Information Assurance Policy for Elite Bet Gambling Company
Verified
Added on 2023/06/10
|11
|1914
|491
AI Summary
This policy highlights the security measures for Elite Bet Gambling Company's information systems. It covers acceptable use policy, data classification policy, data protection standards, social media policy, and more.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
RUNNING HEAD:COURSE PROJECT 21 INFORMATION ASSURANCE POLICY STUDENT NAME COURSE UNIVERSITY DATE Table of contents
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2 Information assurance policy for Elite bet gambling company.......................................................3 Acceptable use policy..................................................................................................................3 The overview................................................................................................................................3 The purpose..................................................................................................................................4 The scope.....................................................................................................................................4 Policy compliance....................................................................................................................5 Illegal use of the policy................................................................................................................6 Data classification policy.........................................................................................................8 Data protection standards.........................................................................................................8 Social media policy..................................................................................................................8 Definition of terms.......................................................................................................................9 Browser....................................................................................................................................9 Computer..................................................................................................................................9 Confidentiality..........................................................................................................................9 Security Policy.........................................................................................................................9 Software..................................................................................................................................10 Spam.......................................................................................................................................10 References..................................................................................................................................10
3 Information assurance policy for Elite bet gambling company Acceptable use policy Elite bet betting company have a fair use policy as one of their information assurance policyWillett,K.D. (2008). It is illegal to use any information about the company without the patent rights for using the datna. According toVentre,D. (2012)an information assurance policy refers to the formulated guidelines that govern the use of specific information within the company such that all the users of the organization's data are monitored by the organization's system hence prevent hackers from unauthorized access to the company's information. According toUnited States. (2013) ,the acceptable use policy was formulated by SANS Institute for all the internet users and is freely applicable in any organization The overview The acceptable policy was not intended to restrict the company from enjoying their culture of openness, trust, and integrity(Susilo,W., & Mu,Y. 2014), It seeks to protect the employees, partners and elite bet company from disallowed or damaging actions either purposely or unintentionally from individuals within or outside the organization.Schou,C., & Shoemaker,D. (2007) states thatthe policy acknowledges the ownership of; the software, URL, the internet/intranet/Extranet-related systems by the company. The systems are mainly meant to facilitate business operations for the company for the achievement of the company's set objectives. The system run by the organization should also be used for the interest of the customers in the course of their normal business operations in gambling.According to theRoyal
4 College of Psychiatrists. (2010),All the employees have the responsibility of protecting the company's information for the adequate security of the data. The purpose The policy is meant to highlight the adequate security measures when dealing with the company's information systems(Rowlands,I. 2012).The company has come up with various ways to protect the information from unauthorized access such as the provision of a password for logging in by the employees.,the antivirus systems have to be installed to protect the systems from virus attacks, and cybersecurity systems have also been established in the company's software to prevent the compromisation of the network systems, services, and legal issues(Papanicolas,I., & Smith,P. 2013). The scope Lee,D.H., & Workshop on Information Security Applications. (2012) state thatthe policy applies to information which might be electronic and also its implemented in the usage of computer devices and resource networks to facilitate gambling activities for elite bet subscribers and through interaction with other network systems that provide live score updates and how the matches are fairing. According toKeyser,T., & Dainty,C. (2018),the contractors, consultants and all the other employees are responsible for exercising good judgment in line with the correct use of information, the electronic devices within the company and network resources as per the company’s stipulated policies. The policy applies to all the company assets.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
