In: Computer Science
Solution:-
Issue-SpecificSecurity Policy (ISSP) addressing the use of the Internet:
* The Internet usage by a company's employees, their family
members, or others on company-owned or issued computers, laptops,
devices, mobile devices such as mobile phones, smartphones,
tablets, etc., for accessing, streaming, listening to, watching,
downloading, web-based files, applications, audios, videos, images,
photos, games, etc., which would clearly violate the ISSP.
* More specifically, what business email service should and should
not be used for when using the company provided Internet connection
or the employee's own Internet connection but, on the company
provided-computer, or both, the Internet and the computer provided
by the company, where email is part of the Internet service.
* How employees may or may not use company-issued Internet.
* What employees can and cannot do with personal equipments,
devices, computers, etc., accessing company Wi-Fi or the LAN.
* If employees may or may not connect their personal devices to the
company's network or company providing Internet services.
* Who has access to the Internet.
* Prohibitions against hacking on the Internet.
* Overall, it is about company-owned and issued networks and the
Internet connection or services usages.
* It should address the issue of fair and responsible use of the
Internet.
* Many different problems and potential unethical practices that
must be taken into consideration when using the Internet.
* It defines the manner or the way in which the Internet is
used.
* What effects do Internet-based business services or the work have
on employees or the users in that particular field, business,
sector, and industry.
* How one assures the Internet services provided are appropriately
used.
* How confident one can be negative effects are not experienced by
the Internet services recipients or users.
* How abled are the users to effectively and ethically use the
Internet in the field or industry they are using it.
* It includes information and guidelines about records of
electronic communications.
* Guidelines about safety and confidentiality.
* Alerts and guidelines about saved information.
* Electronic transfer of customer, consumer, or client
information.
* Guidelines about the security of websites.
* Disclosure of one's professional identification.
* Guidelines on verification and disclosure of client, customer, or
consumer identification through video conferencing, code words,
numbers, or graphics.
* Guidelines on the agreements made related to client waiver.
* Guidelines on the privacy of information.
* Guidelines on secured sites.
* Guidelines on non-secure websites..
Thank you Sir....!