Sign In
Not register? Register Now!
You are here: HomeEssayEducation
Pages:
1 page/≈550 words
Sources:
2 Sources
Level:
APA
Subject:
Education
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 7.2
Topic:

Policy (Essay Sample)

Instructions:
THIS TASK WAS ASSIGNED TO A GROUP IN CLASS. EACH GROUP WAS TO SELECT A POLICY AND DISCUSS IT BY DESCRIBING ITS NAME, PURPOSE, HISTORY, AND REVISION. I PROVIDED A COMPREHENSIVE DICUSSION OF THE POLICY AND THE STUDENT SCORED HIGHLY. I SELECTED A POLICY RELATED TO INFORMATION TECHNOLOGY USE IN THE UNIVERSITY OF THE STUDENT, THE AD96 ACCEPTABLE USE OF UNIVERSITY INFORMATION RESOURCES. source..
Content:
AD96 Acceptable Use of University Information Resources Name Institutional Affiliation AD96 Acceptable Use of University Information Resources The acceptable use of university information resources is among the active Pennstate's policies guiding how individuals should utilize information resources without causing harm to the university or other people. The expert behind the subject matter is Keith Brautigam, under the stewardship of the senior vice president and chief of staff (PennState, 2022). The primary purpose of this policy is to create and outline the standard use of the university's electronic resources, such as computer facilities and services, computers, networks, video and voice services, electronic mail services, and electronic information and data (PennState, 2022). This enables the enhancement of educational, research, and service missions. Following the advancement in information technology, cybercrimes and malpractices increased. For instance, individuals with access to the university information resources might use inappropriate authentication means to access vital information about the University for Ill Motives. This aligns with how the United Nations Office on Drugs and Crime discusses cybercrime. According to Unodc.org. (2020), several stakeholders, such as individuals, businesses, groups, and nation-states, can perpetuate cybercrime by using malicious software to attack systems or commit crimes. Such crimes may include impersonation, cyberbullying, blackmailing, and shutting down organizational operations. Given this view, the Pen State may have been compelled to adopt this policy to provide guidelines and standards for using institutional information resources. The Acceptable use of the University Information Resources policy provides the roadmap and a way in which the institution's information resources can be used ethically to support the achievement of organizational goals. Individuals with access to the university's information resources are called upon to use only the information technology resources they are authorized and avoid accessing them with inadvertent authorization (PennState, 2022). This policy also reminds authorized individuals to protect and avoid sharing their authentication credentials, accounts, and passwords. Further, the policy prohibits forging, impersonating, and sending anonymous messages except when the recipient is aware of and agrees to the message (PennState, 2022). Another fundamental issue addressed by the policy is using the university's information resources to upload, download or distribute copyrighted and illegal materials that may cause a violation of the policy. The policy has no exceptions unless one seeks permission by requesting for exceptions. The policy provides that any exceptions to or from any provision and other supplemental information technology regulations should be approved by the security based on the policy standard regarding information security (PennState, 2022). Furthermore, the university indicates that the Acceptable Use of University Information Resources Policy can be referenced to other policies such as Private Statement (AD53) and Information Assurance and Information Technology Security (AD95). The policy has had s...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

Need a Custom Essay Written?
First time 15% Discount!