ITM_309_Exam_Two_Review

ITM_309_Exam_Two_Review - ITM 309 Fall, 2011 Exam Two...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Ç…ITM 309 Fall, 2011 Exam Two Topics: Review Outline - November 2, 2011 Ethics and Information Security – Chapter 4 Business Ethics BW: Ethics 101 for Interns Information Management Policies Organizations strive to build a corporate culture based on ethical principles that employees can understand and implement. E-Policies typically include: o Ethical computer use policy o Information privacy policy o Acceptable use policy(AUP) o Email privacy policy o Social media policy o Workplace monitoring policy Security Management Planning and Lines of Defense An information security plan details how an organization will implement the information security policies. The best way a company can safeguard itself from people is by implementing and communicating its information security plan. The first line of defense—People o Organizations must enable employees, customers, and partners to access information electronically. o
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 5

ITM_309_Exam_Two_Review - ITM 309 Fall, 2011 Exam Two...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online