Provided that your organization has an Email and Internet use policy covering “Code of Conduct” on using computer assets during working hours. What should you do in the following situations if you are an IT security professional in the company: Your colleague Linda received several emails from another colleague Greg. In the emails, Greg used strong language to abuse and criticize her work. Those emails were broadcasted to the whole team and the managers, but no one respond to it. Your colleague Jack maintain his private blog online. Occasionally, he will post comments on his work and the company. You find that his blog has a link to a website “YourCompanySucks.” He explained to you that he maintains his blog during non-working hours and he is not the owner or author of that website.
Provided that your organization has an Email and Internet use policy covering “Code of Conduct” on using computer assets during working hours. What should you do in the following situations if you are an IT security professional in the company: Your colleague Linda received several emails from another colleague Greg. In the emails, Greg used strong language to abuse and criticize her work. Those emails were broadcasted to the whole team and the managers, but no one respond to it. Your colleague Jack maintain his private blog online. Occasionally, he will post comments on his work and the company. You find that his blog has a link to a website “YourCompanySucks.” He explained to you that he maintains his blog during non-working hours and he is not the owner or author of that website.
Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
Related questions
Question
Provided that your organization has an Email and Internet use policy covering “Code of Conduct” on using computer assets during working hours. What should you do in the following situations if you are an IT security professional in the company:
- Your colleague Linda received several emails from another colleague Greg. In the emails, Greg used strong language to abuse and criticize her work. Those emails were broadcasted to the whole team and the managers, but no one respond to it.
- Your colleague Jack maintain his private blog online. Occasionally, he will post comments on his work and the company. You find that his blog has a link to a website “YourCompanySucks.” He explained to you that he maintains his blog during non-working hours and he is not the owner or author of that website.
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution!
Trending now
This is a popular solution!
Step by step
Solved in 4 steps
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Recommended textbooks for you
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education