Assignment 3 - Behavioral Codes Paper (Policy Evaluation)

docx

School

Rowan University *

*We aren’t endorsed by this school

Course

01265

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

4

Uploaded by CaptainWalrus3957

Report
Goel 1 Abhinav Goel Professor DeStefano Computers & Society 24/04/2023 Behavioral Codes Paper (Policy Evaluation) ("Information Protection and Security Policy") Introduction: In today's work environment, protecting personal identifiable information (PII), acceptable use, proprietary information (PI), and information protection and security are of utmost importance. The policy I have chosen to analyze is the Information Protection and Security Policy (IPSP) of IBM, a multinational technology company that provides hardware, software, and consulting services to various organizations across the globe. IBM's IPSP policy aims to protect IBM's assets and the information of its employees, clients, and partners. In this analysis, I will provide a comprehensive overview of the policy, analyze and assess its key components, and make recommendations for improving the policy. Overview: The IBM IPSP policy applies to all IBM employees and third-party individuals who have access to IBM's information, assets, and facilities. The policy assumes that IBM employees are trustworthy and can make informed decisions regarding the company's information security. The policy also assumes that all employees must comply with the policy's requirements to safeguard IBM's assets. IBM's IPSP policy is structured to address several critical areas, including information security governance, information
Goel 2 classification, information handling, access control, incident management, and third- party management. Analysis: The key components of the policy include stakeholders, specific risks being addressed, consequences that could result from policy failure, the importance of the policy in today's work environment, and the magnitude of positive and negative impacts of actions. The stakeholders include IBM employees, clients, partners, and third-party individuals who have access to IBM's information, assets, and facilities. The specific risks addressed in the policy include data breaches, unauthorized access to information, and misuse of IBM's assets. IBM's IPSP policy emphasizes the importance of information security governance, which includes establishing policies and procedures, assigning roles and responsibilities, and monitoring compliance.(“Information Protection and Security Policy.” ) The policy also outlines the procedures for classifying information and the appropriate handling of information based on its classification. Access control procedures are outlined to restrict access to information to only those who require it to perform their job functions. The policy outlines the procedures for incident management, which includes detecting, containing, and resolving information security incidents. Finally, the policy outlines the requirements for managing third-party individuals who have access to IBM's information, assets, and facilities. The consequences that could result from policy failure include financial loss, reputational damage, loss of client trust, and legal action against IBM.(“Information Protection and Security Policy.”) The importance of the policy in today's work environment cannot be overstated, as data breaches and cyber attacks are on the rise. The magnitude of positive impact is that it helps to protect IBM's assets and the information of its employees, clients, and partners. The magnitude of negative impact is
Goel 3 that the policy may be too restrictive, and employees may feel that it hinders their productivity. Recommendations: Based on my analysis, I recommend that IBM should review and update its policy to reflect changes in the threat landscape.(“Information Protection and Security Policy.”) IBM should also conduct regular training and awareness programs for its employees and third-party individuals to ensure compliance with the policy's requirements. Additionally, IBM should consider providing incentives for employees who comply with the policy's requirements, such as recognition and rewards. Conclusion: In conclusion, the IBM Information Protection and Security Policy is critical in today's work environment, and IBM must ensure that its employees and third-party individuals comply with its requirements to safeguard its assets. IBM's IPSP policy is structured to address several critical areas, including information security governance, information classification, information handling, access control, incident management, and third- party management. IBM should review and update its policy regularly, conduct regular training and awareness programs, and provide incentives for employees who comply with the policy's requirements. These recommendations will help IBM to mitigate the risks associated with data breaches, unauthorized access to information, and misuse of its assets.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Goel 4 Works Cited Entry: “Information Protection and Security Policy.” IBM. www.ibm.com. March 2022. Web. 24 April 2023.