Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Information Policy - Essay Example

Comments (0) Cite this document
According to Cobb (2012), sixty-eight percent of people in America have never had any training on protecting their computers and personal information. Sixty-four percent had not received any computer security training from their employer, and 4% did not even remember if they had…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93% of users find it useful
Information Policy
Read Text Preview

Extract of sample "Information Policy"

Information Policy Information Policy Question According to Cobb , sixty-eight percent of people in America have neverhad any training on protecting their computers and personal information. Sixty-four percent had not received any computer security training from their employer, and 4% did not even remember if they had received any such training. The statistics clearly indicate a lack of sufficient awareness and training on cyber security in the United States. Employers and the state should create awareness programs on cyber safety and ISP required to communicate cyber safety issues to their customers
Making cyber security training such as annual information assurance mandatory for all is not feasible. Institutions such as military should make it necessary as any information in the military is sensitive to national security. However, not all information is that sensitive. For example, access to class notes would not require such training as it would not pose a security threat. Such pieces of training whether in the workplace or by internet service providers might not be possible because of the hyped number of users and the costs involved.
When a cyber-attack occurs, the cost of the breach is felt by the consumer, of computer-based service (Steven, Bucci, Rosenzweig & Inserra, 2013). The ISP and manufacturers of the software are not liable for the attack as per their contractual agreements. Most individuals due to lack of cyber security awareness tend to rely on antivirus protection applications. The software is for sale, and consumers who want security are encouraged to purchase them. Depending on the contractual agreements, antivirus providers can be sued if a malware commit a cyber-crime they claim they can prevent.
Question 2
For a stable and secure internet, three web characteristics must be preserved. The characteristics are permissionless innovation, collaboration and open access (Contreras, DeNardis & Teplinsky, 2013). ISPS, therefore, have a duty to ensure they preserve the above characteristics while providing that public access does not involve a breach of other people’s privacy. They should act when a violation of privacy occurs.
According to Wired (2015), ISPs should search and shut off internet access to compromised PCs reported to them by cyber security companies. ISPs should ensure their subscribers are protected. One of the measures they should take is to blacklist a computer and users who use their Internet to commit unethical practices. ISPs should also share the information with other ISPs to ensure the dishonest users are blacklisted on their ISPs too.
Customers should be allowed to sue an ISP for cyber-attacks but only in some instances. One instance when ISPs should be sued is when a cyber-security company has issued them with information about a user or computer that performs cybercrime. If the ISP does not blacklist the user or computer, and the user or computer carries out cybercrime, then the ISP should be sued for negligence.
Question 3
A multi-stakeholder governance of internet between government, civil societies, and private sector is necessary to preserve the internet (Contreras, DeNardis & Teplinsky, 2013). The role of the internet as a shared resources and it architectural blurring of time and space provides unique challenges for internet governance. Therefore, as President Obama indicated there must be a multi-stakeholder partnership to deal with the challenges.
Internet neutrality or open internet if allowed would enable users to access the internet without interference from the government and network interference, and allow network operators to transmit content and applications deemed illegal without any liability. Although an open internet would clearly eliminate the digital divide, it would create a lot of unethical practices. Some level of internet governance incorporating all stakeholders should be used. (Deibert & Nishitisha, 2012)
 Cobb, S. (2012). Study finds 90 percent have no recent cybersecurity training. We Live Security. Retrieved 9 June 2015, from
Contreras, J., DeNardis, L., & Teplinsky, M. (2013). Mapping Todays Cybersecurity Landscape. American University Law Review, 62(5), 1114-1130. Retrieved from
Deibert, R., & Nishitisha, M. (2012). Global Governance and the Spread of Cyberspace Controls.Global Governance, 19(2012), 239-361. Retrieved from
Steven P., Bucci, P., Rosenzweig, P., & Inserra, D. (2013). A Congressional Guide: Seven Steps to U.S. Security, Prosperity, and Freedom in Cyberspace. The Heritage Foundation. Retrieved 9 June 2015, from
Wired. (2015). Desperate Botnet Battlers Call for an Internet Drivers License. Retrieved 9 June 2015, from Read More
Cite this document
  • APA
  • MLA
(“Information Policy Essay Example | Topics and Well Written Essays - 500 words - 2”, n.d.)
Information Policy Essay Example | Topics and Well Written Essays - 500 words - 2. Retrieved from
(Information Policy Essay Example | Topics and Well Written Essays - 500 Words - 2)
Information Policy Essay Example | Topics and Well Written Essays - 500 Words - 2.
“Information Policy Essay Example | Topics and Well Written Essays - 500 Words - 2”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


Information security policy

The researcher states that as this is an information age, information is now in the form of digits that flows on an electronic computerized network. Organizations are dependent on these digital communication channels for transferring and exchanging classified information such as confidential information, mission critical information and information that is published for the people. As information is a blood life of any organization, it is vital to protect information by implementing physical, logical and environmental controls. In the context of protecting information security, three fundamental factors must be considered to make use of digitized information in an effective manner i.e. Confidentiality, Integrity and Availability....
10 Pages (2500 words) Essay

Information Policy

...Running Head: INFORMATION POLICY Information Policy s Information Policy Define Confidential Information Confidential Information Confidential Information" can be defined as any technical, financial, or business information or materials regarding the business an organization that is disclosed or given by the organization to Confidant, or that is taken from such information or materials. Confidential Information maybe disclosed in verbally in writing, visually, digitally, electronically, or physical form by the authorization of the organization. The unauthorized disclosure of information will humiliate, hurt or prejudice the organization. Such information does not reach the in the public domain, until it is communicated by unauthorized...
14 Pages (3500 words) Essay

Information Security Policy

...Information Assurance Policy for Strega Oil and Gas ltd Contents of the Report Document Control Information Security Policy Statement 2) Introduction a. A Brief on the Company b. Policy Statement c. Need for a Security Policy d. Purpose and Scope of the Policy e. Who is affected by the Policy f. Where the Policy applies g. Policy Objectives h. Review and Audit 3) Acceptable Use 4) Security Management and Responsibilities a. Data Owner b. Systems Development c. Management Responsibilities d. Staff Responsibilities 5) Flow of Information a. Sharing data with branches and other companies b. Sharing data with non-partner companies c. Securing the Flow of Information 6) Risk Assessment a. Risk to Data b. Risk of Computer Crime c. Risk...
39 Pages (9750 words) Essay

Information policy

... and suppression” (Schrader) The information policy in a democratic country always focuses on democratic values rather than autocratic approaches like what is happening in China where freedom of expression is controlled. Since internet filtering may result in the blockage of certain sites, the government policy must be formulated in such a way that the proposed restrictions may not utilized for political gain. The governments can easily misuse information policies to their own advantages if it is not formulated correctly. (Maurushat & Watt) Stakeholders Stakeholders in the formulation and implementation of information policy are the politicians or the members of the government, the media people or groups, and the public. Government...
5 Pages (1250 words) Essay

Information Policy

...Information Policy Information Privacy and Security Information Security and Privacy is of importance to me because it has augmented in the last few decades due to the explosion of IT. It has raised many questions when it comes to legal developments influencing every business (Schwalbe, 2010). Any business that gathers, uses and distributes information faces more challenges as new privacy and security laws emerge each day. Businesses are now experiencing a significant risk to privacy due to increased tort litigation, wide media attention, and enforcements from governments. Perhaps the need for information privacy and security will continue to escalate with the advancement in IT, and this correlation is of significant interest. I am...
1 Pages (250 words) Essay

Information Policy

...Information Policy Government’s Surveillance of Websites In the contemporary past, there have been increased Government initiatives aimed at preventing websites from releasing highly controversial and damning information to the public. Despite availing more information on highly important topics to the public, these exposé cannot be justified as significantly contributing to the general well-being of the public and keeping the public informed. Indeed, given the catastrophic impacts that the release of sensitive information by websites can have, it is worth sacrificing ones freedom of expression to prevent the leakage of confidential information, not meant for the public. Additionally, the release of sensitive information by websites has...
2 Pages (500 words) Essay

Information Policy

...Copyright, Patents and Trademarks Question Information Copyright and Coase Theorem According to Grimmelmann , Google attempts to create a searchable index of books. Google does so by taking photographs of a book pages using a special camera and later analyze them to recognize pages on the book. For books under copyright, Google only showed snippets of short sections for texts around the terms a user searches. In 2005, copyright owners sued Google for copyright infringement. The two parties attempted to reach a settlement, but the settlement was rejected by the court (Grimmelmann, 2011). Under the settlement agreement, an opt-out system would be applied. In the opt-out system, Google could sell the book unless the copyright owner objected...
2 Pages (500 words) Essay

Information Policy

...COPYRIGHT, PATENTS & TRADEMARKS Comment I do agree that piracy can be both a criminal issue and a civil issue. However,from your response it seems that you are against actions that fight piracy. When you indicate that the three strike policy is ridiculous and disagree with making ISPs assist in enforcing copyright, it seems as though you are for piracy. Do you believe that copyrights and trademarks deserve protection? I believe that trademarks and copyright are worth protecting. Someone’s hard work, originality and sacrifice should not be allowed to go to waste. However, I also agree that copywriters should find more innovative ways of marketing their products and charge reasonable for them. All should protect copyrights especially by ISPs...
1 Pages (250 words) Essay

Information Policy

Copyright, Patents and Trademarks Comment Three I agree that the three strike rule is justified. However, the issue is how the copyright infringement is detected. Internet service providers (ISPs) trace packet data to determine if a user is violating copyrights or trademarks (DeNardis, 2015). How does this technique work? Is it a violation of privacy? Privacy issues are difficult to handle, especially when dealing with copyright matters. DeNardis (2015) notes that entertainment earnings declined roughly 50 percent - from $14.6 billion to $7.7 billion - in the decade after file-sharing site Napster emerged. However, domain shutdowns and three strike rule have helped reduce cases of piracy. The problem is on peer-to-peer (P2P) shari...
1 Pages (250 words) Essay

Information Policy

...Information Policy Q Education is everyone’s fundamental right and is key to any country’s future. However, it comes at a price.The failure to invest adequately in education is very expensive for a society in aspects of public spending, deteriorating health, increased crime rates, and slow economic growth (Economic Policy Institute, 2012). All the world countries would do all it takes to ensure children achieve the competencies required for a self-fulfilled life in economic independence. The economic downturns have limited the education budgets in many nations. Even though investment in education is very crucial, it is restricted by the budget constraints of the available resources (, 2015). The world today...
1 Pages (250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Information Policy for FREE!

Contact Us