Project 2

ACCT 620: Cyber Accounting: Management and Compliance

I. Title:
Analysis of Corporate Policies: Internet Usage Policy, Computer Policy and
Privacy Policy

Don't use plagiarized sources. Get Your Custom Essay on
Project 2
Just from $13/Page
Order Essay

II. Introduction

After working as a cyber accountant an international consulting firm for a few
years, you resign to take a position in the internal audit department of a publicly
traded company. To brush up on the basics of internal auditing, you decide to
browse the Website of the Institute of Internal Auditors, North America where you
find two documents to read.

You decided to browse the Website of the Institute of Internal Auditors, North
America. After browsing the site to get a feel for this professional organization,
you, locate and read two documents:

1) 2017 standards of the International Standards for the Professional
Practice of Internal Auditing (Standards), which can be found under
Standards and Guidance and Mandatory Guidance, and

2) The Insight that Internal Brings to Cybersecurity in the IIA publication,
Tone at the Top, June 2017, Issue 82.

At the end of your first week on the job, your supervisor came to your office and
asked you to review three different corporate policies related to computer and
internet security. The supervisor emphasized that it is important for you to learn
the value of writing a policy statement and the importance of implementing
policies in organizations from management’s viewpoint and also from the
perspectives of employees, customers, and other stakeholders.

All three policies you will be updating impact the company’s accounting and
financial information systems and related financial reporting. These policies
need to be analyzed to determine what they currently include and updated for
currency. Specifically, your supervisor asked you to update the following three
policies that are currently in place in your organization:

Policy Reviews:

1. Acceptable use policy,
2. Internet use policy, and the
3. Privacy policy.

III. Steps to Completion

1. To get started, select any publicly-traded corporation, and locate its most
recent annual report.

2. Rewrite any sections of the Acceptance Use Policy, Internet Use Policy,
and Privacy Policies that you find unclear or that need updating to be
current. Note: you may have to do a search of your chosen corporation’s
website to find the above policies. This will take you some time, so please
get started on this search, early enough. You may find all 3 policies; in
many cases, you may find just one of these three policies for your
chosen corporation, most likely the Privacy Policy. Use whatever
policy (policies) you have can find for your chosen corporation to get
started on this Project.

3. Download the NIST 800-53 and the SANS Technical Institute templates.
Do a Google search to get the most recent templates.

4. As the basis for writing updates to the policies, use the templates provided
by NIST 800-53 and the SANS Technical Institute to complete your
recommendations for your supervisor.

5. For each of the three policies that you redrafted/updated/drafted from
scratch, explain the generally accepted policy guidance provided by
organizations such as NIST, AICPA and/or the ISO 27001 framework, and
by what means, practically, in simple language that your supervisor can
understand.

a. Note: The NIST, AICPA, and ISO frameworks have been vetted by
panels of experts similar to the Financial Accountings Standards
Board (FASB) issuance of Generally Accepted Accounting
Principles (GAAP).

IV. Deliverables

1. One Word document written in APA Style format.
a. In total, the document will be 8-10 pages using APA, double-

spaced, excluding the (a) cover page and the (b) Reference page.
b. For each of the three policies, write your recommendation for

changes to each policy, excluding the cover sheet and reference
list.

V. Helpful tips and hints

 If needed, review APA style formatting again to prepare for writing
Project 2.

 Prepare a draft version of your report 10 days before it is due.
 Ask a classmate, friend, or family member to read your report before

submitting it to the Graduate Writing Center.
 Submit your draft to the Graduate Writing Center at least 1 week before

this project is due.

 Make edits to your report after reviewing feedback from the writing center
tutors.

 Submit Project 2 on or before the due date.
 Ask your supervisor (professor) questions as needed.

VI. Rubric

 Please use the rubric in your LEO classroom for Project 2.

SANS Institute 2013 – All Rights Reserved Page 1

Consensus Policy Resource Community

Internet usage Policy

Free Use Disclaimer: This policy was created by or for the SANS Institute for the
Internet community. All or parts of this policy can be freely used for your organization.
There is no prior approval required. If you would like to contribute a new policy or
updated version of this policy, please send email to policy-resources@sans.org.

Things to Consider: Please consult the Things to Consider FAQ for additional
guidelines and suggestions for personalizing the SANS policies for your organization.

Last Update Status: Retired

  • 1. Overview
  • Internet connectivity presents the company with new risks that must be addressed to safeguard
    the facility’s vital information assets. These risks include:

    Access to the Internet by personnel that is inconsistent with business needs results in the misuse
    of resources. These activities may adversely affect productivity due to time spent using or
    “surfing” the Internet. Additionally, the company may face loss of reputation and possible legal
    action through other types of misuse.

    All information found on the Internet should be considered suspect until confirmed by another
    reliable source. There is no quality control process on the Internet, and a considerable amount of
    its information is outdated or inaccurate.

    Access to the Internet will be provided to users to support business activities and only on an as-
    needed basis to perform their jobs and professional roles.

  • 2. Purpose
  • The purpose of this policy is to define the appropriate uses of the Internet by
    employees and affiliates.

  • 3. Scope
  • The Internet usage Policy applies to all Internet users (individuals working for the company,
    including permanent full-time and part-time employees, contract workers, temporary agency
    workers, business partners, and vendors) who access the Internet through the computing or
    networking resources. The company’s Internet users are expected to be familiar with and to
    comply with this policy, and are also required to use their common sense and exercise their good
    judgment while using Internet services.

    3.1 Internet Services Allowed

    mailto:policy-resources@sans.org

    SANS Institute 2013 – All Rights Reserved Page 2

    Consensus Policy Resource Community

    Internet access is to be used for business purposes only. Capabilities for the following standard
    Internet services will be provided to users as needed:

    • E-mail — Send/receive E-mail messages to/from the Internet (with or without document
    attachments).

    • Navigation — WWW services as necessary for business purposes, using a hypertext
    transfer protocol (HTTP) browser tool. Full access to the Internet; limited access from the
    Internet to dedicated company public web servers only.

    • File Transfer Protocol (FTP) — Send data/files and receive in-bound data/files, as
    necessary for business purposes.

    • Telnet — Standard Internet protocol for terminal emulation. User Strong Authentication
    required for Internet initiated contacts into the company.

    Management reserves the right to add or delete services as business needs change or conditions
    warrant.

    All other services will be considered unauthorized access to/from the Internet and will not be
    allowed.

    3.2 Request & Approval Procedures
    Internet access will be provided to users to support business activities and only as needed to
    perform their jobs.

    3.2.1 Request for Internet Access
    As part of the Internet access request process, the employee is required to read both this Internet
    usage Policy and the associated Internet/Intranet Security Policy The user must then sign the
    statements (located on the last page of each document) that he/she understands and agrees to
    comply with the policies. Users not complying with these policies could be subject to
    disciplinary action up to and including termination.

    Policy awareness and acknowledgment, by signing the acknowledgment form, is required before
    access will be granted.

    3.2.2 Approval
    Internet access is requested by the user or user’s manager submitting an IT Access Request form
    to the IT department along with an attached copy of a signed Internet usage Coverage
    Acknowledgment Form.

    3.2.3 Removal of privileges
    Internet access will be discontinued upon termination of employee, completion of contract, end
    of service of non-employee, or disciplinary action arising from violation of this policy. In the
    case of a change in job function and/or transfer the original access code will be discontinued, and

    SANS Institute 2013 – All Rights Reserved Page 3

    Consensus Policy Resource Community

    only reissued if necessary and a new request for access is approved.

    All user IDs that have been inactive for thirty (30) days will be revoked. The privileges granted
    to users must be reevaluated by management annually. In response to feedback from
    management, systems administrators must promptly revoke all privileges no longer needed by
    users.

  • 4. Policy
  • 4.1 Resource Usage
    Access to the Internet will be approved and provided only if reasonable business needs are
    identified. Internet services will be granted based on an employee’s current job responsibilities.
    If an employee moves to another business unit or changes job functions, a new Internet access
    request must be submitted within 5 days.

