Cybersecurity Policy, Plans, and Programs

computer science


CSIA 413: Cybersecurity Policy, Plans, and Programs

***DO NOT copy a source from the Internet and switched words to try and avoid plagiarism detection.  DO NOT use answers already posted on Coursehero.  This assignment will be submitted through Turnitin for plagiarism and a 0 grade is given for the entire assignment if any plagiarism.***

As a staff member supporting the CISO, you have been asked to research what the three policies should contain and then prepare an “approval draft” for each one. No single policy should exceed two typed pages in length so you will need to be concise in your writing and only include the most important elements for each policy.

The policies are to be written for EMPLOYEES and must explain employee obligations and responsibilities. Each policy must also include the penalties for violations of the policy and identify who is responsible for compliance enforcement.

Your “approval drafts” will be submitted to the IT Governance Board for discussion and vetting. If the board accepts your policies, they will then be reviewed and critiqued by all department heads and executives before being finalized by the Chief of Staff’s office. The policies will also be subjected to a thorough legal review by the company’s attorneys. Upon final approval by the Corporate Governance Board, the policies will be adopted and placed into the Employee Handbook.


  • Review the Week 1 & 2 readings.
  • Review the sample policies and procedures provided in Week 1.
  • Find additional sources which provide information about the policy statements which should be covered in three policies for the Employee Handbook.
  • Prepare briefing package with approval drafts of the three IT related policies for the Employee Handbook. Your  briefing package must contain the following:
  • Use a professional format for your policy documents and briefing package. A recommended format is provided in the assignment template file (see the recommended te mplate under Course Resources).
  • Common phrases do not require citations. If there is doubt as to whether or not information requires attribution, provide a footnote with publication information or use APA format citations and references.
  • You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.   

Download Attachments: 
KB Wk1-1.docx 
KB Wk1-2 Acceptable Use Policy.docx 
KB Wk1-3 CSIA+413+Case+Study+for+Red+Clay+Renovations+(Student+Version).docx 
KB Wk1-4 Project #1 Employee Handbook.docx

Executive Summary

“Approval Drafts” for

Acceptable Use Policy for Information Technology

Bring Your Own Device Policy

Digital Media Sanitization, Reuse, & Destruction Policy

As you write your policies, make sure that you address security issues using standard cybersecurity terminology (e.g. 5 Pillars of IA, 5 Pillars of Information Security). See the resources listed under Course Resources > Cybersecurity Concepts Review for definitions and terminology.

Related Questions in computer science category

The ready solutions purchased from Library are already used solutions. Please do not submit them directly as it may lead to plagiarism. Once paid, the solution file download link will be sent to your provided email. Please either use them for learning purpose or re-write them in your own language. In case if you haven't get the email, do let us know via chat support.