Although a desirable acceptable use policy provides a set of guidelines that organization employees should integrate, most of them do not consider the auspicious role of information security development. AUP provides concise and clear approach covering key organizational development approaches. Covering these points requires the organization membership to develop comprehensive compliance and policy procedures. Despite the rising challenges, employees need to feel they are part of the organization, especially considering a lining of current acceptable policies should be changed to desirable user policies. The purpose of this change is to encourage employees to remain responsible while still adhering to the established code of conduct.
Rewrite Legal Policy Type
Employees are required to respect the moral code of conduct, with special respect to deontology, breach of the natural law invites misdemeanour charges
Employees are expected to operate within whelms of vision and mission statement, presenting new policies and procedures that remain creative.
Employees are advised that criminal sanctions can be imposed on offenders when offensive material, content or pornographic content is shared on the enterprise infrastructure.
Breach and repeated breach of the said natural or misdemeanours can translate felony if the extent of malice can be proved, based on laws such as CFAA.
The above rewrites are justified by Tim and Upton (2013) who assert that a learning organization requires employees to think of ways of remaining productive while focusing on a value system, which would help in embracing change and enhancing new policies and procedures that are more creative towards acceptable habit.
The organization is mandated to install monitoring tools such as pieces of code, or CCTV cameras to cover misdemeanour of malicious breaches of policies
Employees are required to sign the password policy form independently away from the main security firm; breach of the password policy can be treated as a felon.
Employees are not required to share company information through digital or print media
Individuals should notify the system administrator in case they intend to use their personal devices to access the enterprise architecture
The above rewrites are mentored more on moral law, if breached it introduces a misdemeanour environment if further breached graduates to a felony charge. Luttrell (2019) emphasizes on a working policy that should foster a moral based social media policy, one that looks on business standards that promote trust and respect between employees and other stakeholders (p. 198).
Rewrite Enforcement of Improper Use
Employees might be requested to step aside from their workstation in case they are under investigation on breach of contract. This further covers the non-retaliation policy.
Employees are advised to avoid indulging in activities that might hamper their productivity, moonlighting or clubbing are considered to be misdemeanour breach of policy as employees might fail to comply with the acceptable use policy
Employees are requested to use decent language verbal and body language, formal and informal presentation at the workplace.
Employees are advised that misdemeanour or felony charges might be engaged to help in establishing the industry best practices applicable for local, state and federal laws.
Penalties for breach of the code of conduct are ranked as misdemeanour or felonies.
Braun et al. (2019) justified the above rewrites since he believes employees need to be managed carefully further focusing fully on adaptive behaviour, where leaders reward positive practices while incorporating positive employee behaviour (p. 111).
As suggested, the changes hope to incorporate employee requirements, while motivating them to feel that they are part of the organization. The changes hope at restoring employee confidence, inspiring them to remain productive inside the organization, while encouraging them to look deeply towards organizational growth and development. Such an inherent approach further requests support of transformational leadership, part of which inspires growth and development.
Luttrell, R. (2019). Social media: How to engage, share and connect. Lanham: Rowman & Littlefield
Braun, S., Kark, R., & Wisse, B. (2019). Fifty Shades of Grey: Exploring the dark sides of leadership and followership.
[Erscheinungsort nicht ermittelbar] Frontiers Media SA
Trim, P. R. J., & Upton, D. (2013). Cybersecurity culture: Counteracting cyber threats through organizational learning and training. Farnham: Gower.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more