Crafting an Organization-Wide Security Management Policy for
Acceptable Use
Instructions
1. Answer each question thoroughly.
2. Include your full name as a header.
3. Do not copy and paste information from the Internet, you will receive a zero for this assignment.
4. You may research information from the Internet and rewrite it in your own words (acceptable).
5. Do not copy another student work. The University of the has a strict policy relating to cheating. Think before you act!
6. Provide your answers as outline below. Each answer should be on a separate page.
7. Assessment: 25 points for each question. Please research and explain your answers. Do not type one or two sentences and expect to receive full credit. And please do not include meaningless words.
8. .
Lab 1: Questions
1. What are three risks and threats of the User Domain?
2. Why do organizations have acceptable use policies (AUPs)?
3. Can Internet use and e-mail use policies be covered in an acceptable use policy?
4. Do compliance laws, such as the Health Insurance Portability and Accountability Act (HIPAA) or GLBA, play a role in AUP definition?
1 – Lab 1