Policy Revision Evaluation
Create two page MEMO or cover letter summarizing the justification for your suggested modifications or explanation on the policy changes matrix done on the file.
Policy Revision Evaluation
To:
From:
Subject: Policy Revision Evaluation
Justification for Acceptable Use of Policy for Employee Technology
Target has heavily invested in technology, which means they face a considerable risk associated with possible cyberattacks. As a result, policy utilization is a plausible approach that will make employees accountable for data protection and how they use technology in their daily practice. Since employees cannot be prevented from accessing the internet at work, they must align with the policy, thus protecting the organization’s data. It is critical to note that hackers can use devices like employee smartphones to access the Target database (Tucker et al., 2017). On the other hand, employees have rights, such as access to the internet and social media during their free time, which cannot be restricted. Policy implementation bridges this gap by ensuring workers understand how hackers and regulations can use them. They should align when it comes to internet use.
Implementing the policy in technology use among the employees will be an attempt to protect Target’s reputation. In case of a data breach emanating from technology use, the business will increase its chances of facing legal implications from customers. The financial essence will be high from the court process, and compensating the affected individuals if Target is found guilty will be very high. In addition, it will be wasted from the court proceedings. The worst risk will be Target’s reputation, which will be ruined. Customers will fear that the company cannot protect their information, and they will shift their loyalty to competitors (Tucker et al., 2017). Losing customers will affect the financial position of the business. These adverse implications can be avoided with policy use, which will ensure that all data protection rules are implemented.
Computer, Internet, and Email Usage Policy
The policy will outline the acceptable use of technology in the workplace for communication purposes. Employees have access to different devices at Target, and rather than using them for work purposes, they are likely to shift their focus, get into social media, and start browsing or other uses, such as streaming movies while at work (Tucker et al., 2017). However, with policy use, employees will be restricted from using the available technology. The policy will enforce specific applications of technology In Target. These will be for work purposes alone while using the proper measures to protect company sensitive information.
Privacy Policy
Introducing policy application will be a way of abiding by federal and state regulations in regards to data privacy and security. Target needs to be aware of rules they need to follow in the business as this is critical in protecting from possible lawsuits. Federal laws require companies to ensure the privacy and security of information in their applications. These regulations are meant to oversee the proper use of technology for business purposes (Tucker et al., 2017). Additionally, the policy will inform Target employees of the unacceptable use of technology. Employees may be unaware of when and how to use technology, and a lack of knowledge may risk the patients. However, with available knowledge, avoiding the implications of the wrong use of technology is possible.
Overall, implementing policy use at Target is critical as it defines how employees should use and not use technology. The policy will enforce existing regulations such as technology for communication purposes and access to the internet and individual social media sites. Additionally, the policy will protect Target against possible cybersecurity attacks (Tucker et al., 2017). There will be security measures that all the staff members will adhere to as they will make a difference in protecting sensitive data. Therefore, the policy is paramount in safeguarding Target against all implications of adverse technology use.
Name
Signature
Reference
Tucker, C.S., Burrows, M., Lesniak, k., &Klein, S. (2017, September). Cybersecurity policies and their impact on dynamic data-driven application systems. In 2017 IEEE 2nd International Workshops on Foundations and Applications of Self *Systems (FAS*W) (pp.363-365). IEEE.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.