Computer sciences and Information technology

Information Systems Use Security Policy

Project description
Write a paper of 500-1,000 words (double-spaced) based on the information provided below. Briefly explain some of the issues that a company may face as it experiences

growth and begins to address the proper use of its information systems.
Since you are responsible for IT Services and want to keep the systems and network functioning effectively, you will want to identify activities which would be

permitted and which activities would be prohibited. Management will take your policy suggestions, finalize the policy and it will be provided to the employees.

Scenario:
Sunshine Machine Works has expanded its infrastructure. When they started there were just three computers, and ten employees. Now there are over 100 employees and

their network will have fifty computer terminals, with two servers. During the expansion there has been a lot of discussion about the need for a written computer use

policy.

Role:
You are the IT Services manager for Sunshine Machine Works. This company has seen rapid growth. Management is looking to you to provide a critical input for an

Information Systems Use Security Policy. Although they have a format they can use for the policy, they are looking to you to provide some guidance on areas they will

need to address when creating this policy.

Key Players:
Chief Executive Officer Wilma Stone
When we first started this company there were only a few computers that we used to share our files. Now, with the growth of our company we have a situation where we

need to centralize our file storage. I am concerned that if we are not careful, some proprietary information could be compromised. We need a good information systems

use policy in place. Keep in mind that I am also looking at expanding our business into some oil field work and the standards we will be required to comply with

dictate that we have a written policy in place.

Chief Financial Officer Margie Nelson
There are a lot of spreadsheets which have our account information on them. There is restricted access so that the only ones to access those files are the CEO, the

General Manager, and me. No other employees have access to most of them. When they need access to financial data, I am contacted and provide them with the feedback

they request. I hope that we are able to keep this system running efficiently and any policy helps enhance the safeguarding of our financial data.

General Manager Gary Thomas
I look at the way we need to do business now, which entails a lot of online collaboration with our vendors, customers, and activities related to our potential sales

outreach. I need to have our staff utilize our computing resources with maximum efficiency; however, I want to balance this with the realization our staff may need to

check their personal email accounts, bank information, etc. As our file server has arrived and all file storage has been centralized, we need to look at how we secure

our network while keeping productivity up.

PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET AN AMAZING DISCOUNT 🙂

© 2020 customphdthesis.com. All Rights Reserved. | Disclaimer: for assistance purposes only. These custom papers should be used with proper reference.