Thursday, May 9, 2019
Bogart A Case in Point Essay Example | Topics and Well Written Essays - 500 words
Bogart A Case in Point - Essay exemplification1. Review and evaluate corporate policies and procedures on the use of both computer hardw ar and software and countersink the need to revise and amend areas that need focus, especially involving the use of critical information programs and systems. Policies in recruiting upstart IT personnel must likewise be strengthened in terms of background checking for past work experiences, qualifications and credentials. 2. De fool and implement a code of discipline complete with sanctions for violations of policies. Appropriate sanctions for employees found to violate much(prenominal) policies should range from reprimand, warning, suspension, expulsion to outright firing, as required. 3. The current status of computer hardware and software systems at Bogart need to be protected in terms of confidentiality clauses and current employees directly using these systems must sign an official agreement that they abide by the policy of secrecy and con fidentiality, otherwise, the sanctions indicated in the Code of Discipline, should be rigorously enforced. 4. Categorize the computer hardware and software systems in terms of crucial importance to the organization. Those identified super classified should only be used by pass and trusted personnel whose trust has been gained by senior management through with(predicate) lengths of service within the company. If there are critical workloads that need to be finished at defined time frames, everything must be done within the premises of Bogart to balk loopholes and to prevent compromising privacy and confidentiality. 7. Enforce strict monitoring and control of all computer resources through regular check-ups or audits to determine if there is any security breach at any points in time, or in any critical programs. Bogart could also incorporate it their policy the need to rotate authorized employees handling of critical programs to serve as a check and counter-check mechanism. 8. Ext ernal audits must be plan aside from the in-house monitoring and control to ensure that programs are not compromised, tampered, or breached. Outside IT personnel who are constantly updated on the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment