Review some web sites of good policy

Assignment Help Management Information Sys
Reference no: EM131180069

READ ALL STEPS BEFORE YOU BEGIN WORKING.

Step 1: Retrieve the template Word file from the Course Materials folder. Insert your planned organization name and your name in the appropriate places.

Background:

· Throughout this course you will REPLACE the Instructions in the template with your work. You will find best practices for policies in each specific area and chose or adapt them to suite your organization.

· You have choices in some weeks where you can do one chapter OR another. Replace the instructions in the one you choose to write, remove the instructions in the other (leaving the headings behind).

· Be careful to avoid changing headings if you do not know Word - get help if you make and error without having a good copy.

· You will use this same document EVERY WEEK - adding/replacing as we go through this course.

· Highlight the section that is indented to be graded that week in RED. Failure to do this will result in your work not being graded and you will be given a 0 for the assignment.

Step 2: Review some Web sites of "good" policy examples you can use to start your research. EACH WEEK you will find examples that apply to the section we are doing. This week we focus on the firm overview - what is the firm and what are we protecting.

These include:

https://www.sans.org/resources/policies/
https://security.utexas.edu/policies/irusp
https://secure4.olemiss.edu/umpolicyopen/ShowDetails.jsp?istatPara=1&policyObjidPara=10654991

· See the "MESSI" document in the Course Materials folder for further security sources.

· REMEMBER THAT YOU NEED TO CITE TWO SOURCES and then provide REFERENCES for these two sources. You WILL need to ADD TWO NEW REFERENCES EACH WEEK - and these will need to be cited.

Step 3: Complete the following 2 sections and submit your Word document to the Module 2 drop box.

Table of Contents

This needs to be completed via Microsoft Word Table of Contents. Ensure that you know how to update the table of contents and do so as the last action before you save. Be careful to avoid changing styles in your document. By keeping a copy, you should be able to revert to the correct format.

Alternatively, choose a similar STYLE for heading1, heading2, heading3, etc. In order to insert the TOC into your document, INSERT, REFERENCE, INDEX AND TABLES, TABLE OF CONTENTS,[Reference tab in Word 2007] choose 3 or 4 levels, GO.

II: Policy Objectives Complete the following sections only and leave the other sections (E, F, and G) blank (remove the instructions under the headings).

· Introduction paragraph
· Firm Overview (about 350-500 words)
· Statement of Purpose
· Policy Statement
· Policy Audience

Reference no: EM131180069

Questions Cloud

Result in an increase in the budget deficit : Suppose policy makers pass a budget that result in an increase in the budget deficit. Also assume that this fiscal policy action results in a reduction in the saving rate. To what extent will this reduction in the saving rate because permanent change..
High level of data integrity : A well-maintained relational DBMS has a high level of data integrity. What  features of a relational DBMS contribute towards this level of integrity?
Future plans to harvest the business : Ask a local family business owner about future plans to harvest the business. Has the owner ever been involved in a harvest?
Carrying charges rather than risk lost profits on stock out : Cake is a product of the Chester Company. Chester's sales forecast for Cake is 1,439 in the Americas region. Chester wants to have an extra 10% on hand above their forecasted units in case sales are better than expected. (They would risk the possibil..
Review some web sites of good policy : Review some Web sites of "good" policy examples you can use to start your research. EACH WEEK you will find examples that apply to the section we are doing. This week we focus on the firm overview - what is the firm and what are we protecting.
Designing effective physical security : Outline three parameters that should be considered when designing and implementing physical security into the information protection scheme. Suggest two activities that could be performed to address these parameters and explain how.
Complete the flow net by drawing the suitable equipotential : The upstream velocity is 6.5 m/s. Estimate the drag force and the lift force acting on the plate. Indicate clearly the sign convention. You may have to draw more streamline and equipotentials to obtain a good accuracy
Impact person ability to achieve specific financial goal : Illness can dramatically impact a person’s ability to achieve a specific financial goal. An aging society and health treatments and pharmaceuticals that extend lifespans increase the likelihood that many people will enter long-term care facilities fo..
What you can find out about the event on the internet : Search a business magazine to identify a firm that has Successfully completed an initial public offering SIP.% See what you can find out about the event on the Internet.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Description of the purpose of prototyping

A description of the purpose of prototyping within the example in the chosen article CSU requires that students use the APA style for papers and projects. Therefore, the APA rules for formatting, quoting, paraphrasing, citing, and listing of sourc..

  Which aspects or areas of a project plan are more likely to

which aspects or areas of a project plan are more likely to be affected by risk responses? how do risk responses affect

  What is the business of zappos

Why did it make sense for Amazon to acquire Zappos? What expertise in terms of information management and the use of IT did Amazon bring to the game that might improve Zappos' eCommerce competitiveness?

  List the three boolean operators the lionsearch accepts

List the three Boolean operators the LionSearch accepts and describe the operation each performs. Explain the difference between the query "information systems" and information systems

  Challenges of using an hris in a large organization

What are the benefits and challenges of using an HRIS in a large organization?

  Research report describing sap key erp systems

A description of each ERP - a list and description of each associated models - Write a research report describing SAP key ERP systems

  Demonstrate how you create a user using powershell

You will need to create the user accounts and groups for the organization. Below are the users. Demonstrate how you create a user using Powershell. This must be done using the most efficient method

  Inventory management solution setdescribe vendor managed

inventory management solution setdescribe vendor managed inventory. what are the pros and cons of a vendor managed

  Use of information technologyexplain how the use of

use of information technologyexplain how the use of information technology can make things worse if it is applied to a

  Risk management strategy and plan document shell

Risk Management Strategy and Plan Document Shell

  Create a table that shows how the access quality and cost

Create a table that shows how the access, quality, and cost of health care are influenced by the low-income, middle-income, and high-income status of an economy

  What type of disaster plan should this organization have

Identify a health care facility in your area (Maryland preferred). What type of disaster plan should this organization have in place? What are three specific events that an HIM professional should prepare to prevent

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd