Develop the section on prohibited use of your companys


Security Operations

W3 Lab: "Prohibited Use"

Overview:

You are the Information Security Officer of Mahtmarg Manufacturing a small manufacturing company worth approximately $5 Million who provides fiber cable to local businesses, individual customers and to government organizations.

In the course of the next eight weeks you will be creating your Information Security Plan (Issue-Specific Security Policy in Table 4-3 of the textbook) step by step using this scenario.

Your Task

Step 3: Develop the Prohibited Use section of your ISP

In this week's Lab you will develop the section on Prohibited Use of your company's information system (IS) in the Information Security Plan to include:

Prohibition of illegal conduct

System and Network Activity restrictions

Copyright infringement

Proprietary information disclosure

Unauthorized use for personal business

Malicious programs

Account disclosure

Email and Communication Activity restrictions

Unsolicited emails

Harassment

Chain letters

Spam

Blogging and Social Media Activity restrictions

Representation of the company on blogs or social media

Separation of personal and professional comments

Solution Preview :

Prepared by a verified Expert
Dissertation: Develop the section on prohibited use of your companys
Reference No:- TGS02382766

Now Priced at $30 (50% Discount)

Recommended (94%)

Rated (4.6/5)