Information Security and Ethics
Assignment
Taking care of information falls to those who own the information to develop ethical guidelines about how to manage it. Treating sensitive corporate information as a valuable resource is good management. Building a corporate culture based on ethical principles that employees can understand and implement is responsible management. Organizations should develop written policies establishing employee guidelines, procedures, and organizational rules for information.
Epolicies typically include: Ethical computer use policy, Information privacy policy, Acceptable use policy, email privacy policy, Internet use policy, and Anti-spam policy.
Assignment
In this assignment you are expected to read the required readings listed in the background material and at least one other elective reading.
When you complete the readings, write a 4-5 pages paper addressing the topic:
“Policies and procedures that organizations should implement to protect themselves”
In your paper, be sure to include:
•What are security policies or e-policies?
•Explain three security policies that you would primarily recommend to an organization to have and why?
•How security policies should be implemented in organizations?
Comments from Support Team: Information Security and Ethics
Required Reading
Stewart, J.Mi. (2010) 10 Essential Security Polices. Global Knowledge.
Available at
http://www.isaca.org/Groups/Professional-English/information-secuirty-management/GroupDocuments/GK_10%20Essential%20Security%20Policies%202010.pdf
Tiwary, D. K. (2011). Security and Ethical Issues in IT: an
Organization’s Perspective. International Journal of Enterprise
Computing and Business Systems, 1(2). Retrieved from
http://www.ijecbs.com/July2011/45.pdf
Electronic Access: epolicies. Retrieved from http://www.lbm-engine.com/messagelabs/MessageLabs_ePolicy_Guidebook.pdf
Optional Reading
Internet Security. Encyclopedia of Business 2nd. ed. Retrieved from
http://www.referenceforbusiness.com/small/Inc-Mail/Internet-Security.html#b
Moore, A. P., & Shimeall, T. J. (2007). Protecting Against Insider
Threat. Retrieved from
http://www.sei.cmu.edu/library/abstracts/news-at-sei/securitymatters200702.cfm
http://www.epolicyinstitute.com/
Any other material you find relevant to the topic
Last Completed Projects
| topic title | academic level | Writer | delivered |
|---|
jQuery(document).ready(function($) { var currentPage = 1; // Initialize current page
function reloadLatestPosts() { // Perform AJAX request $.ajax({ url: lpr_ajax.ajax_url, type: 'post', data: { action: 'lpr_get_latest_posts', paged: currentPage // Send current page number to server }, success: function(response) { // Clear existing content of the container $('#lpr-posts-container').empty();
// Append new posts and fade in $('#lpr-posts-container').append(response).hide().fadeIn('slow');
// Increment current page for next pagination currentPage++; }, error: function(xhr, status, error) { console.error('AJAX request error:', error); } }); }
// Initially load latest posts reloadLatestPosts();
// Example of subsequent reloads setInterval(function() { reloadLatestPosts(); }, 7000); // Reload every 7 seconds });

