Each group/student is required to analyse the scenario given on page 3 and develop a ‘Copyright Compliance Policy’ for the organisation described in the scenario.
The ISSP should include:
- Statement of Purpose
- Authorised Uses
- Prohibited Uses
- Systems Management
- Violations of Policy
- Policy Review and Modification
- Limitations of Liability
You also need to include a section containing the justification of the contents of your policy as well as any assumptions that you have made.
The assumptions of the Academics For Academics (A4A) case study are as follows:
a) Registering with Academics For Academics or A4A is one of the best option for a professional who likes to provide voluntary services in teaching and research.
b) The professionals, who have an interest in development of curricula for a member institution or supervising a research project, can register their interests with A4A, which is a good option for any professional.
c) Academics for Academics or A4A is recruiting different professionals with different background, which is creating a cultural diversity.
d) Once the professionals are recruited, they become members of Academics For Academics or A4A, the medical expenses, travel expenses, accommodation and meals expenses are taken care by A4A, which is extremely beneficial for any individual.
The purpose of this project is to understand and develop a Copyright Compliance Policy on the given scenario. This assignment helps to understand and analyze the Issue Specific Security Policy or ISSP (Sommestad et al. 2014). Academics for Academics (A4A) is a Non-Governmental Organisation or an NGO, which has its head office and the branch office in Sydney and Singapore respectively (Ifinedo 2012). Being an NGO, A4A sponsors all of its activities and projects from public donations. Academics For Academics was started to help the small private and public colleges and universities in South-East Asia and Australia. Academics For Academics has a team of ten employees or staff members, out of which four are from Singapore and six are from Sydney. Different private colleges and universities, who are interested in accepting specific service from Academics For Academics or A4A, have to register with A4A and further become its member institutions. A4A recruits them to interim assignments at its member institutions. The colleges or the universities registered, which are recruited to different assignments or projects will be provided with meals, medical, accommodation and travel expenses (Coronel and Morris 2016). After the colleges or universities are registered with Academics For Academics, the data and the assignments that are performed by the members are secured with A4A. This project helps to understand the statement of purpose, the authorized uses and the prohibited uses of this particular case study. The project also covers the details of systems management, violation of policy, policy review and modification and the limitations of liability. It also outlines perfect justification for this case study.
After registering with Academics For Academics or A4A, the private colleges and universities become member institutions of this Non-Government Organization or NGO. These members are recruited for various projects and short-term assignments. As soon as a university or a college becomes the member of Academics For Academics, the information provided by the member, will be the property of Academics For Academics or A4A and the respective member. Nobody else can access that data. This rule is applicable for everything related to the Non-Government Organization except for the marked assignments, exams and emails. This particular rule is applicable for all employees or members, irrespective of the fact that whether the member is working in the home country of Academics For Academics or away from it (Sommestad et al. 2014). A4A has an integrated information system, which helps it to maintain all the data and information. All information is stored in the information system, no matter where the member is working and what the project and assignment is. The authorized users of this information are only the professional, who has done the project or assignment and the existing members of Academics For Academics or A4A. The data or information is highly secured in the information system. The security level of this information is so high, that these data are even handled and stored by the members and the Academics For Academics.
Statement of Purpose
A4A or Academics For Academics is extremely strict about its security. After a particular professional is hired for a project or short-term assignment, it will be his/her duty to maintain the security of the project or assignment. Once a professional is recruited, the information or the data becomes the property of Academics For Academics and the member only. The information is stored and handled by a highly secured integrated information system, which helps to keep the data secure and safe. Nobody has the right to access that information without the permission of Academics For Academics. Any other individual, or college or university has no right to access that information and their use is prohibited (Siponen, Mahmood and Pahnila 2014). When a prohibited user is found to access and use the information, without proper permission, A4A has complete right to take legal actions against that individual, or college and university. This rule maintains a level of security to the projects and assignments.
