By going through the link mentioned below. create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on). You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not. Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit. Link to go through: https://youtu.be/i-HIXgjWd-E Feedback Comments by professor: You need to write the steps based on what actions school should take when the student leaves prematurely  Accessibility and scope- How would you change the accessibilty when the student leaves? You should write about that  Classification of data- What data should be kept as confidential by the student?  You need to answer it based on the scenario.  Please attempt again Note: I have been graded 0 for the work which is done by other tutor and now that tutor is not taking the responsibility so please good work needed. Attached is the previous work done.

Step-by-Step IT Security Policy for Handling User Accounts/Rights for a Prematurely Departing Student

Introduction:
When a student leaves a school prematurely, whether due to dropping out, expulsion, or any other reason, it is crucial for the school to have a well-defined IT security policy in place. This policy should outline the necessary steps to ensure the appropriate handling of the student’s user accounts and access rights to protect the school’s data and resources. Additionally, special considerations should be given to students who may have had access to privileged resources, such as assistants to faculty members or lab assistants in computer labs. This document will provide a step-by-step guide for developing an IT security policy for handling user accounts/rights of prematurely departing students.

1. Accessibility and Scope:
The first step in developing an IT security policy for prematurely departing students is to assess the accessibility of the student’s user accounts and determine the scope of the policy. This involves identifying all the systems, applications, and resources to which the student had access.

1.1 Identifying User Accounts:
The school’s IT department should collaborate with relevant faculty members and department heads to compile a list of all user accounts associated with the departing student. This list should include email accounts, learning management systems, shared drives, databases, and any other resources the student had access to during their time at the school.

1.2 Determining Access Levels:
Once the user accounts have been identified, the next step is to determine the access levels associated with each account. This may vary depending on the student’s roles and responsibilities within the school. For example, if the student served as an assistant to a faculty member, they may have had elevated privileges that allowed access to sensitive information or administrative systems.

1.3 Prioritizing Accounts:
Based on the determined access levels, it is important to prioritize the accounts that require immediate attention. Start with accounts that have elevated privileges or access to sensitive data.

2. Disabling and Deleting User Accounts:
After identifying the user accounts and determining their access levels, the next step is to disable and delete these accounts to prevent unauthorized access and secure the school’s data.

2.1 Disabling User Accounts:
The IT department should promptly disable all identified user accounts associated with the departing student. This can usually be done through an administrative panel or user management system. Disabling the accounts ensures that the student can no longer log in or access any resources.

2.2 Deleting User Accounts:
In addition to disabling the accounts, it is essential to take the necessary steps to permanently delete the information associated with the departing student from the school’s systems and databases. This will minimize the risk of any residual data being accessed or misused.

2.3 Verification and Documentation:
To ensure accountability and maintain a record of the actions taken, it is important to verify and document the disabling and deletion of user accounts. Record the date, time, and individual responsible for carrying out these actions.

3. Data Classification and Confidentiality:
A crucial aspect of the IT security policy for prematurely departing students is the classification of data and determining which data should be kept confidential by the student.

3.1 Identifying Confidential Data:
Based on the student’s roles and responsibilities, identify any confidential or sensitive data that may have been accessed by the student during their tenure. Examples may include student records, financial information, research data, or personally identifiable information.

3.2 Confidential Data Handling:
Once confidential data has been identified, it is important to take appropriate steps to protect it. This may involve encrypting files, restricting access to specific individuals, or moving the data to secure storage locations.

3.3 Communicating Confidentiality Obligations:
Ensure that the departing student is aware of their obligations regarding the confidentiality of any data they may have accessed. Provide clear guidelines and instructions on how to handle confidential data and emphasize the importance of data security and privacy.

4. Review and Monitoring:
The final step in the IT security policy for handling prematurely departing students is to establish a review and monitoring process. This ensures that the policy remains effective and aligned with evolving student scenarios and technological advancements.

4.1 Periodic Policy Review:
Regularly review the IT security policy to ensure its accuracy and effectiveness. Consider any new user accounts or access rights that may have been introduced since the last review and update the policy accordingly.

4.2 Monitoring User Activity:
Implement mechanisms, such as auditing tools or user activity logs, to monitor and track user behavior. This can help identify any potential unauthorized access or suspicious activity associated with a prematurely departing student.

Conclusion:
A well-defined IT security policy is essential for handling user accounts and rights of prematurely departing students. By following the step-by-step guide provided in this document, schools can ensure the secure management of user accounts and protect sensitive data and resources. Regular policy review and monitoring are crucial to adapt to changing scenarios and maintain a high level of IT security.

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.


Click Here to Make an Order Click Here to Hire a Writer