Cybersecurity Planning And Management Creating Company Email ✓ Solved
```html
Cybersecurity Planning and Management Creating Company E-mail/
You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company. There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.
Project Plan: You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company. Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable): 1. Overview 2. Purpose 3. Scope 4. Policy 5. Policy Compliance 6. Related Standards, Policies and Processes 7. Definitions and Terms.
Paper For Above Instructions
Introduction
As the newly appointed Security Manager of a medium-sized Financial Services company in New Hampshire, it is essential to establish two comprehensive security policies regarding the use of email and the company's WIFI/Internet services. In a digital age where cyber threats are increasingly pervasive, formulating explicit guidelines will not only safeguard the company's resources but also guide employees to engage in responsible use of technology.
Email Policy
Overview: This policy establishes the framework for appropriate use of company email systems for both professional and personal communication by employees.
Purpose: The purpose of this policy is to outline acceptable use of the company’s email system to maintain a professional work environment and to protect both company assets and employees from potential cybersecurity threats.
Scope: This policy applies to all employees using the company's email system, including full-time, part-time, consultants, and contractors.
Policy: Employees should use company email primarily for business-related activities. Limited personal use is acceptable as long as it does not interfere with work responsibilities, consume significant company resources, or violate any law. Employees are prohibited from sending or receiving material that is illegal, inappropriate, offensive, or disruptive.
Policy Compliance: Employees must be aware that the company reserves the right to monitor email usage to ensure compliance with this policy. Noncompliance may result in disciplinary actions, including termination.
Related Standards, Policies, and Processes: This email policy should be read in conjunction with the company’s Code of Conduct, Internet Use Policy, and other cyber-related protocols.
Definitions and Terms: The terms "email system" refer to any company-provided email addresses and infrastructure. "Personal use" means any non-work-related communication occurring during official working hours.
WIFI/Internet Use Policy
Overview: This policy governs the appropriate use of company-provided WIFI and internet resources to support the operational needs of the organization.
Purpose: The objective of this policy is to ensure that the Internet and WIFI technology is used responsibly, maintaining the integrity of the company's data and assets while providing access to employees.
Scope: This policy applies to all employees, contractors, and third-party service providers utilizing the company's internet and WIFI facilities.
Policy: Employees shall use the company's internet primarily for professional purposes. Any personal use is allowed provided it does not disrupt activities, compromise network integrity, or undermine the company’s compliance with legal regulations. Accessing inappropriate or illegal content is strictly prohibited.
Policy Compliance: The company maintains the right to monitor and control internet usage to assess compliance with this policy. Violations may lead to consequences including suspension of access privileges or disciplinary measures up to termination.
Related Standards, Policies, and Processes: This WIFI/Internet Use Policy complements the overall security framework established by the Cybersecurity Incident Response Plan and the Acceptable Use Policy.
Definitions and Terms: "WIFI" encompasses all wireless network connections provided by the company. "Inappropriate content" refers to any material deemed offensive, illegal, or harmful to the company’s operations.
Conclusion
Establishing clear and concise policies regarding email and WIFI/Internet usage is imperative for any organization, especially in the financial services sector. Through these policies, the company aims to foster a secure digital environment, mitigate risks associated with cyber threats, and maintain employee productivity. These guidelines empower employees with the necessary information to utilize the company's resources responsibly while adhering to cybersecurity measures.
References
- Easttom, C. (2021). Cybersecurity Fundamentals. Pearson.
- Stallings, W. (2015). Network Security Essentials: Applications and Standards. Pearson.
- Conway, M. (2019). The Cybersecurity Playbook: How every leader and employee can contribute to a safer corporate world. iUniverse.
- Smith, M. (2020). Email Security: A comprehensive guide to the security of email technology. Springer.
- Shinder, D. (2018). The Network Security Test Lab. Elsevier.
- Heiser, J. (2020). Cybersecurity and Risk Management: The Role of Business Leaders. Wiley.
- Marek, P. (2019). Building a Successful Cybersecurity Program: A Guide for Small to Medium-Sized Enterprises. Syngress.
- Rouse, M. (2021). Acceptable Use Policy (AUP). TechTarget.
- Duncan, R. (2018). Cybersecurity and the Modern Workplace. Harvard Business Review Press.
- Raghavan, S. (2021). Writing Security Policies: A Guide to Effective Documentation. Wiley.
```