1.Choose two of the following four topics: a.BYOD
b.Social media plan
c.Outsourcing
d.Computer use policy for the workplace
2.Visit these websites to find additional examples of social media and IS policies:
a.Social Media Governance at: https://socialmediagovernance.com/policies/
b.Indiana Wesleyan University Policies at: https://myiwu.indwes.edu/directory/businessaffairs/riskmanagement/Pages/University-Policies.aspx
3.Create a five-paragraph policy for each topic you chose in Step 1 (10 paragraphs in total).
4.Relate your policies to the five major course outcomes: a. Distinguish how organizational policy affects information technology security.
b. Evaluate the manager’s role in the appropriate integration of technology within the organization.
c. Formulate sound communication strategies for business situations.
d. Assess the technological tools and skills necessary for managers.
e. Apply information technology ethical standards and a biblical perspective to business situations.