Proposed Amendments on Acceptable User Policy

Policy Changes Matrix

Policy TypeCurrent TextSuggested ChangeBusiness Reason
Acceptable Use The organization hopes to inform all employees concerning the acceptable use policies. Employees are requested to respect the rights of others while refraining from abusing organizational resources.The policy covers all employees who are requested to adhere to the policy.Covers all applicable technologies. Required to protect all technology accounts, more so securing passwordsRespect to privacy and their accountsUsage of company resources, strictly for the company vision and mission statementComply to provided signatures and templatesRefrain from visiting inappropriate websites that might display content such as pornographyProtect confidential and proprietary information from unauthorized persons. The alternative change hopes at improving the moral part of the policy. A good corporate code of conduct and the moral code would encourage employees to be responsible business practitioners. Daft (2011: 504) claim the policy can be strengthened if employees understand that they have no legal right to privacy at the workplace. However, it would be best communicated as a moral code.Additionally, the ethical policy should be simplified or even availed online where employees can control their ability to respond to the business code.   By controlling how the policy functions, it will be possible to limit the overall possible crushes between employer and employee. The current text remains a strict narrative; though good, it can be reduced from a complicated to a law, based on ethics. 
Security and PrivacyEmployees are notified that they give up the right to privacy when dealing with company resources. Employees are further requested by the organization to be cautious against illegal activity that might cause harm to the organization, its operations, and its capital.  The upcoming change should redefine the monitoring extent, especially when it comes to managing the logs policy. A controversy might arise in the ambiguity of company resources. While much of the focus is towards technology resources, the utility of another person’s computer and the real hacking incidence might present jeopardy for common law.  The business approach should try to eliminate possibilities of litigations that might arise when common law is applied. Given that the law integrates penalties, revising the ranking punitive measures should be a key business priority.
Proper UserThis section of the policy introduces the punitive measures following the abuse of the first and the second policy. Users are warned that they might be denied access to technology resources; the actions taken include criminal statutes and possible employee termination.The improper use as a policy is not detailed enough; it should consider ranking or rating each of the breaches. The penalties should be set based on the company and civil criminal statutes, which in any case include a ranking of penalties. Ballad et al. (2011) a reliable organizational use policy helps in describing the acceptable use of computing resources where in this case, a standard, guideline, or procedure will be reliable.A conscious business policy should be in a position to rank and rate employees’ performance and flaws. In most cases, employees might not be having malicious intent.  
Related PoliciesTowards the detailed policy, 77.10, 77.20, 77.30 and 77.40 details Email Guidelines, Mobile Device Guidelines, control social media over participation while presenting the growth of web-search guidelines. When combined, these policies focus on promoting internet and technical application for the official business procedure. The policy also promotes professional and research development. The policy should focus fully on official business procedures alone.The policy fully focuses on the integration of disciplinary action, punishing offenders, offence, federal, state, and local law enforcement.The policy should be concerned with the inspirational approach for handling education and professional development. By using a moral code, it is easier to inspire employees, while being in a much lesser burden of investigating employee. Davies et al. (2015, p. 509) believe that user education remains critical towards protecting existing cyber systems for the acceptable use policy. The acceptable use policy defines how users interact with existing cyber systems, which would further constitute of the acceptable policy use. The focus should also connect with the direct supervisory approach, which encourages the development of a technical support team.As Richard Branson said, building a strong organization requires the aggregate commitment by employees. Employees need to be inspired.  

References

Don't use plagiarized sources. Get Your Custom Essay on
Proposed Amendments on Acceptable User Policy
Just from $13/Page
Order Essay

Ballad, B., Ballad, T., & Banks, E. K. (2011). Access control, authentication, and public key infrastructure: Description based on print version record. Sudbury, Mass: Jones & Bartlett Learning.

Daft, R. L. (2011). Understanding management. Mason, OH: South-Western Cengage Learning.Davies, S. J., Hertig, C. A., & Gilbride, B. P. (2015). Security supervision and management: The theory and practice of asset protection. Amsterdam ; Boston : Butterworth-Heinemann is an imprint of Elsevier,

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
Live Chat+1(978) 822-0999EmailWhatsApp

Order your essay today and save 20% with the discount code LEMONADE