Group Activity 6 , 10398 Chenique Van Der Westhuizen.docx -...

This preview shows page 1 - 6 out of 22 pages.

6/2/202110398Group Activity6Chenique Van Der Westhuizen
Table of ContentsDevelop your own policies assuming that the organization you are working for isa small private university or college. Consider the 10 steps to a successfulsecurity policy within an organization. The below link will take you to the 10steps to a successful security policy......................................................................2The following information is relevant to:...............................................................3The Policy..............................................................................................................4Personal Information..............................................................................................5Server Malware Protection.....................................................................................6Backup Procedures................................................................................................7Workstation Security..............................................................................................8Protective Measures...............................................................................................9Unacceptable Use................................................................................................10Obtaining access.................................................................................................11Responsibilities of Students.................................................................................14Departed Students...............................................................................................15The following education records will be kept:......................................................16Students disk quotas...........................................................................................17To finish, you will have to explain how your organization policies will differ fromUniversity Johannesburg (UJ) policies in terms of computer and internet usage. 18Bibliography.........................................................................................................21
Develop your own policies assuming that theorganization you are working for is a small privateuniversity or college. Consider the 10 steps to asuccessful security policy within an organization. Thebelow link will take you to the 10 steps to a successfulsecurity policyPurposeThis Policy's goal is to keep information belonging to the University and its users(third parties, clients or customers, and the general public) safe and secure. Theprinciples guiding the holding, use, and disposal of information are outlined inthis policy for the University's personnel, students, and other individuals whohave access to University facilities.Unauthorized access or misuse of information will be prevented.Information confidentiality will be protected.Information integrity will be protected.Information/information systems availability is maintained for servicedelivery.Processes for business continuity planning will be maintained.All regulatory, contractual, and legal obligations will be met.Security shall be maintained in terms of physical, logical, environmental,and communications.Violations of this Policy could result in disciplinary action or criminalcharges.When information is no longer useful, it is appropriately disposed away.
The following information is relevant to:Electronic information systems owned by the University (software,computers, and peripherals), whether deployed or accessible on or offcampus.Either directly or indirectly, the University's computer network is used.The University owns the hardware, software, and data.Materials made of paper.Electronic tape recorders (video, audio, CCTV systems).
The PolicyAuthorised users will take reasonable steps to protect University information intheir possession. Information that is confidential, personal, or private should notbe copied or moved without first considering:The authorization of the information ownerThe dangers of loss or falling into the wrong handsHow the data will be protected during transfer and once it arrives at itsdestination.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 22 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
NoProfessor
Tags
University Johannesburg

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture