Policy Changes Matrix
|Policy Type||Current Text||Suggested Change||Business Reason|
|Acceptable Use||The organization hopes to inform all employees concerning the acceptable use policies. Employees are requested to respect the rights of others while refraining from abusing organizational resources.The policy covers all employees who are requested to adhere to the policy.Covers all applicable technologies. Required to protect all technology accounts, more so securing passwordsRespect to privacy and their accountsUsage of company resources, strictly for the company vision and mission statementComply to provided signatures and templatesRefrain from visiting inappropriate websites that might display content such as pornographyProtect confidential and proprietary information from unauthorized persons.||The alternative change hopes at improving the moral part of the policy. A good corporate code of conduct and the moral code would encourage employees to be responsible business practitioners. Daft (2011: 504) claim the policy can be strengthened if employees understand that they have no legal right to privacy at the workplace. However, it would be best communicated as a moral code.Additionally, the ethical policy should be simplified or even availed online where employees can control their ability to respond to the business code.||By controlling how the policy functions, it will be possible to limit the overall possible crushes between employer and employee. The current text remains a strict narrative; though good, it can be reduced from a complicated to a law, based on ethics.|
|Security and Privacy||Employees are notified that they give up the right to privacy when dealing with company resources. Employees are further requested by the organization to be cautious against illegal activity that might cause harm to the organization, its operations, and its capital.||The upcoming change should redefine the monitoring extent, especially when it comes to managing the logs policy. A controversy might arise in the ambiguity of company resources. While much of the focus is towards technology resources, the utility of another person’s computer and the real hacking incidence might present jeopardy for common law.||The business approach should try to eliminate possibilities of litigations that might arise when common law is applied. Given that the law integrates penalties, revising the ranking punitive measures should be a key business priority.|
|Proper User||This section of the policy introduces the punitive measures following the abuse of the first and the second policy. Users are warned that they might be denied access to technology resources; the actions taken include criminal statutes and possible employee termination.||The improper use as a policy is not detailed enough; it should consider ranking or rating each of the breaches. The penalties should be set based on the company and civil criminal statutes, which in any case include a ranking of penalties. Ballad et al. (2011) a reliable organizational use policy helps in describing the acceptable use of computing resources where in this case, a standard, guideline, or procedure will be reliable.||A conscious business policy should be in a position to rank and rate employees’ performance and flaws. In most cases, employees might not be having malicious intent.|
|Related Policies||Towards the detailed policy, 77.10, 77.20, 77.30 and 77.40 details Email Guidelines, Mobile Device Guidelines, control social media over participation while presenting the growth of web-search guidelines. When combined, these policies focus on promoting internet and technical application for the official business procedure. The policy also promotes professional and research development. The policy should focus fully on official business procedures alone.The policy fully focuses on the integration of disciplinary action, punishing offenders, offence, federal, state, and local law enforcement.||The policy should be concerned with the inspirational approach for handling education and professional development. By using a moral code, it is easier to inspire employees, while being in a much lesser burden of investigating employee. Davies et al. (2015, p. 509) believe that user education remains critical towards protecting existing cyber systems for the acceptable use policy. The acceptable use policy defines how users interact with existing cyber systems, which would further constitute of the acceptable policy use. The focus should also connect with the direct supervisory approach, which encourages the development of a technical support team.||As Richard Branson said, building a strong organization requires the aggregate commitment by employees. Employees need to be inspired.|
Ballad, B., Ballad, T., & Banks, E. K. (2011). Access control, authentication, and public key infrastructure: Description based on print version record. Sudbury, Mass: Jones & Bartlett Learning.
Daft, R. L. (2011). Understanding management. Mason, OH: South-Western Cengage Learning.Davies, S. J., Hertig, C. A., & Gilbride, B. P. (2015). Security supervision and management: The theory and practice of asset protection. Amsterdam ; Boston : Butterworth-Heinemann is an imprint of Elsevier,
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more