In highlight, the organization implements an acceptable use policy where technology users are requested to adhere to specific guidelines provided by the organization. The current acceptable use policy requires employees to uphold the organization’s moral, ethical, and professional code, such as the limitation to accessing pornography, affirm compliance to the federal, state, and the external mandated laws, as well contracts, licenses, and rules. Users are encouraged to avoid participating in the illegal application of technology, conform to privacy requirements, as well as adhere to the reliable use of technology resources. Users are also requested to observe code 771.10 E-mail Guidelines, 77.20 Mobile Device Guidelines, 77.30 Participation in Social Guidelines and 77.40 Web Search Guidelines. However, this is insufficient, and the following should be considered.
Rewrite of Financial and Company Resources
Ideally, the current user policy did not consider the impact of diversity at the workplace or detailed the essence of morality and ethics. The acceptable use policy is configured to protect employees first while failing to consider the relationship between employees and other section of stakeholders. The policy should consider revising and integrating a passwords policy that authenticates employees. The rewrite considers the essence of employee collaboration with other I.T administrations and other departments. The policy should consider the following
Calder (2005) believes that acceptable use policy is one surrounding organization-wide policy definitions based on the existing appropriate application of resources (p. 69). However, the question of morality surfaces in shaping to what extent an employee might agree to the policy. This encourages the need to strengthen the policy through flexibilities.
Rewrite Company Signature & Email
Furthermore, in improving the current acceptable user policy, one should consider developing the organization’s Corporate Code of Conduct and the Company Ethical Policy; both that further define the abilities and limitations of individuals. Herzig et al. (2013) believe that a reliable policy should define employee expectations for the internet facility on a computer, based on the frequency and the measured systems. The policy rewrite should consider
The company is mandated with the responsibility of disclosing possible privacy policies and user practices to employees, further guiding them on what they are expected to do to improve procedures and options of relationships. The focus should further look on alternatives of protecting information while avoiding possibilities of improper conduct.
Rewrite of Enforcement of Improper Use Penalty
Employees should be encouraged to redo the oral exam. It is important to tests natural law first, before imposing humankind law that carries with it punitive measures. In this hybrid system, the goal is to avoid the possible punitive measures that might constrain employees from achieving service delivery. Generating acceptable behavior should not be imposed but rather inspired. Employees should be encouraged to own, belief, and be responsible for the company’s growth. Employees should also be motivated to act professional, drawing both intrinsic and extrinsic interests. Under this rewrite, the following should be considered
References
Calder, A. (2005). A business guide to information security: How to protect your company’s IT assets, reduce risks and understand the law. London: Kogan Page.Herzig, T. W., Walsh, T., & Tuleya, L. G. (2013). Implementing information security in healthcare: Building a security program. Chicago, IL: Healthcare Information and Management Systems Society.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more