Systems management refers to the enterprise-wide management of dispersed systems which further includes (and more commonly in practice) the integrated computer systems. Systems management is extremely effected and influenced by the network management initiatives in media and telecommunications. Systems management plays an important role in security and computer systems of any organization. The main tasks of systems management are security management, storage management, anti-malware and anti-virus management. The additional tasks of system management include network capacity, hardware inventories, capacity monitoring, utilization monitoring, software inventory, and software installation (Safa, Von Solms and Furnell 2016). It is the responsibility of the network administrator, for Academics For Academics or A4A, to make sure that all the points of entry are configured with perfect settings as defined by the Issue Specific Security Policy or ISSP. This particular policy includes encryption and authentication configurations but it is not limited to them. It is the duty and responsibility of the end-user to be sure that his/her system remains properly configured as defined by the systems management (Coronel and Morris 2016). This includes but is not restricted to the configuration of the network interface card and wireless supplicant. The Information System of Academics For Academics will be responsible for defining encryption and authentication requirements as well as the development of necessary consent programs. Academics For Academics or A4A authenticates the access and use of information and data of the project and assignment through its unique systems management.
In the occurrence of inappropriate access and use of information by the prohibited users, Academics for Academics reserves the right to take necessary steps are considered appropriate for the particular situation including, but not restricted to, the termination of employees and legal action (Vance and Siponen 2012). There are guidelines for action, which includes a major warning for the first-time violators of policy and formal notice in employee’s staff file for the additional occurrences. All kinds of violations of this issue specific security policy are reported to the direct report manager of Academics For Academics or A4A who will in turn report the breaching to the Information Security department. Legal actions can even end the prohibited user in prison. A4A is extremely conscious about the security of information and data and they do not tolerate any kind of violation or breaching in that data or information.
Authorized Uses
The Issue Specific Security Policy or ISSP is analyzed by the information system of Academics for Academics on a regular basis, or as needed by the changes and alteration in technology, and modified wherever appropriate. Modification of the policy is needed time to time, as technology is changing everyday and growing modern day by day (Sommestad 2014). The job with which Academics For Academics is involved, needs utmost modification and analysis. If the policy is not modified on a regular basis, the information and data may lose the authenticity, which is not at all allowed in this work (Bunakov et al. 2014). The existing policies are reviewed and modified by the new policies, which makes it easier to be kept secure and safe. All policy review and modification is done by the authorized head manager of Academics For Academics. Unless required by the protocols applicable to definite policies affecting curriculum or faculty, the new policy or any policy that has been reconsidered significantly should then be available to the Managing Director for approval (Carlisle 2012). Therefore, policy review and modification is extremely important for every issue specific security policy.
Academics For Academics or A4A assumes no liability for the prohibited and unauthorized acts that violate international, national, state, local or federal legislation. Federal law is the main part of law or legal action created by the federal government of a particular country. A federal government is the system, which splits up power between smaller local governments and a strong national government (Player and Sperino 2017). A federal government is constructed when a team of various political units, such as provinces or states combine together in a federation, nominating their individual rule and many authorities to the central government while reserving or retaining other restricted powers. When such an act occurs, Academics For Academics will immediately terminate its membership with the violator and will deliver no legal assistance and protection. Academics For Academics or A4A is a Non-Government Organization or NGO that is sponsored by the donations of public. Since, this is run by the donations; there is no liability that A4A has to pay.
The above discussion is on the case study of a Non-Government Organization or NGO Academics for Academics or A4A. The discussion is absolutely justified. Registering with Academics for Academics is one of the best options for any private college, university or any professional. The professionals, who have an interest in teaching a subject, development of curricula for a member institution or supervising a research project, can register their interests with A4A (Demirkan and Delen 2013). This NGO recruits different professionals from all over the world, which creates a cultural diversity. After the professionals are recruited and they become members of A4A, the accommodation, meals, travel expenses and medical expenses are taken care by A4A. These members are recruited for short-term assignments and projects, no matter where the professional is located. As soon as a university or a college becomes the member of Academics For Academics, the information provided by the member, will be exclusively the property of Academics For Academics or A4A and the respective member of that assignment. Nobody else can access that data and information (Peltier 2013). This rule is applicable for everything related to the Non-Government Organization except for the examinations, marked assignments, and emails. The information and data is handled and stored by only the authorized users. Without the permission of Academics for Academics, no user has access to that information (Crossler et al. 2013). Breaching of information is highly prohibited in the information security system of A4A. If anybody is found breaching or violating the rules of Academics For Academics, strict legal actions are taken against him or her and he/she might end up in jail. Systems management is the management of computer-integrated systems that handles and stores all information and security related work in Academics For Academics. This systems management does multiple tasks such as storage management, security management, anti-virus and anti-malware management, hardware inventories, network capacity, utilization monitoring, capacity monitoring, software installation and software inventory (Laudon et al. 2012). In the event of inappropriate use and access of information and data, Academics For Academics has implemented strict laws and legal action. When a prohibited user is found to access information that is not appropriate for him, he will get a warning at first, and after that, strict legal actions will be taken against him (Soomro, Shah and Ahmed 2016). All sort of violations of this issue specific security policy or ISSP are reported to the direct report manager of Academics For Academics or A4A, who will in turn report the violation to the Information Security department. The Issue Specific Security Policy or ISSP is analyzed on a regular basis or changed and altered whenever needed. The technology is getting innovated every day, which needs regular up gradation. The existing policies are reviewed and modified by the new policies, which makes it easier to be kept secure and safe. All policy review and modification is done by the authorized head manager of Academics For Academics (Kearney et al. 2016). Policy review and policy modification is extremely important for all Issue Specific Security Policy or ISSP. Academics for Academics is sponsored by the donations of public. A4A has no liability to pay off. Therefore, it can be concluded that, the above discussion is justified.
References
Bunakov, V., Jones, C., Matthews, B. and Wilson, M., 2014. Data authenticity and data value in policy-driven digital collections. OCLC Systems & Services: International digital library perspectives, 30(4), pp.212-231.
Carlisle, J.B., 2012. The analysis of 168 randomised controlled trials to test data integrity. Anaesthesia, 67(5), pp.521-537.
Coronel, C. and Morris, S., 2016. Database systems: design, implementation, & management. Cengage Learning.
Crossler, R.E., Johnston, A.C., Lowry, P.B., Hu, Q., Warkentin, M. and Baskerville, R., 2013. Future directions for behavioral information security research. computers & security, 32, pp.90-101.
Demirkan, H. and Delen, D., 2013. Leveraging the capabilities of service-oriented decision support systems: Putting analytics and big data in cloud. Decision Support Systems, 55(1), pp.412-421.
Ifinedo, P., 2012. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31(1), pp.83-95.
Kearney, W.D., Kearney, W.D., Kruger, H.A. and Kruger, H.A., 2016. Theorising on risk homeostasis in the context of information security behaviour. Information & Computer Security, 24(5), pp.496-513.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2021). Developing A Copyright Compliance Policy For Academics In An Essay.. Retrieved from https://myassignmenthelp.com/free-samples/coit20263-information-security-management/about-copyright-compliance-policy.html.
"Developing A Copyright Compliance Policy For Academics In An Essay.." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/coit20263-information-security-management/about-copyright-compliance-policy.html.
My Assignment Help (2021) Developing A Copyright Compliance Policy For Academics In An Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/coit20263-information-security-management/about-copyright-compliance-policy.html
[Accessed 19 August 2024].
My Assignment Help. 'Developing A Copyright Compliance Policy For Academics In An Essay.' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/coit20263-information-security-management/about-copyright-compliance-policy.html> accessed 19 August 2024.
My Assignment Help. Developing A Copyright Compliance Policy For Academics In An Essay. [Internet]. My Assignment Help. 2021 [cited 19 August 2024]. Available from: https://myassignmenthelp.com/free-samples/coit20263-information-security-management/about-copyright-compliance-policy.html.