Acceptable Use Policy for Information Technology
Acceptable Use Policy for Information Technology
Order 100% plagiarism free paper
Your Task Assignment
As a staff member supporting the CISO, you have been asked to research
what the three policies should contain and then prepare an “approval
draft” for each one. No single policy should exceed two typed pages in
length so you will need to be concise in your writing and only include
the most important elements for each policy.
The policies are to be written for EMPLOYEES and must explain employee
obligations and responsibilities. Each policy must also include the
penalties for violations of the policy and identify who is responsible
for compliance enforcement.
Your “approval drafts” will be submitted to the IT Governance Board for
discussion and vetting. If the board accepts your policies, they will
then be reviewed and critiqued by all department heads and executives
before being finalized by the Chief of Staff’s office. The policies will
also be subjected to a thorough legal review by the company’s attorneys.
Upon final approval by the Corporate Governance Board, the policies will
be adopted and placed into the Employee Handbook.
Research:
Acceptable Use Policy for Information Technology
1. Review the table of contents and relevant chapters in the Certified
Information Privacy Professional textbook to find information about
legal and regulatory drivers.
2. Review the remaining course readings.
3. Review the sample policies and procedures provided in Week 3.
4. Find additional sources which provide information about the policy
statements which should be covered in three policies for the Employee
Handbook.
Write:
1. Prepare briefing package with approval drafts of the three IT related
policies for the Employee Handbook. Your briefing package must contain
the following:
• Executive Summary
• “Approval Drafts” for
o Acceptable Use Policy for Information Technology
o Bring Your Own Device Policy
o Digital Media Sanitization, Reuse, & Destruction Policy
As you write your policies, make sure that you address security issues
using standard cybersecurity terminology (e.g. 5 Pillars of IA, 5
Pillars of Information Security). See the resources listed under Course
Resources > Cybersecurity Concepts Review for definitions and terminology.
2. Use a professional format for your policy documents and briefing
package. A recommended format is provided in the assignment template
file (see the recommended template under Course Resources).
3. You must include a cover page with the assignment title, your name,
and the due date. Your reference list must be on a separate page at the
end of your file. These pages do not count towards the assignment’s page
count.
4. Common phrases do not require citations. If there is doubt as to
whether or not information requires attribution, provide a footnote with
publication information or use APA format citations and references.
5. You are expected to write grammatically correct English in every
assignment that you submit for grading. Do not turn in any work without
(a) using spell check, (b) using grammar check, (c) verifying that your
punctuation is correct and (d) reviewing your work for correct word
usage and correctly structured sentences and paragraphs.
6. Consult the grading rubric for specific content and formatting
requirements for this assignment.