Question

In: Computer Science

Research and set up a mock-up IT policy pertaining to the use of mobile devices covering...

Research and set up a mock-up IT policy pertaining to the use of mobile devices covering personal cell phones, wearables, and company laptops and tablets. Please give the following:

  • cover sheet
  • IT strategy
  • Physical map of area coverage
  • end user usage policy
  • minimum requirements
  • local, state and Federal laws and guidelines ( if applicable)
  • an example of the policy

Solutions

Expert Solution

Answer)

Some of the IT Strategy for Mobile, wearables, company laptops as well as tablets are as follows:

1) Leads to awareness of innovation

2) Enhancing productivity

3) Improves the user based experiences

4) Diversifying the mobile technology and the latest development and innovations

The area coverage can result as per the usage terms and as per the company's need.

The end user policy would result in setting up the directives which would help to show the employees need and expectations which would help in protecting the assets corporately. Here, the user can agree for providing with the access to the desired network.

The minimum requirement should be a system along with the internet connection for any IT thing to be accessed.

The guidelines applicable for local, state as well as federal laws and guidelines are granting legal actions to the desired person, to punish any cybercriminal /offense. To uncheck the unauthorized access to any unauthorized.

Example of the policy: Cyber security policy

If you found the answer useful, hit like
Hope this answer helps.
Thanks


Related Solutions

A security analyst is validating the Mac policy on a set of android devices. The policy...
A security analyst is validating the Mac policy on a set of android devices. The policy was written to ensure non-critical applications are unable to access certain resources. When reviewing dmesg, Dallas notes many inches is such as: Avc: defined { open } for pid=1018 comm=”irc” path=”/dev/if0” dev=”tmpfs” scontext=u:r:irc:sc:s0 tcontext=u:objective_r:default:s0tclass=chr_file permissive=1 Despite the deny message, this action was still permitted. Which of the following is the most likely fix for this issue? add the objects of concern to default context...
Social media users use a variety of devices to access social networking; mobile phones are increasingly...
Social media users use a variety of devices to access social networking; mobile phones are increasingly popular. However, is there a difference in the various age groups in the proportion of social media users who use their mobile phone to access social networking? A study showed the following results for the different age groups, assume that 200 social media users for each age group were surveyed. ORIGINAL DATA ACCESS TO SOCIAL MEDIA 18-34 35-64 65+ TOTAL YES 118 72 26...
What impact do you think permitting employees to use their own mobile devices to perform company...
What impact do you think permitting employees to use their own mobile devices to perform company work has on the job satisfaction of these employees? Would it improve productivity? Why or Why Not? What other concerns could arise?
you have asked to evaluate two pollution devices. the west scrubs cost 1000 to set up...
you have asked to evaluate two pollution devices. the west scrubs cost 1000 to set up and 500 per year to operate. it must be completely replaced every 3 years, and it has no salvage value . dry scrub decice costs 2000 $ to set up and 300 per year to operate. it last for 5 years and has no salvage value . assuming pollution control equipment is replaced as ir wears out , whu h method do you recommend...
Research methodologies and tools to set up a safe environment to analyze malware as well as...
Research methodologies and tools to set up a safe environment to analyze malware as well as methods to test exploits. Minimum 3 pages for basic analysis 1.basic static techniques 2.malware analysis in virtual machines 3. basic Dynamic analysis Research methodologies and tools to set up a safe environment to analyze malware as well as methods to test exploits. Minimum 3 pages for advanced static analysis 1.analyzing malicious windows programs. Research methodologies and tools to set up a safe environment to...
A research project focused on developing a security policy for the use of cloud computing and...
A research project focused on developing a security policy for the use of cloud computing and mobile devices in a selected business environment. Developing a security policy for the use of cloud computing and mobile devices. A summary that would be appropriate to give your manager so that he/she would know the essence of your project. • Description of the business environment. • Compliance or other regulatory requirements under which this business operates. • Description of the specific cloud service...
How critically is Marketing research in Business set up? Which of Marketing Mix needs MR the...
How critically is Marketing research in Business set up? Which of Marketing Mix needs MR the most? What are the Advantages and Disadvantages of MR?
Set up the ICE table that you would use to find the pH of a solution...
Set up the ICE table that you would use to find the pH of a solution that is 0.0025 M HNO3 and 0.10 M lactic acid (HC3H5O3, Ka=1.4× 10–4). Using x as the variable for change, the expression for the concentration of hydrogen ion would be?
Set up the addition and multiplication tables for Z3 and Z6. Use these tables to verify...
Set up the addition and multiplication tables for Z3 and Z6. Use these tables to verify that (Z3, +), (Z3 \ {0}, ·) and (Z6, +) are groups, but (Z6 \ {0}, ·) is not a group. In which finite field does "25 divided by 5 is 14" hold?
Research the 2009 to 2017 Obama administration’s use of fiscal policy and deficit spending in the...
Research the 2009 to 2017 Obama administration’s use of fiscal policy and deficit spending in the face of The Great Recession which began in 2007. Focus only on fiscal policy. Do not include information about other policies such as monetary policy, healthcare, military spending, trade agreements, foreign affairs, etc. Answer the following questions: 1. Describe the main tools of fiscal policy and when it is appropriate to use them. 4. What specific fiscal policy measures did the Obama administration use,...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT