What items would you include in an organization’s IT Security Policy Manual that defines the acceptable use of company-owned computer systems? In your response, include the following considerations:
What are the risks to the organization if such a policy isn’t in place?
What are the advantages of planning for every possible scenario? What are the disadvantages of this approach?
What are the advantages of making the policy more generic? What are the disadvantages of this approach?