Revised Acceptable Use Policy
43643Project 1 Start Here
It is important for students to understand a range of organizational policies and the impact of policy content from multiple perspectives in order to create fair, legal, equitable, and ethical policies that support organizational goals. Analysis of personal privacy issues related to various personal and business-related cybersecurity scenarios is pertinent in order to manage cybersecurity risks.
In this project, you will analyze three different types of policies—acceptable use policy, Internet use policy, and a retail/commercial company privacy policy—that you have retrieved from an organization such as Facebook (or another company with which you are affiliated). You will identify the issues in the policies that you think employees/consumers/individuals should be concerned about. You will rewrite two to three sections that may be in question, providing justification for your suggested modifications. Relate the questionable content to a recent issue in the news about cybersecurity. By the end of the course, you will experience and learn the value of drafting and the importance of implementing policies in organizations not only from the company’s viewpoint but from the customer/user perspectives.
This is the first of six sequential projects. There are eight steps in this project. Begin by reviewing the project scenario, and then proceed to Step 1.
Project Scenario
After introducing yourself as the newly hired cybersecurity analyst, you look around the conference table at the others in your meeting. This multidisciplinary policy development team includes employees from HR, IT, finance and legal. After introductions are complete, Brian, an attorney from the legal department, begins to speak: “Upper management has tasked this team with reviewing the Internet usage policy, acceptable usage policy, and privacy policy. These are the types of policies that we encounter when we are required to sign or click the ‘I Agree’ box as we turn on our business computers or purchase software.”
Brian continues, “We will each need to consider our perspectives and roles on this team throughout the policy development process. We need to balance the writing of the revised policies from the standpoint of the customer and/or user while considering business goals.
“This also means that we will each need to keep in mind aspects such as protecting corporate data, ensuring customer privacy, corporate due diligence, and legal or regulatory compliance respective to our areas of expertise.”
Brian turns to you and says, “Since these three policies are focused on cybersecurity, you will conduct the initial review. Begin by evaluating and rewriting each policy. Then prepare a cover letter summarizing the justifications, including your written evaluation. Please have this ready for our next meeting one week from today.”
When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.
1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.
1.5: Use sentence structure appropriate to the task, message and audience.
2.4: Consider and analyze information in context to the issue or problem.
7.3: Evaluate enterprise cybersecurity policy.
Step 1: Review Assigned Organization
Step 1: Explore the Cybersecurity Policy Process
Before you begin revising the policies assigned to you, you will need to understand the cybersecurity policy process. First, explore a fictional scenario of Insider Data Sabotage for an example of the ill effects of improper or nonexistent policies. Then read about cybersecurity policies to learn about policies, procedures, and standards as well as how these policies impact the various roles and responsibilities throughout the organization. Finally, explore the process of policy creation to guide you through your assignment.
Step 2: Explore the Components of a Proper Policy
After your exploration of the cybersecurity policy process in the previous step, you are ready to study the requisite policy components of a well-written and implementable policy that will facilitate compliance. Take note of these components as you will apply them to your own policy revisions in the later steps.
Step 3: Identify Evaluation Criteria or Performance Measures
Now that you have identified the components of a proper cybersecurity policy, you will need to identify policy evaluation criteria for the cybersecurity policy. Refer to applicable government and industry cybersecurity standards. In some cases, you may need to consider criminal or civil liability issues, and thus evaluation criteria may emanate from the judicial guidance. You will apply these criteria to your own policy revisions in the later steps.
Step 4: Rewrite the Current Acceptable Use Policy
In the first three steps, you reviewed the process of creating security policies, reviewed components of a proper policy, and identified evaluation criteria to measure against existing policies. Now you are ready to analyze and revise your own organization’s policies. Such analysis is likely to be qualitative for some aspects, quantitative for other aspects, and a hybrid for still other aspects of the policy. As such, your choice of measures and analytical techniques must be reasonable and justifiable.
Begin reviewing and updating the first of three security policies for your own organization. Review your organization’s current acceptable use policy. Determine what changes are necessary and note your suggested changes on the Policy Changes Matrix. Rewrite two to three sections of the acceptable use policy that may be in question and provide justification for your suggested modifications.
The new policy and the Policy Changes Matrix will be attached to the final deliverable in Step 8. Submit the new policy and table for feedback.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.