Learning Objectives and Outcomes
You will explore policy creation and enforcement actions.
You will describe policy monitoring and enforcement strategies.
You will research automated information technology systems.
You will do research and align a selected automated IT system.
For this assignment, imagine that you work for a Department of Defense (DoD) organization with direct ties to the U.S. Government, and you are a sole supplier to them for military products. Your organization has three different levels of management and of those levels two different unions exist.
The majority of your staff is in another non-supervisory union and you also have contractors. Your organization has approximately 7,000 workers who are located across the U.S. in 35 locations.
You have developed a modified Internet use policy along with a physical access policy. You must invoke these policies at the earliest as a recent security breach has been identified from flaws in these policies. Identify and describe the legal implications of information systems security (ISS) policy enforcement after these new policies are adapted. Describe a policy monitoring and enforcement strategy for your organization.