explain how you intend to implement this policy throughout this organization.}

explain how you intend to implement this policy throughout this organization.}

Consider
the following fictional organization, which needs an acceptable use policy
(AUP):

· The
organization is a regional XYZ Credit Union/Bank that has multiple branches and
locations throughout the region.

· Online
banking and use of the Internet are the bank’s strengths, given its limited
human resources.

· The
customer service department is the organization’s most critical business
function.

· The
organization wants to be in compliance with the Gramm-Leach-Bliley Act (GLBA)
and IT security best practices regarding its employees.

· The
organization wants to monitor and control use of the Internet by implementing
content filtering.

· The
organization wants to eliminate personal use of organization-owned IT assets
and systems.

· The organization
wants to monitor and control use of the e-mail system by implementing e-mail
security controls.

· The
organization wants to implement this policy for all the IT assets it owns and
to incorporate this policy review into its annual security awareness training.

uNote:

The
best style for writing IT policy is straightforward and easy to understand.
Avoid “fluff,” or unnecessary wording, and phrasing that could be understood
more than one way. Write in concise, direct language.

19. Using
the following AUP template, in your Lab Report file,create an acceptable
use policy for the XYZ Credit Union/Bank organization (this should not be
longer than three pages):

XYZ
Credit Union/Bank

Policy
Name

Policy
Statement

{Insert
policy verbiage here.}

Purpose/Objectives

{Insert
the policy’s purpose as well as its objectives; include a bulleted list of the
policy definition.}

Scope

{Define
this policy’s scope and whom it covers.

Which of
the seven domains of a typical IT infrastructure are impacted?

What
elements, IT assets, or organization-owned assets are within this policy’s
scope?}

Standards

{Does
this policy point to any hardware, software, or configuration standards? If so,
list them here and explain the relationship of this policy to these standards.}

Procedures

{In this
section, explain how you intend to implement this policy throughout this
organization.}

Guidelines

{In this
section, explain any roadblocks or implementation issues that you must overcome
and how you will overcome them per the defined policy guidelines.}


Price: £ 45

100% Plagiarism Free & Custom Written, Tailored to your instructions

Leave your Comments


Can't read the image? click here to refresh