Many policies exist in today’s modern organizations that help them to function effectively and efficiently. Section 12.5.1.3 (Information Security Governance by Brotby) mentions different governance policies without going into any detail with regard to what goes into these policies.
For this discussion: 500 words due 2/18/2023
https://resources.infosecinstitute.com/topic/essentials-acceptable-use-policy/
· Find an article (preferably peer-reviewed) that discusses one of the policies mentioned in the above section (any one of the policies will do – it is your choice)
· Read the article, and (if you can find supporting information from a qualified website (maybe an organization that has posted a policy), use that information too)
· Provide a summary of the article and supplemental information source
· Upload the article and a PDF of the information source if you can, or supply the URL to the information source
· Besides the summary, provide information as to why you selected the policy and information source