5 Policy compliance Grieves,M. (2012) states thatallthe employees for elite bet company have to comply with the stipulated policy in the following ways: All the information and the assets are the company property and should be protected All the individuals have the mandate to report them immediately theft, loss or unauthorized access to the private company information Necessary information should always be used when accomplishing the company's assigned tasks Various departments within the company are responsible for creating the guidelines regarding personal internet usage Authorized personnel within the company should monitor the internet usage for security and network maintenance purposes. Auditing of the network systems should be done regularly to ensure compliance with the stipulated rules and regulations. System-level and user level passwords must comply with the Password Policy for the company which provides only a single password for the users Providing access to another individual’s portal either deliberately or through failure to secure his or her access illegal. Every person You must lock the screen or log off when the device is unattended to prevent unauthorized access to the information
6 Employees are prohibited from using the organizational website for show off or posting their own issues and applies to any worker in any organization unless posting is in the course of business duties. Employees must use extreme caution when opening email attachments from spammers due to malware invasion to the organization system. Illegal use of the policy Employees are encouraged to have an access to a host if that host is disrupting production processes so as to take immediate action(Chen,X., & Inscrypt. 2018). Copying of materials written by others as yours and the installation of any copyrighted software for which or the end user does not have the patent rights is prohibited. Logging into the website , a server or an account for any purpose other than conducting business, even if you have authorized access, is prohibited Introduction of malicious programs into the network or server (e.g., viruses, worms, Trojan horses, e-mail bombs, Sharing of your account password to others is illegal since they might share wrong information without your consent and you will end up been followed up for the mistakes you are not aware of Misusing the company’s computers through visitation of pornographic websites is prohibited hence illegal since the information obtained might lead to secxual harassment Manipulation of user authentication or security of any host, network or account for personal gain is prohibited
7 Introducing honeypots, honeynets, or similar technology on the network is illegal foer security purpose Interuption of other organization,s network through interfering with their network systems is prohibited Providing information about, or lists of, employees to outsiders is illegal due to security of such employees Email and Communication Activities According toBoyd,C., & Simpson,L. (2013),empoyees using company computers to access and use the Internet must realize that they are representatives of the company and whenever employees state affiliation to the company when giving opinions on issues relating to the company ,they must also clearly indicate that the expressed opinions are there own and not necessarily those of the companyand any issues that arisemay be addressed to the IT Department of the company and violation of these policy isd illegal Sending of spam messages to other people from the organization’s website or emailing of people with out their permission is not allowed Harrassing others either through email, pager ,facebook or any other social platform is prohibited and is punishable by law According toAsia Joint Conference on Information Security, & IEEE Computer Society. (2013) ,Posting non business related messages to the online platform where employees discuss business issues is prohibited such as on whats app or facebook platform
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
8 Data classification policy It states that all the data in the system should be arranged systematically for easy retrieval of the desired information. Data protection standards Security measures should be put in place to ensure that the company's critical data cannot be accessible to outsiders. Social media policy The policy stipulates that the employees should not disclose crucial facts about the company to social media for the privacy of information purpose
9 Definition of terms Browser A computer software that enables the user to accesss the internet Computer Refers to an electronic device that processes the information input into output as per the user requirement Confidentiality When the information is displayed to only the desired people Security Policy A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources. Software Is a computer installed program that facilitates the functioning of the various computer installed applications Spam Electronic junk mail or junk newsgroup postings.
10 References Asia Joint Conference on Information Security, & IEEE Computer Society. (2013).AsiaJCIS 2013: 2013 Eighth Asia Joint Conference on Information Security : proceedings : 25-26 July 2013, Seoul, South Korea. Boyd,C., & Simpson,L. (2013).Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings. Berlin, Heidelberg: Springer. Chen,X., & Inscrypt. (2018).Information security and cryptology: 13th international conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017 : revised selected papers. Grieves,M. (2012).Information Policy in the Electronic Age. Information and Privacy Commissioner/Ontario. (2007).Your privacy and Ontario's Information and Privacy Commissioner. Toronto: Author. Keyser,T., & Dainty,C. (2018).The Information Governance Toolkit: Data Protection, Caldicott, Confidentiality. Lee,D.H., & Workshop on Information Security Applications. (2012).Information security applications: 13th international workshop : revised selected papers. Heidelberg: Springer. Papanicolas,I., & Smith,P. (2013).Health System Performance Comparison: An Agenda for Policy, Information and Research. Rowlands,I. (2012).Understanding Information Policy. Royal College of Psychiatrists. (2010).Good psychiatric practice: Confidentiality and information sharing. London: Author.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
11 Schou,C., & Shoemaker,D. (2007).Information assurance for the enterprise: A roadmap to information security. Boston: McGraw-Hill Irwin. Susilo,W., & Mu,Y. (2014).Information Security and Privacy: 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings. Cham: Springer. United States. (2013).Homeland Security Information Network improvements and challenges. United States. (2013).Reducing over-classification of DHS' national security information. Ventre,D. (2012).Information Warfare. London: Wiley. Willett,K.D. (2008).Information assurance architecture. Boca Raton: CRC Press.