1a: Case Study 1 Snowfall and a stolen laptop
Consider Ash Rao’s role as Dean of the Saunders College of Business. How important is his laptop to him? What information might he have on that machine?
Evaluate the steps that Dave Ballard and Nick Francesco took in response to Dean Rao’s email informing them that his laptop had been stolen.
Assume you are tasked with designing a new policy that highlights information security best practices related specifically to mobile devices at RIT, including laptops, smartphones, and tablets. The new policy should supplement RIT’s Information Security Policy and Acceptable Use Policy (case Exhibits 4 and 5). What practices would you recommend? How could you make staff aware of the policy and encourage their compliance?