cybersecurity policies, management homework help

User Generated

GhgbeEvtug

Business Finance

Description

write a paper describing the following three IT related policies explaining how they relate to employees. Your bpaper must contain the following:

  • Executive Summary
  • “Approval Drafts” for
    • Acceptable Use Policy for Information Technology (2page)
    • Bring Your Own Device Policy( 2pages)
    • Digital Media Sanitization, Reuse, & Destruction Policy (2 page)
As you write your policies, make sure that you address security issues using standard cybersecurity terminology

. APA format

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Kindly find the completed work, let me know in case of anything.

Running Head: CYBERSECURITY POLICIES

1

Cybersecurity Policies
Name
Institution
Course Code and Name
Date of Submission

CYBERSECURITY POLICIES

Executive Summary
As a component of the authoritative mission, the organization procures, creates, and
maintains computers, computer frameworks, and systems. These Information Technology (IT)
resources are intended for organization related purposes, including immediate and roundabout
support of the organization's guideline, research and administration missions; organization
managerial functions; and the free trade of thoughts inside the organization community and
among the organization community and the more extensive neighborhood, national, and world
communities. This paper will explore three cybersecurity policies and how they relate to
employees, namely acceptable use policy for information technology, bring your own device
policy (BYOD) and finally digital media sanitization, reuse, & destruction policy.
This policies apply to all users of organization IT resources, regardless of whether
partnered with the organization or not and to all employments of those resources, whether on
grounds or from remote areas. This policies might be altered as considered suitable by the
Organization. Users are urged to occasionally survey the policy as posted on the organization's
homepage.
Acceptable Use Policy for Information Technology
The computing resources at an Organization bolster the learning, instructional,
investigate, and authoritative exercises of the Organization and the utilization of these resources
is a benefit that is reached out to individuals from the given community. As a client of these
administrations and offices, you have admittance to significant Organization resources, to
sensitive information, and to an interior and external systems. Therefore, it is critical for you to
carry on in a mindful, moral, and legitimate way.

2

CYBERSECURITY POLICIES

3

By and large, acceptable use means regarding the rights of computer users, the
uprightness of the physical offices and all germane permit and authoritative understandings. On
the off chance that an individual is observed to be infringing upon the Acceptable Use Policy, the
Organization will take a disciplinary move, including the confinement and conceivable loss of
system benefits. A genuine infringement could bring about more genuine results, up to and
including suspension or end from the Organization. People are likewise s...


Anonymous
Great! Studypool always delivers quality work.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags