Prohibited Use’

Security OperationsW3xc2xa0Lab:xc2xa0″Prohibited Use”Overview:xe2x80xa8You are the Information Security Officer of Mahtmarg Manufacturing a small manufacturing company worth approximately $5 Million who provides fiber cable to local businesses, individual customers and to government organizations. In the course of the next eight weeks you will be creating your Information Security Plan (Issue-Specific Security Policy in Table 4-3 of the textbook) step by step using this scenario.Your Taskxe2x80xa8Step 3: Develop the Prohibited Use section of your ISPIn this weekxe2x80x99s Lab you will develop the section on Prohibited Use of your companyxe2x80x99s information system (IS) in the Information Security Plan to include:Prohibition of illegal conductSystem and Network Activity restrictionsCopyright infringementProprietary information disclosureUnauthorized use for personal businessMalicious programsAccount disclosureEmail and Communication Activity restrictionsUnsolicited emailsHarassmentChain lettersSpamBlogging and Social Media Activity restrictionsRepresentation of the company on blogs or social mediaSeparation of personal and professional comments ‘

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply