W3 Lab: "Prohibited Use"
You are the Information Security Officer of Mahtmarg Manufacturing a small manufacturing company worth approximately $5 Million who provides fiber cable to local businesses, individual customers and to government organizations. In the course of the next eight weeks you will be creating your Information Security Plan (Issue-Specific Security Policy in Table 4-3 of the textbook) step by step using this scenario.
Step 3: Develop the Prohibited Use section of your ISP
In this week’s Lab you will develop the section on Prohibited Use of your company’s information system (IS) in the Information Security Plan to include:
Prohibition of illegal conduct
System and Network Activity restrictions
Proprietary information disclosure
Unauthorized use for personal business
Email and Communication Activity restrictions
Blogging and Social Media Activity restrictions
Representation of the company on blogs or social media
Separation of personal and professional comments
- This solution has not purchased yet.
- Submitted On 23 Jul, 2017 04:55:29