Professional Documents
Culture Documents
Student’s Name
Professor’s Name
Subject
DD MM YYYY
becomes. A system or policies should be in place to protect the integrity and confidentiality
of information .
It is very important to keep company information and data safe as a compromise on data can
cost the company thousands of dollars if personal customer data is lost or accessed by an
unauthorized individual. This can also have a negative impact on the reputation of the
company.
Describe two policies you would put into place to protect the company's information
and data.
Two policies that can be implemented to protect company information and data include:
Information security policy where there is implementation of data encryption and access
control (remote and onsite) to information through the use of passwords, login sessions and
implementing Data Base Management Systems that can be used to protect critical
information.
Also an Email policy can be implemented that gives the company the right to monitor all
incoming and outgoing emails and keeping a record of the content of the emails. The policy
should clearly provide what is deemed prohibited content and what is acceptable.
Student’s Last Name 2
Describe two ways you would monitor employees that work on site.
On site employees can be monitored through user accounts that can be used to track their
activity and keep logs of information they have accessed and made changes on. This can be
Another way is the use of web tracking and filtering software which can keep track of the
website a user accesses and can also restrict access to certain sites or give a time based
restriction.
Describe two ways you would monitor employees that work remotely.
Employees that work remotely can be monitored through the use of Virtual Private Networks
(VPNs). The VPN provides a secure information path where user activity is logged and
Another way to monitor remote access is to give access as and when it is needed and revoke
Ten of your employees travel to different states to call on customers. Would you give
Giving out credit cards increases the risk of the cards falling into the wrong hands or being
stolen and information on them becomes compromised, however company credit cards that
come with spending policies can be very beneficial to the employee than using the
In conclusion it’s important for a company to monitor its day to day processes and how
they affect information security and compliance to its security policies for the success of the
company.
Student’s Last Name 3
Works Cited
Books
Jeffrey M. Stanton, Kathryn R. Stam. The Visible Employee , Information Today, Inc., 2006.
Bryant, William D International Conflict and Cyberspace Superiority: Theory and
Practice, Routledge,2015.