What policies should be implemented for the handling of data

Assignment Help Management Information Sys
Reference no: EM131413188

Assignment

Security in the work place is a major concern businesses must address to protect company data. In addition, to automated security, it is also the company's responsibility to implement policies and procedures for the handling of data by company personnel. Students will research risks and threats to digital data and develop security policies all company personnel must be trained on and be held accountable to protect company data.

Assignment Steps

Resources:

• Internet search engine such as Google, Yahoo!, or Bing.
• MicrosoftWord 2016

o Click the "File" tab, then "New" to search for Microsoft Word Memo Templates

• Microsoft Office 365, Office 2016: Introductory: Module 1: Creating, Formatting, and Editing a Word Document with a Picture

Part 1

Develop a 700-1,000 word summary describing the challenges businesses have in securing data in today's technological environment:

• Include risks and threats of company data.

• What policies/procedures should be implemented for the handling of data ensure data protection and business continuity?

Use the following features of Microsoft Word in your summary:

• A Microsoft Word STANDARD template.

• Either a bulleted or numbered list of the new security policies/procedures, and bold or changed font color so this list is highly visible.

• Highlight the effective date so it stands out.

• Insert an image that is relevant to the memo content. Images must also be cited and referenced.

Save as a Microsoft Word document saved under the following format: Lastname_Course#_W2.doc. (Remember the "_" as they are part of the file name.

Format your assignment consistent with APA guidelines.

Part 2

Search online for a Microsoft memo template.

Develop a 175-word memo that uses a genuine Microsoft Word memo template announcing the new security policies to all employees taking effect in one month following mandatory training.

Create an eye-catching memo that is clear and to the point concerning the new security policies. APA formatting is not required for this part of the assignment.

Format your assignment consistent with APA guidelines.

Reference no: EM131413188

Questions Cloud

Do you think the age of imperialism benefited most people : As a period of expansion and exploration, do you think the Age of Imperialism benefited most people in the world, overall? Why or why not? Use specific examples of why you think it did or why you think it did not
Analyze and provide evidence from validation studies : Analyze and provide evidence from validation studies supporting and opposing the use of specific instruments with your assigned population. Present the pros and cons of individual versus group assessment of ability
Conduct online research of a struggling company : Conduct online research of a struggling company (Best Buy, Blockbuster Video). What might thier barriers be to successful planning in the organization?
Does lincoln deserve credit as the great emancipator : Does Lincoln deserve credit as "the Great Emancipator"? Why or why not?
What policies should be implemented for the handling of data : What policies/procedures should be implemented for the handling of data ensure data protection and business continuity?
Which theoretical basis you are most drawn to and why : Your areas of greatest confidence and areas of opportunity when you think about leading counseling groups. Which theoretical basis you are most drawn to and why. Types of groups you might enjoy leading in your future career as a counselor
What is a focus group : What is a focus group? When do businesses utilize a focus group? How do focus groups help a business with their product/service?
What are your thoughts and feelings about working : What are your thoughts and feelings about working with mandated group participants? Describe fully. How would you approach counseling differently with them than with voluntary participants
Compare and contrast colonial and american slavery : Compare and Contrast Colonial and American slavery. Describing the conditions, treatment, laws and punishments of slaves in each of these societies. Remember Colonial slavery consisted of British, French and Spanish slavery in America.

Reviews

Write a Review

Management Information Sys Questions & Answers

  How does implementation differ from product innovation

How does implementation differ from product innovation and process innovation? Which of the four key issues do you believe is most affected

  How can information technology support a companys

How can information technology support a companys business operation and decision making and give them compitative advantage?

  How viruses - adware and spyware would impact organization

Provide a review of the potential security issues related to the internal and external communications. Discuss how company communications policies can play an important role in the reduction of communication security risks. Include specifi..

  How did target respond to the data breach

What could have caused this data breach? How did Target respond to the data breach?

  Prepare a report on large business and network security

Research and prepare a report on large business's and network security and current trends in the area of IT Security

  Advantages and disadvantages of customized software

Advantages & Disadvantages of customized software - Show What are the advantages and disadvantages of customized software?

  Function of resources and leadership roles in it management

What is the function of resources and leadership roles in IT management? What types of software and software trends are relevant to managers?

  Briefly describe the project information

Briefly describe the project information. For example: ?Explain the objectives of the project and its importance.Explain the environment in which the project was initiated including organizational, governmental, regulatory, cultural and/or societal...

  Why do firms codify so many processes into erp systems

If continuous improvement is the key to remain competitive, then why do firms codify so many processes into enterprise resource planning (ERP) systems?

  Why any proposed process change requires cost estimating

Assess business continuity planning (BCP) as a process that adds business value. Explain the correlation between business value and project cost estimation as they relate to BCP. List and support three business justifications for business value o..

  Describe the values of the two business intelligence tools

Analyze at least two considerations that would be required to ensure effective transaction transparency of centralized database management systems and distributed database management systems. Justify your response.

  Accounting information systems

1. How are flowcharts used in accounting information systems? How are DFDs similar to flowcharts? How are they different?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd