IT Compliance Documentation Enhancement

Main contact
Fletcher Technical Community College
Schriever, Louisiana, United States
Dean of BEAMS
2
Timeline
  • April 21, 2025
    Experience start
  • July 24, 2025
    Experience end
Experience
1/1 project matches
Dates set by experience
Preferred companies
Louisiana, United States
Any company type
Any industries

Experience scope

Categories
Security (cybersecurity and IT security)
Skills
security policies it security documentation regulatory compliance business communication collaborative communications
Learner goals and capabilities

This experience is designed for learners who are developing skills in information security and regulatory compliance. Participants will gain hands-on experience by evaluating and enhancing existing security documentation to ensure it meets governmental standards. By applying their knowledge of security protocols and regulatory requirements, learners will be able to provide actionable recommendations that help companies align with compliance mandates efficiently.

Learners

Learners
Undergraduate
Beginner, Intermediate levels
10 learners
Project
5 hours per learner
Educators assign learners to projects
Teams of 2
Expected outcomes and deliverables
  • Comprehensive evaluation report of current security documentation
  • List of recommended improvements for compliance alignment
  • Revised security policy documents
  • Annotated checklist for ongoing compliance monitoring
  • Presentation summarizing findings and recommendations
Project timeline
  • April 21, 2025
    Experience start
  • July 24, 2025
    Experience end

Project Examples

Requirements
  • Review and update a company's data retention policy to comply with new regulations
  • Analyze and suggest improvements for an organization's access control documentation
  • Evaluate and enhance a company's incident response plan documentation
  • Assess and update the security measures outlined in a company's data disposal policy
  • Conduct a gap analysis on current security documentation against industry standards
  • Revise a company's privacy policy to ensure compliance with recent legal changes
  • Develop a compliance checklist for a company's information security practices
  • Create a training module for employees on updated security compliance procedures