizes your swot analysis

Write a 2-page executive summary outlining the one or two IT vendors that you recommend engaging for further acquisition activities.

  Develop test plan training plan and maintenance methodology

Develop test plan, training plan, and maintenance methodology for SanGrafix, a video game design company. Each test and maintenance methodology should include a method for testing applications, operating systems, network connectivity, speed, load ..

  The most common transmission medium is the twisted pairthe

the most common transmission medium is the twisted pairthe most common transmission medium is the twisted pair. in 125

  Prepare a position statement

Prepare a position statement - How can you market this position, online, to help increase sales?

  Information systems ituneswe are currently learning

information systems ituneswe are currently learning information systems and itunes is used as an example.1 who should

  Discuss about the virtualization and cloud computing

Examine the benefits and possible problems for these organizations when it comes to cloud computing.

  Create a list of information security vulnerabilities

The CEO of your selected organization has requested an enterprise security plan from your team. The first step to developing an enterprise security plan is to identify the specific vulnerabilities and related risks facing an organization. This lis..

  Explain the importance of developing a systems and data plan

Explain the importance of developing a systems and data plan for an organization. What are the risks if you don't have those plans? You may utilize examples from your own organization or an organization you are familiar with to illustrate your an..

  What is the change in length of the cylinder

Find the average shear stress in the bolt shown in the figure. Assume that the bolt's radius is 0.75" and it's subjected to a tensile force, F = 10 kips.

  What are the positions both sides are taking

Which side do you believe has the strongest argument and why? Support your argument with what you have learned about some of the legal principles involved.

  Describe the data breach incident and the primary causes

The National Institute of Standards and Technology (NIST) provides an extensive amount of information, resources, and guidance on IT and information security.

  How well they would protect patient data from theft

Consider the scenario that you are working as an IT Director for a hospital considering the selection of a web-based electronic health record (EHR) system.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd