Really good video guys. I like how you used an animated video to keep the user interested and gave all the important information. Also looking at your document I really enjoyed the layout and formatting. I like how everything was easy to find and read. This can be really helpful and can be used as quick reference if needed, for example if a user is not sure of how the policy should be enforced for if the user is not positive on how to go about something. They could easily find that out by quickly glancing at your document.
I like how you guys set up the Policy it reminded me of some of the policies I have at works and really look legit. The flow of everything was perfect. I also liked the video how you guys have examples and played out a scenario in the video with the cartoon. Good job
Thanks for sharing the insightful video. Your definition of Memory Drive Usage Policy was quite precise and the way you connected the 3rd party vendors and employees as critical resources to asset safely sums it all. The example you gave about how customer data can be subject to theft in a coffee shop or any sitting for a fact, is a real eye opener, as this incident could potentially lead to millions of dollars’ worth of sensitive information about our customers. Something really essential to learn from this video is the fact that one should report any breach as soon as possible to the Information Security (IS) team in order for them to take risk mitigation steps.
Great video, and good job on the description of the policy. I like how you addressed the need for the policy update in the beginning of the presentation, as people are usually resistant to change, or may feel the policy does not apply to them. It’s important to address this need early in the presentation so you don’t lose the attention of the employees.
On behalf of team 1 thank you all for your comments. Mike did an excellent job on suggesting and creating the video. As well as Patrick working through the vocals with a cold. I believe the video (for all the projects) was the main source of information and reaching the intended audience’s interest.
The four of us (Lezlie Jiles, Brandan Mackowsky Patrick Destafano, and Michelangelo Collura) all worked hard on the documented policy, but my favorite portion of the project was the video.
Very nice policy and presentation Team 1! The pace of the video made it very easy to follow through the policy at the same time. I felt like I had a good understanding of what my responsibilities would be if I were issued a usb device and the video helped knock out the what not to do sections.
Duy Nguyen says
Nice video guys, I didn’t realize there were so many platforms for this.
Jonathan Duani says
Really good video guys. I like how you used an animated video to keep the user interested and gave all the important information. Also looking at your document I really enjoyed the layout and formatting. I like how everything was easy to find and read. This can be really helpful and can be used as quick reference if needed, for example if a user is not sure of how the policy should be enforced for if the user is not positive on how to go about something. They could easily find that out by quickly glancing at your document.
Heiang Cheung says
I like how you guys set up the Policy it reminded me of some of the policies I have at works and really look legit. The flow of everything was perfect. I also liked the video how you guys have examples and played out a scenario in the video with the cartoon. Good job
Donald Hoxhaj says
Thanks for sharing the insightful video. Your definition of Memory Drive Usage Policy was quite precise and the way you connected the 3rd party vendors and employees as critical resources to asset safely sums it all. The example you gave about how customer data can be subject to theft in a coffee shop or any sitting for a fact, is a real eye opener, as this incident could potentially lead to millions of dollars’ worth of sensitive information about our customers. Something really essential to learn from this video is the fact that one should report any breach as soon as possible to the Information Security (IS) team in order for them to take risk mitigation steps.
BIlaal Williams says
Great video, and good job on the description of the policy. I like how you addressed the need for the policy update in the beginning of the presentation, as people are usually resistant to change, or may feel the policy does not apply to them. It’s important to address this need early in the presentation so you don’t lose the attention of the employees.
Lezlie Jiles says
On behalf of team 1 thank you all for your comments. Mike did an excellent job on suggesting and creating the video. As well as Patrick working through the vocals with a cold. I believe the video (for all the projects) was the main source of information and reaching the intended audience’s interest.
The four of us (Lezlie Jiles, Brandan Mackowsky Patrick Destafano, and Michelangelo Collura) all worked hard on the documented policy, but my favorite portion of the project was the video.
Michael Gibbons says
Very nice policy and presentation Team 1! The pace of the video made it very easy to follow through the policy at the same time. I felt like I had a good understanding of what my responsibilities would be if I were issued a usb device and the video helped knock out the what not to do sections.