This means that the internet would be much less than it is today The internet

This means that the internet would be much less than

This preview shows page 9 - 13 out of 13 pages.

from purchases to licensing, entertainment and advertising which is part of marketing. This means that the internet would be much less than it is today. The internet usage policies The internet use policy provides guidelines of performing various activities over the internet. This varies with organizations and regions so the main aim is to prevent abuse of the resource by users ( Peltier, 2016) . The policy may offer guidelines but the main problem is that there are not punitive measures that can scare away people from misuse and this means that the level of protection is low.
Image of page 9
ISOL 5 INFORMATION SECURITY RISK MANAGEMENT 10 External device use policy External device use policy on the other hand prevents users from unauthorized transfer of data from the central network of an organization. This means that one cannot use a storage device to copy data from a work computer ( Siponen, Mahmood & Pahnila, 2014) . This protects personal information from leaking and the level of security is reasonably higher than that of internet use policy. Employee identity policy Employee identity policy is so far one of the important measures in protecting client data because only the authorized personnel are granted access at a time meaning that if anything happens during their time then they would be liable for the breach. The fear of being persecuted would definitely make employees adhere to the privacy policy and not perform any un authorized activities concerning data and credit card security ( Peltier, 2016) . Computer use policy Computer use policy is just a guideline in an organization which outlines the functions of the available computers and gives guidelines on the functions allowed and the ones not allowed ( Siponen, Mahmood & Pahnila, 2014) . Here may be very little security in this because guidelines do not attract any serious punishments and therefore cannot completely guarantee data security. Conclusion Having looked at the various issues discussed here, it is important to note that this topic is very expansive and may have more to talk about, but the specific points touched on are the most essential ones which will help in understanding the issues of discussion and equipping the reader with relaxant ideas to understand the topic. Cyber law is also a very dynamic topic which keeps
Image of page 10
ISOL 5 INFORMATION SECURITY RISK MANAGEMENT 11 changing with the change in technological trends making it important to keep on doing research to get the latest information regarding existing trends and policies. Lastly, it is also important to note that policies apply differently in different countries and regions based on the laws and requirements of each one of them so these policies discussed are specifically based on the American market and may vary with other places of operation.
Image of page 11
ISOL 5 INFORMATION SECURITY RISK MANAGEMENT 12 Reference Abulafia, D., & Cohen, E. (2016). U.S. Patent No. 9,305,230 . Washington, DC: U.S. Patent and Trademark Office.
Image of page 12
Image of page 13

You've reached the end of your free preview.

Want to read all 13 pages?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture