Description
Learning Objectives and Outcomes
- Explore policy creation and enforcement actions.
- Describe policy monitoring and enforcement strategies.
Scenario
Imagine you work for a Department of Defense (DoD) organization with direct ties to the U.S. government. You are a supplier of military products. Your organization has three different levels of management, and of those levels two different unions exist. The majority of your staff is in a non-supervisory union. Your organization had approximately 7,000 workers, which are located across the United States in 35 locations. You also have contractors.
You have developed an Internet use policy along with a physical access policy and implemented them. You must modify these policies as soon as possible because of a recent security breach that exposed flaws in both policies.
Assignment Requirements
Describe a policy monitoring and enforcement strategy for your organization. Identify and describe the legal implications of ISS policy enforcement after the modified policies are adapted.
Required Resources
None
Submission Requirements
- Format: Microsoft Word
- Font: Arial, 12-Point, Double-Space
- Citation Style: Your school’s preferred style guide
- Length: 1–2 pages
Self-Assessment Checklist
- I wrote an academic paper.
- I described a policy monitoring and enforcement strategy for the organization.
- I identified and described the legal implications of ISS policy enforcement after the modified policies are adapted.
Explanation & Answer
Hello,Attached find is the completed work. I did a thorough research on the question and hopefully I attained the correct answer. Have a look at it and let me know how you feel about it.NOTE: Please consider releasing the money once you have reviewed the work.Thanks and all the best👍
Running head: POLICY MONITORING
1
Policy Monitoring
Name
Institutional Affiliation
POLICY MONITORING
2
Policy Monitoring
Introduction
Security should always be our number priority and the main reason for this is
because it is the only way of ensuring that our information, network, assets, and
organization as a whole is secured at all time especially in this day and age where the
internet and the advancement of technology has become part of our day to day
activities (Harris et al., 2018). Policy is one of the most effective methods of ensuring
that everyone in the organization has...