    User Internet access requirements will be reviewed periodically by company departments to
    ensure that continuing needs exist.

    4.2 Allowed Usage
    Internet usage is granted for the sole purpose of supporting business activities necessary to carry
    out job functions. All users must follow the corporate principles regarding resource usage and
    exercise good judgment in using the Internet. Questions can be addressed to the IT Department.

    Acceptable use of the Internet for performing job functions might include:

    • Communication between employees and non-employees for business purposes;
    • IT technical support downloading software upgrades and patches;
    • Review of possible vendor web sites for product information;
    • Reference regulatory or technical information.
    • Research

    4.3 Personal Usage

    Using company computer resources to access the Internet for personal purposes, without
    approval from the user’s manager and the IT department, may be considered cause for
    disciplinary action up to and including termination.

    All users of the Internet should be aware that the company network creates an audit log reflecting
    request for service, both in-bound and out-bound addresses, and is periodically reviewed.

    Users who choose to store or transmit personal information such as private keys, credit card
    numbers or certificates or make use of Internet “wallets” do so at their own risk. The company is

    SANS Institute 2013 – All Rights Reserved Page 4

    Consensus Policy Resource Community

    not responsible for any loss of information, such as information stored in the wallet, or any
    consequential loss of personal property

    4.4 Prohibited Usage
    Information stored in the wallet, or any consequential loss of personal property.

    Acquisition, storage, and dissemination of data which is illegal, pornographic, or which
    negatively depicts race, sex or creed is specifically prohibited.

    The company also prohibits the conduct of a business enterprise, political activity, engaging in
    any form of intelligence collection from our facilities, engaging in fraudulent activities, or
    knowingly disseminating false or otherwise libelous materials.

    Other activities that are strictly prohibited include, but are not limited to:
    • Accessing company information that is not within the scope of one’s work. This includes

    unauthorized reading of customer account information, unauthorized access of personnel
    file information, and accessing information that is not needed for the proper execution of
    job functions.

    • Misusing, disclosing without proper authorization, or altering customer or personnel
    information. This includes making unauthorized changes to a personnel file or sharing
    electronic customer or personnel data with unauthorized personnel.

    • Deliberate pointing or hyper-linking of company Web sites to other Internet/WWW sites
    whose content may be inconsistent with or in violation of the aims or policies of the
    company.

    • Any conduct that would constitute or encourage a criminal offense, lead to civil liability,
    or otherwise violate any regulations, local, state, national or international law including
    without limitations US export control laws and regulations.

    • Use, transmission, duplication, or voluntary receipt of material that infringes on the
    copyrights, trademarks, trade secrets, or patent rights of any person or organization.
    Assume that all materials on the Internet are copyright and/or patented unless specific
    notices state otherwise.

    • Transmission of any proprietary, confidential, or otherwise sensitive information without
    the proper controls.

    • Creation, posting, transmission, or voluntary receipt of any unlawful, offensive, libelous,
    threatening, harassing material, including but not limited to comments based on race,
    national origin, sex, sexual orientation, age, disability, religion, or political beliefs.

    • Any form of gambling.

    Unless specifically authorized under the provisions of section 4.3, the following activities
    are also strictly prohibited:

    SANS Institute 2013 – All Rights Reserved Page 5

    Consensus Policy Resource Community

    • Unauthorized downloading of any shareware programs or files for use without
    authorization in advance from the IT Department and the user’s manager.

    • Any ordering (shopping) of items or services on the Internet.
    • Playing of any games.
    • Forwarding of chain letters.
    • Participation in any on-line contest or promotion.
    • Acceptance of promotional gifts.

    Bandwidth both within the company and in connecting to the Internet is a shared, finite resource.
    Users must make reasonable efforts to use this resource in ways that do not negatively affect
    other employees. Specific departments may set guidelines on bandwidth use and resource
    allocation, and may ban the downloading of particular file types.

    4.5 Software License
    The company strongly supports strict adherence to software vendors’ license agreements. When
    at work, or when company computing or networking resources are employed, copying of
    software in a manner not consistent with the vendor’s license is strictly forbidden. Questions
    regarding lawful versus unlawful copying should be referred to the IT Department for review or
    to request a ruling from the Legal Department before any copying is done.

    Similarly, reproduction of materials available over the Internet must be done only with the
    written permission of the author or owner of the document. Unless permission from the
    copyright owner(s) is first obtained, making copies of material from magazines, journals,
    newsletters, other publications and online documents is forbidden unless this is both reasonable
    and customary. This notion of “fair use” is in keeping with international copyright laws.

    Using company computer resources to access the Internet for personal purposes, without
    approval from the user’s manager and the IT department, may be considered cause for
    disciplinary action up to and including termination.

    All users of the Internet should be aware that the company network creates an audit log reflecting
    request for service, both in-bound and out-bound addresses, and is periodically reviewed.

    Users who choose to store or transmit personal information such as private keys, credit card
    numbers or certificates or make use of Internet “wallets” do so at their own risk.

    4.6 Review of Public Information
    All publicly-writeable directories on Internet-connected computers will be reviewed and cleared
    each evening. This process is necessary to prevent the anonymous exchange of information
    inconsistent with company business. Examples of unauthorized public information include
    pirated information, passwords, credit card numbers, and pornography.

    SANS Institute 2013 – All Rights Reserved Page 6

    Consensus Policy Resource Community

    4.7 Expectation of Privacy
    4.7.1 Monitoring
    Users should consider their Internet activities as periodically monitored and limit their activities
    accordingly.

    Management reserves the right to examine E-mail, personal file directories, web access, and
    other information stored on company computers, at any time and without notice. This
    examination ensures compliance with internal policies and assists with the management of
    company information systems.

    4.7.2 E-mail Confidentiality
    Users should be aware that clear text E-mail is not a confidential means of communication. The
    company cannot guarantee that electronic communications will be private. Employees should be
    aware that electronic communications can, depending on the technology, be forwarded,
    intercepted, printed, and stored by others. Users should also be aware that once an E-mail is
    transmitted it may be altered. Deleting an E-mail from an individual workstation will not
    eliminate it from the various systems across which it has been transmitted.

    4.8 Maintaining Corporate Image
    4.8.1 Representation
    When using company resources to access and use the Internet, users must realize they represent
    the company. Whenever employees state an affiliation to the company, they must also clearly
    indicate that “the opinions expressed are my own and not necessarily those of the company”.
    Questions may be addressed to the IT Department.

    4.8.2 Company Materials
    Users must not place company material (examples: internal memos, press releases, product or
    usage information, documentation, etc.) on any mailing list, public news group, or such service.
    Any posting of materials must be approved by the employee’s manager and the public relations
    department and will be placed by an authorized individual.

    4.8.3 Creating Web Sites
    All individuals and/or business units wishing to establish a WWW home page or site must first
    develop business, implementation, and maintenance plans. Formal authorization must be
    obtained through the IT Department. This will maintain publishing and content standards needed
    to ensure consistency and appropriateness.

    In addition, contents of the material made available to the public through the Internet must be
    formally reviewed and approved before being published. All material should be submitted to the
    Corporate Communications Directors for initial approval to continue. All company pages are

    SANS Institute 2013 – All Rights Reserved Page 7

    Consensus Policy Resource Community

    owned by, and are the ultimate responsibility of, the Corporate Communications Directors.

    All company web sites must be protected from unwanted intrusion through formal security
    measures which can be obtained from the IT department.

    4.9 Periodic Reviews
    4.9.1 Usage Compliance Reviews
    To ensure compliance with this policy, periodic reviews will be conducted. These reviews will
    include testing the degree of compliance with usage policies.

    4.9.2 Policy Maintenance Reviews
    Periodic reviews will be conducted to ensure the appropriateness and the effectiveness of usage
    policies. These reviews may result in the modification, addition, or deletion of usage policies to
    better suit company information needs.

  • 5. Policy Compliance
  • 5.1 Compliance Measurement
    The Infosec team will verify compliance to this policy through various methods, including but
    not limited to, business tool reports, internal and external audits, and feedback to the policy
    owner.

  • 5.2 Exceptions
  • Any exception to the policy must be approved by the Infosec Team in advance.

  • 5.3 Non-Compliance
  • An employee found to have violated this policy may be subject to disciplinary action, up to and
    including termination of employment.

    Additionally, the company may at its discretion seek legal remedies for damages incurred as a
    result of any violation. The company may also be required by law to report certain illegal
    activities to the proper enforcement agencies.

    Before access to the Internet via company network is approved, the potential Internet user is
    required to read this Internet usage Policy and sign an acknowledgment form (located on the last
    page of this document). The signed acknowledgment form should be turned in and will be kept
    on file at the facility granting the access. For questions on the Internet usage Policy, contact the
    Information Technology (IT) Department.

    SANS Institute 2013 – All Rights Reserved Page 8

    Consensus Policy Resource Community

  • 6 Related Standards, Policies and Processes
  • 6. INTERNET USAGE COVERAGE ACKNOWLEDGMENT FORM
    After reading this policy, please sign the coverage form and submit it to your facility’s IT
    department or granting facility’s IT department for filing.
    By signing below, the individual requesting Internet access through company computing
    resources hereby acknowledges receipt of and compliance with the Internet Usage Policy.
    Furthermore, the undersigned also acknowledges that he/she has read and understands this policy
    before signing this form.
    Internet access will not be granted until this acknowledgment form is signed by the individual’s
    manager. After completion, the form is filed in the individual’s human resources file (for
    permanent employees), or in a folder specifically dedicated to Internet access (for contract
    workers, etc.), and maintained by the IT department. These acknowledgment forms are subject to
    internal audit.

    ACKNOWLEDGMENT

    I have read the Internet Usage Policy. I understand the contents, and I agree to comply with the
    said Policy.

    Location (Location and address)

    Business Purpose

    Name

    Signature ______________________________Date __________________

    Manager/Supervisor Signature_________________Date ___________

  • 7 Definitions and Terms
  • None.

    SANS Institute 2013 – All Rights Reserved Page 9

    Consensus Policy Resource Community

  • 8 Revision History
  • Date of Change Responsible Summary of Change

    Dec 2013 SANS Policy Team Converted format and retired.

      1. Overview
      2. Purpose
      3. Scope
      4. Policy
      5. Policy Compliance
      5.2 Exceptions
      5.3 Non-Compliance
      6 Related Standards, Policies and Processes
      7 Definitions and Terms
      8 Revision History

    ALFRED_TCHALIM_PROJECT_
    2

    by Essokassi alfred TCHALIM

    Submission date: 29-Mar-2020 12:32PM (UTC-0400)
    Submission ID: 1284440643
    File name:

  • ALFRED_TCHALIM_PROJECT_2
  • (60K)
    Word count: 2348
    Character count: 13535

    84%
    SIMILARITY INDEX

    3%
    INTERNET SOURCES

    1%
    PUBLICATIONS

    84%
    STUDENT PAPERS

    1 82%

    2 1%
    3 1%

    Exclude quotes Off

    Exclude bibliography Off

    Exclude matches Off

    ALFRED_TCHALIM_PROJECT_2
    ORIGINALITY REPORT

    PRIMARY SOURCES

    Submitted to University of Maryland, University
    College
    Student Paper

    Submitted to Campbellsville University
    Student Paper

    www.mitre.org
    Internet Source

    FINAL GRADE

    /100

    ALFRED_TCHALIM_PROJECT_2
    GRADEMARK REPORT

    GENERAL COMMENTS

    Instructor

    PAGE 1

    PAGE 2

    Article Error You may need to remove this article.

    Sp. This word is misspelled. Use a dictionary or spellchecker when you proofread your work.

    Sp. This word is misspelled. Use a dictionary or spellchecker when you proofread your work.

