diss 1 – 613

What items would you include in an organization’s IT Security Policy Manual that defines acceptable use of company owned computer systems? In your response, include the following considerations:
What are the risks to the organization if such a policy is not in place?
What are the advantages of planning for every possible scenario? What are the disadvantages of this approach?
What are the advantages of making the policy more generic? What are the disadvantages of this approach?
Word format only
avoid plagiarism
1-2 pages