Description
You are the Information Security Officer of Mahtmarg Manufacturing a small manufacturing company worth approximately $5 Million who provides fiber cable to local businesses, individual customers and to government organizations. In the course of the next eight weeks you will be creating your Information Security Plan (Issue-Specific Security Policy in Table 4-3 of the textbook) step by step using this scenario.
Your Task
Step 3: Develop the Prohibited Use section of your ISP
In this week’s Lab you will develop the section on Prohibited Use of your company’s information system (IS) in the Information Security Plan to include:
- Prohibition of illegal conduct
- System and Network Activity restrictions
- Copyright infringement
- Proprietary information disclosure
- Unauthorized use for personal business
- Malicious programs
- Account disclosure
- Email and Communication Activity restrictions
- Unsolicited emails
- Harassment
- Chain letters
- Spam
- Blogging and Social Media Activity restrictions
- Representation of the company on blogs or social media
- Separation of personal and professional comments
Explanation & Answer
Attached.
1
Developing Prohibited Use of ISP
Student name
Institutional affiliation:
2
Developing Prohibited Use of ISP
The attached word document addresses the question “Week 3 Develop Prohibited Use of ISP” as
follows:
•
•
Prohibition of illegal conduct
System and Network Activity restrictions
•
o
o
o
o
o
•
Copyright infringement
Proprietary information disclosure
Unauthorized use for personal business
Malicious programs
Account disclosure
Email and Communication Activity restrictions
•
o
o
o
o
•
Unsolicited emails
Harassment
Chain letters
Spam
Blogging and Social Media Activity restrictions
•
o
o
Representation of the company on blogs or social media
Separation of personal and professional comments
1
Running Head: Prohibited Use Section
Developing Prohibited Use of ISP
Student name
Institutional affiliation:
2
Prohibited Use Section
Developing Prohibited Use of ISP
1. Prohibition of illegal conduct
The security plans for the prohibited use section include but not limited to prohibiting
sharing of malicious codes and programs via the network or to other users suing the company’s
network; treating unauthorized extraction of information from ISP services without the submitting
a payment as fraud. Moreover, Mahtmarg Manufacturing will strictly prohibit advertising of email
address, website or using any other form of resources using the company’s ISP; and prohibiting
distribution, storage and transmission of materials cons...