    Sp. This word is misspelled. Use a dictionary or spellchecker when you proofread your work.
    Sp. This word is misspelled. Use a dictionary or spellchecker when you proofread your work.
    Article Error You may need to remove this article.

    Article Error You may need to use an article before this word.

    Consider using the article the.

    Article Error You may need to use an article before this word. Consider using the article the.

    Article Error You may need to use an article before this word. Consider using the article the.
    Article Error You may need to use an article before this word. Consider using the article the.

    Missing “,” You may need to place a comma after this word.

    PAGE 3

    Article Error You may need to use an article before this word. Consider using the article the.
    Article Error You may need to use an article before this word. Consider using the article the.

    Article Error You may need to use an article before this word. Consider using the article the.
    Article Error You may need to use an article before this word. Consider using the article the.

    Article Error You may need to use an article before this word. Consider using the article a.

    Frag. This sentence may be a fragment or may have incorrect punctuation. Proofread the sentence to
    be sure that it has correct punctuation and that it has an independent clause with a complete subject
    and predicate.

    PAGE 4

    Article Error You may need to use an article before this word. Consider using the article the.

    Article Error You may need to use an article before this word.

    Wrong Form You may have used the wrong form of this word.

    Article Error You may need to use an article before this word.
    Article Error You may need to use an article before this word. Consider using the article the.

    PAGE 5

    Article Error You may need to use an article before this word. Consider using the article the.
    Article Error You may need to remove this article.
    Missing “,” You may need to place a comma after this word.
    Article Error You may need to use an article before this word. Consider using the article the.

    S/V This subject and verb may not agree. Proofread the sentence to make sure the subject agrees with
    the verb.

    Prep. You may be using the wrong preposition.

    Article Error You may need to use an article before this word. Consider using the article the.
    Sp. This word is misspelled. Use a dictionary or spellchecker when you proofread your work.

    Sp. This word is misspelled. Use a dictionary or spellchecker when you proofread your work.
    Prep. You may be using the wrong preposition.
    Missing “,” You may need to place a comma after this word.
    Missing “,” You may need to place a comma after this word.
    Prep. You may be using the wrong preposition.
    Article Error You may need to use an article before this word. Consider using the article the.

    PAGE 6

    Proofread This part of the sentence contains a grammatical error or misspelled word that makes your
    meaning unclear.

    Possessive This word may be a plural noun and may not need an apostrophe.

    Article Error You may need to use an article before this word.
    Missing “,” You may need to place a comma after this word.

    PAGE 7

    P/V You have used the passive voice in this sentence. Depending upon what you wish to emphasize in
    the sentence, you may want to revise it using the active voice.

    Proofread This part of the sentence contains a grammatical error or misspelled word that makes your
    meaning unclear.
    Article Error You may need to use an article before this word. Consider using the article the.
    Missing “,” You may need to place a comma after this word.
    P/V You have used the passive voice in this sentence. Depending upon what you wish to emphasize in
    the sentence, you may want to revise it using the active voice.
    Proofread This part of the sentence contains a grammatical error or misspelled word that makes your
    meaning unclear.

    Frag. This sentence may be a fragment or may have incorrect punctuation. Proofread the sentence
    to be sure that it has correct punctuation and that it has an independent clause with a complete
    subject and predicate.

    Frag. This sentence may be a fragment or may have incorrect punctuation. Proofread the sentence to
    be sure that it has correct punctuation and that it has an independent clause with a complete subject
    and predicate.

    PAGE 8

    Article Error You may need to use an article before this word. Consider using the article the.
    Article Error You may need to use an article before this word. Consider using the article the.
    P/V You have used the passive voice in this sentence. Depending upon what you wish to emphasize in
    the sentence, you may want to revise it using the active voice.
    Article Error You may need to use an article before this word. Consider using the article the.
    Article Error You may need to use an article before this word.

    PAGE 9

    Article Error You may need to use an article before this word. Consider using the article the.
    P/V You have used the passive voice in this sentence. Depending upon what you wish to emphasize in
    the sentence, you may want to revise it using the active voice.
    Prep. You may be using the wrong preposition.
    Missing “,” You may need to place a comma after this word.
    Missing “,” You may need to place a comma after this word.
    S/V This subject and verb may not agree. Proofread the sentence to make sure the subject agrees with
    the verb.

