Question: Using the policy you created in BELOW and answer the following questions: 1) What is the readability statistics for this policy? Visit this website for
Using the policy you created in BELOW and answer the following questions:
1) What is the readability statistics for this policy? Visit this website for directions on how to use MS Word to determine readability.Links to an external site. Why is it important to have a certain readability score?
2) What are some issues that can arise as a result of illiteracy or due to poor understanding of the native language in which a policy is written? Explain.
3) Describe the challenges faced by multinational organizations that must translate a policy into several languages. Give examples.
4) What are ways that policy distribution can be difficult? Give some examples of how a policy can be distributed, and its effectiveness of distribution in that fashion.
5) Finally, What issues may arise of an employee refuses to agree this policy? Grounds for termination? Why or why not?
PLEASE PUT ANSWERS IN NUMBER FORMAT
_________________________________________________________________________________________________
Password Policy
Overview:
All of BT21 Company's information technology systems, which are handled by the HRL unit, are secured with a username and password, allowing for secure and authorized usage. Passwords are crucial part of IT security, thus IT processes must be secure to prevent unauthorized access.
Purpose:
This policy is intended to establish guidelines/standards for efficiently creating, maintaining, and protecting passwords at BT21 Company.
Scope:
This policy applies to all BT21 Company employees and contractors in order to control permissible password usage on any systems that link to the BT21 Company systems.
Policy:
Password Creation:
- Password must be strong:
- All users and admin passwords must be at least [9] characters in length. Longer passwords are strongly recommended.
- The passwords must include multiple character types:
- Upper case characters
- Lower case characters
- Special characters (!@#$%^&*()>. etc)
- numbers (0-9)
- Passwords must be unique and must not be used for any other system or personal account.
- Default passwords should be changed immediately after creation.
Password Aging:
- Passwords must be changed every [3] months.
- Reusing previously used old passwords should be avoided.
Password Protection:
- Password sharing is not permitted with anybody (even coworkers or supervisors); keeping privacy is crucial. Make certain not to disclose or send electronically.
- Passwords should not be written down or physically stored anywhere on the premises.
- Password "hints" configurations shouldn't contain the hint towards the format of passwords (e.g.,"first+last name").
- Avoid using the "Remember Password" feature.
- Any corporate system accessed through mobile devices connected to the company network must be password secured or bio-metric authenticated.
Enforcement:
The end user must follow the password policy's guidelines/standards for password generation, maintenance, and security. It's the end user's obligation to guarantee compliance and, in the event of a password compromise, to promptly report the issue to the BT21 Company IT=Security Cell and replace the password.
The Policy is effective in following ways:
- To avoid cyber assaults or data theft, data security is the primary concern in computing systems.
- Developing a standard for generating complicated passwords that can limit unauthorized access to the system and the loss of sensitive data. It will generate a set of security judgements that may be used to prevent any security breach. Maintaining a streamlined password development process and guaranteeing uniqueness will assist to minimize password hacks.
- The policy discusses the password lifecycle from creation to protection, focusing on the complete life of a password from creation through age and protection. Passwords that changed on a regular basis assist to safeguard them against malicious attacks.
- Data breaches are frequently the result of phishing attacks or insider attacks, exchanging passwords in any form is forbidden. The usage of hints configurations is designed so that any risks for misuse of password is avoided.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
