Imagine that you work for an organization that has no Internet use policy; employees use the Internet in whatever way they want using company-owned personal computers (PCs). Could this cause a problem for the organization? Explain the importance of information security policies and the role they play in ensuring sound and secure business information. Discuss the following IT security policies and the level of protection each policy provides in the context of the scenario:
Internet use policy
External device use policy
Employee identity (ID) policy
Computer use policy
How would each policy help the situation described in the scenario? How might each policy hinder the situation described in your assigned scenario? Include your rationale for whether each policy helps or hinders the situation in your assigned scenario. Submit your initial post (minimum 250 words) by Thursday and at least two (2) responses (minimum 100 words each) to others initial posts by Sunday.