Stop your investigation and notify law enforcement

Assignment Help Basic Computer Science
Reference no: EM13995048

With the expansion of the SilverPhase I.T. infrastructure, support responsibilities have increased as well. To help keep your job manageable, you need to start defining limits for your users. One of these is the Acceptable Usage Policy. It defines what is and is not appropriate use of company I.T. resources. It usually ties in with your company's code of conduct and even has legal consequences.

The Fourth Amendment of the U.S. Constitution protects against unreasonable search and seizure and by default extends to computers used for business, even if the computers are owned by the company. So if, for example, you suspect that one of your users has inappropriate content on their work computer, you can't search their files without a warrant.

BUT......If your company has a documented code of conduct that includes appropriate I.T. usage policies AND your employees have read and acknowledged this policy, then the Fourth Amendment no longer applies to your employees in the workplace. That being said, if you find evidence of criminal activity (note that possessing pornography is not a crime), then you must immediately stop your investigation and notify law enforcement.

Write up a 1-2 page draft acceptable usage agreement for SilverPhase LLC that contains, at minimum, usage guidelines for:

Desktop PCs

File servers

Internet access

Reference no: EM13995048

Questions Cloud

Infa 630 intrusion detection and intrusion prevention : Compare and contrast signature-based and anomaly-based network intrusion detection systems. In your analysis, describe at least three ways in which the two types of IDS are similar, and at least three ways in which they differ.
What is larry''s gain or loss in 2013 : Larry buys a building in 2005 for $14 million.  He pays cash of $1 million and takes out a mortgage for $13 million.  From 2005-2012, he claims $8 million of depreciation on the building.  In 2013, when the building is worth $5 million, Larry is in d..
How benchmarks and milestones are involved in managing : Benchmarking - Analyze how benchmarks and milestones are involved in managing the use of quality indicators. Analyze three potential benchmarks and milestones from quality indicators that could be used for your plan
What is the maximum current that flows in the circuit : What is the inductance L? How long after the switch is closed does the current have the value 0.52 A? What is the maximum current that flows in this circuit?
Stop your investigation and notify law enforcement : The Fourth Amendment of the U.S. Constitution protects against unreasonable search and seizure and by default extends to computers used for business, even if the computers are owned by the company. So if, for example, you suspect that one of your..
The olive partnership makes a proportionate distribution : The Olive Partnership makes a proportionate distribution of its assets to Jerry, in complete liquidation of his partnership interest.  The distribution consists of $40,000 in cash and capital assets with a basis to the partnership of $150,000 and a f..
What is the voltage drop across the inductor : If a 9-V battery is connected to the circuit, how long would it take the current to reach 10 mA? What is the voltage drop across the inductor at this time?
Calculate the gravitational potential energy : Calculate the gravitational potential energy U of this system. Take the potential energy to be zero when the two objects are far apart. Use Fx=-dU/dx to find the magnitude and direction of the force on the particle.
Develop a profitability scenario : The most important exercise of the semester will be a group project that will consist of no less than two and no more than four group members. For those who submitted group members, your request will be honored.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Base of the number system for this civilization

Many of the artifacts contain inscriptions that appear to be mathematical, and the first to be translated (with limited away-team gear) comes out as the equation

  Implements a wireless network

Describe the security threats that a company will face when it implements a wireless network. Assume that the company occupies the six middle floors in a 12- story office building that is located in a downtown business area between two other building..

  The design pattern capability is built into the ide

Review the Design Patterns you have learned this module (CRC Cards and Sun Blue Print Designs.) Use the Internet to find at least two other design patterns. What are the advantages and disadvantages of each? What happens when the design patter..

  Integration testing plan and test cases

Testing is a critical phase of implementation. For this project, you will create a test plan for your proposed system based on your system design

  Declare array, inventory, of components of type partstype

Assume that you have the following definition of a struct. struct partsType { string partName; int partNum; double price; int quantitiesInStock; }; Declare an array, inventory, of 100 components of type partsType.

  Design a simple network monitoring system

In this assignment, you are going to design a simple network monitoring system that is suitable for a small business.

  Generate the random private key

Show that p and q are primes and q|(p ? 1) - Generate the random private key x and compute the public key y.

  Calculate the minimum distance from the start to the goal

Calculate the minimum distance from the start to the goal with passing all the checkpoints -Specification * A map consists of 5 characters as following.

  How the organisation has used is-it to address

how the organisation has used IS/IT to address and service its' market, not just on the products it provides.

  Show the design of a modulo 7 asynchronous counter

Using positive edge triggered flip flops, show the design of a modulo 7 asynchronous counter that counts: 7,6...1,7, etc. You may assume that your flip flops have asynchronous Set and Reset inputs available. (Hint: Connect Q to the clock input of the..

  Find the vector clocks of all the events

Suppose Process P1 has events e11, e12, e13, e14, e15 e16 e17 P2 has events e21, e22, e23, e24, e25, e26, P3 has events e31, e32, e33, e34, e35 e36 There are message transits from e12 to e22, e24 to e15, e21 to e32, e35 to e25.

  Flight availability request application

Define a simple Web Service in WSDL that returns flight information regarding flights of a particular flight operator, see the first question

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd