infotech import in strat plan

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a very brief computer and internet security policy for the organization that covers the following areas:

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Computer and email acceptable use policy

Internet acceptable use policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

Include at least 3 scholarly references in addition to the course textbook. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Your paper should meet the following requirements:

• Be approximately 2-4 pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations

3/15/2020 Originality Report

https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=b74c9ab2-d4d0-4184-8aa6-ab9b28… 1/

3

%67

SafeAssign Originality Report
Spring 2020 – InfoTech Import in Strat Plan (ITS-831-30) – Full Term • Week 10 Research Paper: Develop a Computer/Internet Security P…

%67Total Score: High riskSravan Reddy Sirigi
Submission UUID: 829210cb-6707-3286-38e7-5c6045194af0

Total Number of Reports

1

Highest Match

67 %
Policy x

Average Match

67 %
Submitted on

03/15/20
11:29 AM MST

Average Word Count

757
Highest: Policy x

%67Attachment 1

Institutional database (5)

Student paper

Student paper

Student paper

Student paper Student paper

Top sources (3)

Excluded sources (0)

View Originality Report – Old Design

Word Count: 757
Policy x

3

2 1

5

4

3 Student paper 2 Student paper 1 Student paper

https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport?attemptId=b74c9ab2-d4d0-4184-8aa6-ab9b2832eb4a&course_id=_113954_1&download=true&includeDeleted=true&print=true&force=true

3/15/2020 Originality Report

https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=b74c9ab2-d4d0-4184-8aa6-ab9b28… 2/3

Source Matches (15)

Student paper 100%

Student paper 100%

Student paper 76%

Running Head: POLICY 1

POLICY 2

POLICY

Uinversity of Cumberland’s

Sravan Reddy Sirigi

Computer and email acceptable use policy

Employees are not permitted to share passwords with anyone. Moreover, they should not attempt to guess other user’s passwords. Everyone in the company is
responsible for the effective use of equipment and assets allocated to them, such as computers, software, hardware, and network address. Each employee is
answerable to the organization for the usage of the assets. Everyone in the firm should make an effort to secure and safeguard their PINs and assets from
unapproved personnel. The software, as well as hardware, should be configured in a way that prevents unauthorized people from gaining access to the network
and computer resources. Employees are not allowed to try to access constrained shares of the system, safety software, and managerial applications. Employees
are allowed to send personal emails and conduct similar activities at their own time, (Weidman & Grossklags, 2019). Emails should be appropriate, accurate, and
they should not subject the organization to any potential liability. The IS department has the right to delete the password of the worker for any reason, including
when the employee does not remember the password and has to reset or check the email if necessary. The company’s resources should not be used to
download or access any material that can be seen as offensive, disruptive, insulting, or cause harm. Messages that can be developed to bully, harass or
discriminate others based on their sex, age, race, background, sexual orientation, national origin, color, gender identity, ethnicity, physical disability, political
affiliation, marital status and mental disability that is protected by the state and federal law, (Robinson, 2019). Email attachments from an unknown sender
should be deleted immediately without opening because it could be a virus sent to the computer. If the attachment seems suspicious, report it to the IS
department. Internet acceptable use policy

Computer equipment and internet access are owned by employers. They have to be used in accordance with the policies. Workers are not allowed to

access dating sites, gaming, Facebook, and any file sharing, (Policy, 2018). Misuse of the internet will lead to disciplinary actions such as immediate dismissal.
Internet access is managed and controlled through user passwords and accounts, and it should be kept private and confidential. In addition, department
managers are responsible for identifying the network access level for employees in their department. User names and passwords should be given to the
management. If the employee believes that the password has been compromised, he or she should inform the management immediately. The management
shall then reset the password and confirm the user name, (O’Byrne, 2019). The worker shall then be informed of the changes made. When a person is

fired, the management will inform the IT department and the department manager to ensure the removal of the user’s access to emails and internet resources.
This is an essential measure to protect and safeguard the integrity of the employer’s resources. Employees are only allowed to use the internet to carry out
work-related activities such as discussion groups, chat sessions, newsgroups, and webinars. Any other internet users should comply with the federal and
provincial laws, and it should not violate other policies, (Armshaw, 2020). The unacceptable and inappropriate use of the internet includes usage for illegal
purposes like fraud, defamation, copyright infringement, libel, harassment, stalking, spamming, gambling, intimidation, sending viruses, and impersonation.
Watching videos or downloading files that interfere with the performance of the internet is not allowed. Employees are not allowed to engage in activities that
can bring ligations, discredit, and disrepute to the organization. Engaging in online commercial activities and offering products is not allowed. Reference

Armshaw, R. (2020). ICT ACCEPTABLE USE POLICY. Policy. Retrieved from

https://pdfs.semanticscholar.org/9ce5/305a2c4d0d224fcd4a1efb6b68733eaf294f O’Byrne, W. I. (2019). Acceptable Use Policies. The International

Encyclopedia of Media Literacy, 1-6. Retrieved from https://onlinelibrary.wiley.com/doi/abs/10.1002/9781118978238.ieml0001 Policy, I. A. U. (2018).

Acceptable Use Policy-Learners and Staff General Statement. Policy. Retrieved from http://www.draperspyrgo.com/PAGES/documents/18AUGICT Robinson,
E. (2019). The panoptic principle: privacy and surveillance in the public library as evidenced in the acceptable use policy (Doctoral dissertation, University of

Strathclyde). Retrieved from https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.793495 Weidman, J., & Grossklags, J. (2019). The acceptable state: an

analysis of the current state of acceptable use policies in academic institutions. ECIS. Retrieved from

https://fluencycdn2.fluencycms.co.uk/FileCluster/SwanwickHall/MainFolder/documents/Policies/ICT-Acceptable-Use_autumn-2018

1

2

3
3
3

4

5

3
2 1
3
1
2
1
Student paper

Computer and email acceptable use
policy

Original source

Computer and Email acceptable use
policy

2
Student paper

Internet acceptable use policy

Original source
Internet acceptable use policy
3
Student paper

Workers are not allowed to access
dating sites, gaming, Facebook, and any
file sharing, (Policy, 2018). Misuse of the
internet will lead to disciplinary actions
such as immediate dismissal. Internet
access is managed and controlled
through user passwords and accounts,
and it should be kept private and
confidential. In addition, department
managers are responsible for
identifying the network access level for
employees in their department.

Original source

Facebook, dating sites, gaming, and file-
sharing of any kind are not allowed
Misuse of the internet will result in
disciplinary actions that can include
immediate dismissal, (Team, 2016)
Internet access is controlled and
managed via user accounts and
passwords that should be kept
confidential Department managers are
responsible for recommending and
identifying network access levels for the
workers in their department

3/15/2020 Originality Report

https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=b74c9ab2-d4d0-4184-8aa6-ab9b28… 3/3

Student paper 82%

Student paper 74%

Student paper 82%

Student paper 77%

Student paper 100%

Student paper 80%

Student paper 100%

Student paper 95%

Student paper 100%

Student paper 93%

Student paper 100%
Student paper 100%
3
Student paper

User names and passwords should be
given to the management. If the
employee believes that the password
has been compromised, he or she
should inform the management
immediately. The management shall
then reset the password and confirm
the user name, (O’Byrne, 2019).

Original source

All passwords and user names should
be given to the management If the
worker believes that their password
has been compromised, they should
inform the management right away The
management shall confirm the user
name and reset the password

3
Student paper

When a person is fired, the
management will inform the IT
department and the department
manager to ensure the removal of the
user’s access to emails and internet
resources. This is an essential measure
to protect and safeguard the integrity
of the employer’s resources. Employees
are only allowed to use the internet to
carry out work-related activities such as
discussion groups, chat sessions,
newsgroups, and webinars. Any other
internet users should comply with the
federal and provincial laws, and it
should not violate other policies,
(Armshaw, 2020).

Original source

When the employment is terminated,
the management will inform the
department and IT department to
ensure the removal of the worker’s
access to internet resources and
emails, (Robinson, 2019) This is an
important measure to protect the
integrity and safety of the employer’s
resources Workers are only allowed to
use the internet to carry out work-
related activities Moreover, internet
usage should comply with provincial
and federal laws, and it should not
violate other policies

3
Student paper

The unacceptable and inappropriate
use of the internet includes usage for
illegal purposes like fraud, defamation,
copyright infringement, libel,
harassment, stalking, spamming,
gambling, intimidation, sending viruses,
and impersonation. Watching videos or
downloading files that interfere with
the performance of the internet is not
allowed.

Original source

The inappropriate and unacceptable
use of the internet includes usage for
illegal purposes such as defamation,
fraud, harassment, libel, stalking,
gambling, spamming, sending viruses,
intimidation, impersonation, and
copyrighting infringement, (O’Byrne,
2019) Downloading large files or
watching videos that affect the
performance of the network is not
allowed

3
Student paper

Engaging in online commercial activities
and offering products is not allowed.

Original source

Engaging in online commercial activities
by offering products and services is
prohibited

4
Student paper

ICT ACCEPTABLE USE POLICY.

Original source

ICT ACCEPTABLE USE POLICY

5
Student paper

Retrieved from
https://pdfs.semanticscholar.org/9ce5/
305a2c4d0d224fcd4a1efb6b68733eaf2
94f O’Byrne, W.

Original source

https://pdfs.semanticscholar.org/9ce5/
305a2c4d0d224fcd4a1efb6b68733eaf2
94f

3
Student paper

Acceptable Use Policies. The
International Encyclopedia of Media
Literacy, 1-6.

Original source

Acceptable Use Policies The
International Encyclopedia of Media
Literacy, 1-6

2
Student paper

Retrieved from
https://onlinelibrary.wiley.com/doi/abs/
10.1002/9781118978238.ieml0001

Policy, I.

Original source
Retrieved from
https://onlinelibrary.wiley.com/doi/abs/
10.1002/9781118978238.ieml0001
1
Student paper

Acceptable Use Policy-Learners and
Staff General Statement.

Original source

Acceptable Use Policy-Learners and
Staff General Statement

3
Student paper

The panoptic principle: privacy and
surveillance in the public library as
evidenced in the acceptable use policy
(Doctoral dissertation, University of
Strathclyde). Retrieved from
https://ethos.bl.uk/OrderDetails.do?
uin=uk.bl.ethos.793495 Weidman, J., &
Grossklags, J.

Original source

The panoptic principle privacy and
surveillance in the public library as
evidenced in the acceptable use policy
(Doctoral dissertation, University of
Strathclyde)
https://ethos.bl.uk/OrderDetails.do?
uin=uk.bl.ethos.793495

1
Student paper

The acceptable state: an analysis of the
current state of acceptable use policies
in academic institutions.

Original source

The acceptable state an analysis of the
current state of acceptable use policies
in academic institutions

2
Student paper

Retrieved from
https://fluencycdn2.fluencycms.co.uk/Fi
leCluster/SwanwickHall/MainFolder/doc
uments/Policies/ICT-Acceptable-
Use_autumn-2018

Original source
Retrieved from
https://fluencycdn2.fluencycms.co.uk/Fi
leCluster/SwanwickHall/MainFolder/doc
uments/Policies/ICT-Acceptable-
Use_autumn-2018

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.

Order your essay today and save 30% with the discount code ESSAYHELP