SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsResponsibility for investigating acceptable computer use violations often falls within the scope of the Information Technology department of an organization, because that is where the technical expertise resides. Either the system administrator or a focused information security response team member becomes the coordinating point of the effort. But is acceptable use really an Information Security policy, or is it a Human Resources policy? Where does the Legal department fit into the equation? This paper focuses on the Information Technology and Information Security ramifications of acceptable computer use policy and attempts to show how responsibility can be shared with the less technical Human Resources and Legal departments. The goals of the policy are to (1) meet productivity goals of the Human Resources department; (2) meet liability concerns of the Legal department; (3) protect the organization's information and technical resources; and (4) meet the security goals of the Information Technology and Information Security departments.