    PAGE 10

    Article Error You may need to use an article before this word. Consider using the article the.
    Article Error You may need to use an article before this word.

    Article Error You may need to use an article before this word. Consider using the article a.
    Article Error You may need to use an article before this word.
    S/V This subject and verb may not agree. Proofread the sentence to make sure the subject agrees with
    the verb.
    Article Error You may need to remove this article.
    P/V You have used the passive voice in this sentence. Depending upon what you wish to emphasize in
    the sentence, you may want to revise it using the active voice.
    Article Error You may need to use an article before this word. Consider using the article the.
    Missing “,” You may need to place a comma after this word.

    PAGE 11

    Article Error You may need to use an article before this word.

    Sentence Cap. Remember to capitalize the first word of each sentence.

    S/V This subject and verb may not agree. Proofread the sentence to make sure the subject agrees with
    the verb.
    Article Error You may need to remove this article.

    PAGE 12

      ALFRED_TCHALIM_PROJECT_2
      by Essokassi alfred TCHALIM
      ALFRED_TCHALIM_PROJECT_2
      ORIGINALITY REPORT
      PRIMARY SOURCES
      ALFRED_TCHALIM_PROJECT_2
      GRADEMARK REPORT
      FINAL GRADE
      GENERAL COMMENTS
      Instructor

    What Will You Get?

    We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

    Premium Quality

    Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

    Experienced Writers

    Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

    On-Time Delivery

    Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

    24/7 Customer Support

    Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

    Complete Confidentiality

    Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

    Authentic Sources

    We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

    Moneyback Guarantee

    Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

    Order Tracking

    You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

    image

    Areas of Expertise

    Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

    Areas of Expertise

    Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

    image

    Trusted Partner of 9650+ Students for Writing

    From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

    Preferred Writer

    Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

    Grammar Check Report

    Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

    One Page Summary

    You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

    Plagiarism Report

    You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

    Free Features $66FREE

    • Most Qualified Writer $10FREE
    • Plagiarism Scan Report $10FREE
    • Unlimited Revisions $08FREE
    • Paper Formatting $05FREE
    • Cover Page $05FREE
    • Referencing & Bibliography $10FREE
    • Dedicated User Area $08FREE
    • 24/7 Order Tracking $05FREE
    • Periodic Email Alerts $05FREE
    image

    Our Services

    Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

    • On-time Delivery
    • 24/7 Order Tracking
    • Access to Authentic Sources
    Academic Writing

    We create perfect papers according to the guidelines.

    Professional Editing

    We seamlessly edit out errors from your papers.

    Thorough Proofreading

    We thoroughly read your final draft to identify errors.

    image

    Delegate Your Challenging Writing Tasks to Experienced Professionals

    Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

    Check Out Our Sample Work

    Dedication. Quality. Commitment. Punctuality

    Categories
    All samples
    Essay (any type)
    Essay (any type)
    The Value of a Nursing Degree
    Undergrad. (yrs 3-4)
    Nursing
    2
    View this sample

    It May Not Be Much, but It’s Honest Work!

    Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

    0+

    Happy Clients

    0+

    Words Written This Week

    0+

    Ongoing Orders

    0%

    Customer Satisfaction Rate
    image

    Process as Fine as Brewed Coffee

    We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

    See How We Helped 9000+ Students Achieve Success

    image

    We Analyze Your Problem and Offer Customized Writing

    We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

    • Clear elicitation of your requirements.
    • Customized writing as per your needs.

    We Mirror Your Guidelines to Deliver Quality Services

    We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

    • Proactive analysis of your writing.
    • Active communication to understand requirements.
    image
    image

    We Handle Your Writing Tasks to Ensure Excellent Grades

    We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

    • Thorough research and analysis for every order.
    • Deliverance of reliable writing service to improve your grades.
    Place an Order Start Chat Now
    image

    Order your essay today and save 30% with the discount code Happy