Prohibited Use Overview: You are the Information Security Officer of Mahtmarg M

Prohibited Use
Overview:
You are the Information Security Officer of Mahtmarg Manufacturing a small manufacturing company worth approximately $5 Million who provides fiber cable to local businesses, individual customers and to government organizations. In the course of the next eight weeks you will be creating your Information Security Plan (Issue-Specific Security Policy in Table 4-3 of the textbook) step by step using this scenario.
Your Task
Step 3: Develop the Prohibited Use section of your ISP
In this week’s Lab you will develop the section on Prohibited Use of your company’s information system (IS) in the Information Security Plan to include:
· Prohibition of illegal conduct
· System and Network Activity restrictions
o Copyright infringement
o Proprietary information disclosure
o Unauthorized use for personal business
o Malicious programs
o Account disclosure
· Email and Communication Activity restrictions
o Unsolicited emails
o Harassment
o Chain letters
o Spam
· Blogging and Social Media Activity restrictions
o Representation of the company on blogs or social media
o Separation of personal and professional comments
Table 4-3. Elements of a Typical ISSP
1 Statement of Purpose
a. Scope and Applicability
b. Definition of Technology Addressed
c. Responsibilities
2 Authorized Uses
a. User Access
b. Fair and Responsible Use
c. Protection of Privacy
3 Prohibited Uses
a. Disruptive Use or Misuse
b. Criminal Use
c. Offensive or Harassing Materials
d. Copyrighted, Licensed, or Other Intellectual Property
e. Other Restrictions
4 Systems Management
a. Management of Stored Materials
b. Employer Monitoring
c. Virus Protection
d. Physical Security
e. Encryption
5 Violations of Policy
a. Procedures for Reporting Violations
b. Penalties for Violations
6 Policy Review and Modification
a. Scheduled Review of Policy
b. Procedures for Modification
7 Limitations of Liability
a. Statements of Liability
b. Other Disclaimers
Source: Communications of the ACM, reprinted with permission.

The post Prohibited Use
Overview:
You are the Information Security Officer of Mahtmarg M appeared first on Course Hero.

GRAB 30% OFF ON YOUR ASSIGNMENTS NOW