Principles of Information Systems in Business and Organization

Information Security and Ethics

Assignment

Taking care of information falls to those who own the information to develop ethical guidelines about how to manage it. Treating sensitive corporate information as a valuable resource is good management. Building a corporate culture based on ethical principles that employees can understand and implement is responsible management. Organizations should develop written policies establishing employee guidelines, procedures, and organizational rules for information.

Epolicies typically include: Ethical computer use policy, Information privacy policy, Acceptable use policy, email privacy policy, Internet use policy, and Anti-spam policy.

Assignment

In this assignment you are expected to read the required readings listed in the background material and at least one other elective reading.

When you complete the readings, write a 4-5 pages paper addressing the topic:

“Policies and procedures that organizations should implement to protect themselves”

In your paper, be sure to include:
•What are security policies or e-policies?
•Explain three security policies that you would primarily recommend to an organization to have and why?
•How security policies should be implemented in organizations?
Comments from Support Team: Information Security and Ethics

Required Reading

Stewart, J.Mi. (2010) 10 Essential Security Polices. Global Knowledge.
Available at
http://www.isaca.org/Groups/Professional-English/information-secuirty-management/GroupDocuments/GK_10%20Essential%20Security%20Policies%202010.pdf

Tiwary, D. K. (2011). Security and Ethical Issues in IT: an
Organization’s Perspective. International Journal of Enterprise
Computing and Business Systems, 1(2). Retrieved from
http://www.ijecbs.com/July2011/45.pdf

Electronic Access: epolicies. Retrieved from http://www.lbm-engine.com/messagelabs/MessageLabs_ePolicy_Guidebook.pdf

Optional Reading

Internet Security. Encyclopedia of Business 2nd. ed. Retrieved from
http://www.referenceforbusiness.com/small/Inc-Mail/Internet-Security.html#b

Moore, A. P., & Shimeall, T. J. (2007). Protecting Against Insider
Threat. Retrieved from
http://www.sei.cmu.edu/library/abstracts/news-at-sei/securitymatters200702.cfm

http://www.epolicyinstitute.com/

Any other material you find relevant to the topic

Last Completed Projects

topic title academic level Writer delivered