Week 3 Develop Prohibited Use of ISP

Get perfect grades by consistently using our affordable writing services. Place your order and get a quality paper today. Take advantage of our current 20% discount by using the coupon code GET20


Order a Similar Paper Order a Different Paper

You are the Information Security Officer of Mahtmarg Manufacturing a small manufacturing company worth approximately $5 Million who provides fiber cable to local businesses, individual customers and to government organizations. In the course of the next eight weeks you will be creating your Information Security Plan (Issue-Specific Security Policy in Table 4-3 of the textbook) step by step using this scenario.

Your Task

Step 3: Develop the Prohibited Use section of your ISP

In this week’s Lab you will develop the section on Prohibited Use of your company’s information system (IS) in the Information Security Plan to include:

  • Prohibition of illegal conduct
  • System and Network Activity restrictions
    • Copyright infringement
    • Proprietary information disclosure
    • Unauthorized use for personal business
    • Malicious programs
    • Account disclosure
  • Email and Communication Activity restrictions
    • Unsolicited emails
    • Harassment
    • Chain letters
    • Spam
  • Blogging and Social Media Activity restrictions
    • Representation of the company on blogs or social media
    • Separation of personal and professional comments

Have your paper completed by a writing expert today and enjoy posting excellent grades. Place your order in a very easy process. It will take you less than 5 minutes. Click one of the buttons below.


Order a Similar Paper Order a Different Paper