Using the guidelines provided Below, create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).
-You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.
Recognizing the importance of security policies
Understanding the various policies and the rationale for them.
Knowing what elements go into good policies
Creating policies for network administration.