Security Policy
Review the Technology Use Policy for Strayer University and the Information Security Policies for Strayer University, The George Washington University, and Harvard University:
- Strayer University
http://strayer.smartcatalogiq.com/en/2016-2017/Student-Handbook/Policies-and-Procedures/Technology-Use-Policy - The George Washington University:
http://my.gwu.edu/files/policies/InformationSecurityPolicyFINAL.pdf - Harvard University
https://policy.security.harvard.edu/
Note: Include two (2) other websites published within the past [1] year in your references section. These two (2) websites do not count towards the required number of references.
Write a three to four (3-4) page paper in which you:
- Explain the purpose of a university security policy and indicate the major reasons why they are necessary. Provide your opinion as to whether a university security policy is more or less important to have than a business security policy
- Critique the level of completeness of the Strayer University Security Policy
- Critique the level of completeness of the George Washington University Security Policy
- Suggest one (1) additional policy or procedure for each university’s policy. Provide a rationale for your response
- Use at least three (3) quality references published within the past [1] year in this assignment.
"You need a similar assignment done from scratch? Our qualified writers will help you with a guaranteed AI-free & plagiarism-free A+ quality paper, Confidentiality, Timely delivery & Livechat/phone Support.
Discount Code: CIPD30
Click ORDER NOW..


