The three policies research and approval draft preparation

This is a paper that is focusing on the three policies research and approval draft preparation. The paper also provides the research instructions and writing instructions to use for the assignment paper.

The three policies research and approval draft preparation

Your Task Assignment
As a staff member supporting the CISO, you have been asked to research what the three policies should contain and then prepare an “approval draft” for each one. No single policy should exceed two typed pages in length so you will need to be concise in your writing and only include the most important elements for each policy.

The policies are to be written for EMPLOYEES and must explain employee obligations and responsibilities. Each policy must also include the penalties for violations of the policy and identify who is responsible for compliance enforcement.
Your “approval drafts” will be submitted to the IT Governance Board for discussion and vetting. If the board accepts your policies, they will then be reviewed and critiqued by all department heads and executives before being finalized by the Chief of Staff’s office. The policies will also be subjected to a thorough legal  review by the company’s attorneys.

1. Firstly, review the table of contents and relevant chapters in the Certified Information Privacy Professional textbook to find information about legal and regulatory drivers.
2. Secondly, review the remaining course readings.
3. Thirdly, review the sample policies and procedures provided in Week 3.
4. Fourthly, find additional sources which provide information about the policy statements which should be covered in three policies for the Employee Handbook.

The three policies research and approval draft preparation

1. Firstly, prepare briefing package with approval drafts of the three IT related policies for the Employee Handbook. Your briefing package must contain the following:
• Executive Summary
• “Approval Drafts” for
Acceptable Use Policy for Information Technology
Bring Your Own Device Policy
Digital Media Sanitization, Reuse, & Destruction Policy
As you write your policies, make sure that you address security issues using standard cybersecurity terminology (e.g. 5 Pillars of IA, 5 Pillars of Information
Security). See the resources listed under Course Resources > Cybersecurity Concepts Review for definitions and terminology.

2. Secondly, use a professional format for your policy documents and briefing package. A recommended format is provided in the assignment template file (see the
recommended template under Course Resources).

3. Thirdly, you must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file.
These pages do not count towards the assignment’s page count.

4. Fourthly, common phrases do not require citations. If there is doubt as to whether or not information requires attribution, provide a footnote with publication
information or use APA format citations and references.

5. Also, you are to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell
check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage
sentences and paragraphs.

6. Consult the grading rubric for specific content and formatting requirements for this assignment.