Information Technology Security Policy

Create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on). Consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.Read Chapter 10 of the Easttom text, Security PoliciesPrimary topics:

× How can I help you?