Verified Document

Business Information Security Vs. Government Searching Case Study

¶ … Policy Case Study The author of this report has been asked to act as a consultant for a major security consulting firm. Contained within this report will be several topics that were requested to be covered and thus they will be with the appropriate amount of vigor and detail. The first topic will be a brief overview of the overall legal environment for non-information technology managers when it comes to things like constitutional law, administrative law, civil law, criminal law, due care, due diligence and overall fiduciary duty. Another major topic that will be covered is the applicable information security laws and practices. Next up will be the impact of policies, regulations and laws when it comes to the information security sphere. The next topic, and a very controversial one in the eyes of many, is the Central Intelligence Agency including is practices, what has been in the news about them and so forth. There will also be a discussion of governance policy and recommendations for the same. The final portion will be the distinguishing between government and organization policies. While information security practices are like writing a tightrope, it is something that people must master and learn to do well.

Analysis

When it comes to the legal environment in which information technology managers operate, it can be a minefield and then some. Just as two examples, Target and Home Depot have learned a very hard lesson about what happens when information is not properly secured and some very high-ranking IT and non-IT people lost their jobs over that mess (Sidel, 2015). Then of course there were prior incidents like the one at TJX that was borne of abject ignorance about the obsoleteness of the WEP wireless standard at the time (Ou, 2007). What information technology executives and other managers must understand is that failing to secure information properly and with the proper amount of due diligence can have a wide array of legal implications. In fact, being too secure and too interested in what employees are doing (or not doing) can lead to issues. For example, an employee can scream about a loss of privacy even if they are using company equipment and this has obvious constitutional implications...

Other things that can occur included the proper amount of privacy regulations and security that must be in place, protection against lawsuits from customers, employees or shareholders (among other people), general ramifications for not exercising due care or due diligence or not acting in a fiscally responsible manner in any provable or demonstrable way (TechTarget, 2015).
Practices that could and should be mastered included setting proper password complexity requirements, having the right firewalls and access control standards in place, establishing (and enforcing) policies that could or would have an impact on information security, restricting physical access to sensitive equipment and keeping sensitive information about a system's setup and security on a "need to know" basis with the people that should know these things. Impacts of information technology policies, for example, include whether they are legal, whether they are all-encompassing and whether they are actually being enforced. When it comes to regulations and laws, it is commonly at the discretion of law enforcement as to whether or when they prosecute people but that is there call and they will tend to protect employees and customers if they are being wronged or if there is a perception of the same (Hess, 2013). One major component of any solid information security and integrity protocol would be having data backed up reliably and sufficiently. As described by the NIST, backups can be done via DVD disc, network storage, external hard drives and internet backups. Generally, it is best to have both local redundancy and remote redundancy so that one backup is local and immediately accessible while the other is in a secondary location just in case the first location is compromised by a storm, fire or sabotage (NIST, 2010)

One gray area in all of that are requests for information from agencies like the CIA, the NSA and so forth. The tech giants of the United States have complained that these agencies often go on "fishing expeditions" to root out malfeasance any way they can. Information technology personnel should certainly cooperate with these agencies but there should be legitimate warrants and/or other judge-ordered actions…

Sources used in this document:
References

ABA. (2015). What Are the Limits of Employee Privacy? | Solo, Small Firm and General

Practice Division. Americanbar.org. Retrieved 10 June 2015, from http://www.americanbar.org/publications/gp_solo/2012/november_december2012pr

ivacyandconfidentiality/what_are_limits_employee_privacy.html

DHS. (2004). Information Security Governance - A Call To Action. Department of Homeland Security. Retrieved 10 June 2015, from https://www.dhs.gov/sites/default/files/publications/csd-informationsecuritygovernance-acalltoaction-2004.pdf
Retrieved 10 June 2015, from http://www.zdnet.com/article/10-security-best-practice-guidelines-for-businesses/
News. U.S. News & World Report. Retrieved 10 June 2015, from http://www.usnews.com/news/articles/2015/04/08/privacy-board-will-do-deep-dive-
10 June 2015, from http://www.zdnet.com/article/tjxs-failure-to-secure-wi-fi-could-cost-1b/
Retrieved 10 June 2015, from http://www.wsj.com/articles/home-depot-breach-bigger-than-targets-1411073571
SearchSecurity. Retrieved 10 June 2015, from http://searchsecurity.techtarget.com/Security-liability-Whos-to-blame-for-a-data-security-breach
Cite this Document:
Copy Bibliography Citation

Related Documents

Information Security and Employees
Words: 1440 Length: 4 Document Type: Term Paper

Information Security The discussion below provides answers to questions raised with regard to a case at Greenwood Company A forensic plan of readiness comes with several advantages. If there arises a situation that forces a company to be engaged in litigation, and there is need for digital evidence, e-discovery is of central importance. The laws and rules that govern the e-discovery, such as the Federal Rules of Civil Procedure or the Practice

Thematic Analysis of Security Issues
Words: 20201 Length: 78 Document Type: Dissertation

Security Study Travel and tourism are major industries in European countries such as Greece. The hotel industry is dedicated to making the accommodations for their patrons as enjoyable as possible. This means ensuring that hotel guests, visitors, and staff have a safe and secure environment. It is for this reason that many of the larger hotel chains have their own private security personnel who are entrusted to maintain the safety of

Business Plan Dontdatecreeps.com the Following
Words: 1100 Length: 4 Document Type: Business Plan

Once the customer has purchased a piece of information, has paid for it, has received it, and obviously viewed it, he cannot claim a refund, in case the information provided by the site did not satisfy the customer in any way. If the site cannot provide certain information due to certain facts that was required by the customer, the site will notify the customer that his request cannot be

Security Measures and Security
Words: 1951 Length: 6 Document Type: Term Paper

Security Measures The hotel industry has experienced the need to enhance security of guests in the recent past given the increased security threats/attacks in the modern business environment. The increased focus on enhancing security in the hotel industry has represented a major shift from the serious neglect of various security responsibilities that characterized this industry in the past. According to Fischer, Halibozek & Walters (2013), hotel managers, particularly security managers, are

Business Social Responsibilities in a
Words: 1297 Length: 4 Document Type: Term Paper

Likewise, public policies ranging from immigration to the war on drugs and the de-institutionalization of persons with mental illness also have a substantial impact on local corrections (Stinchcomb and McCampbell, 2008). The key to running a successful correctional institution is building an organization that is capable of good strategy execution. These types of facilities have a social responsibility not only to the prisoners that they house but also to the

Chief Security Officer: As the Chief Security
Words: 2148 Length: 7 Document Type: Essay

Chief Security Officer: As the Chief Security Officer for a local University, my main role is establishing and maintaining an enterprise wide information security program that helps to ensure all data and information assets are not compromised. This process involves developing a plan to conduct a security program that prevent computer crimes, establishes a procedure for investigation, and outlines laws that are applicable for potential offenders. To develop an effective plan,

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now