Research Paper Undergraduate 769 words Human Written

Company Product Security

Last reviewed: ~4 min read Technology › Companies
80% visible
Read full paper →
Paper Overview

Company Data Security Company data/information security The issue of information security is one controversial aspect that has led to thousands of legal battles between individuals and their respective companies each year. In the case study at hand, there is need to proceed with caution in order to ensure that the legal private limits of the former employee...

Full Paper Example 769 words · 80% shown · Sign up to read all

Company Data Security Company data/information security The issue of information security is one controversial aspect that has led to thousands of legal battles between individuals and their respective companies each year. In the case study at hand, there is need to proceed with caution in order to ensure that the legal private limits of the former employee are not overstepped. As a Infosec specialist, I will first involve the immediate manager under whom Mr.

Yourprop was working and make him aware that a search on the desk or work area of the employee is not illegal as this was a private firm as long as there were grounds for such a search and that the search was not accusative but rather a formality. I will obtain written permission from the management of the company to do the search and will ensure the former employee is notified of the search (Workplace Fairness, 2015).

I will then have a catalogue to document the folders in the computer that I will search for information as well as the desktop areas and drawers that I will search. I will also document in writing the hard disks that I will access and the other storage devices like the USB disks through taking a photo of them and documenting in the catalogue.

From the photo provided, the three crucial digital items that could help in determining whether the property rights of product X would be compromised through the illegal sharing or use of the source code would be the desktop computer, the laptop and the hard disks that are on the table. The desktop computer is the most likely location where the employee would be working on the product X and coming up with the source code for the product.

This will hence give the original work and the codes that were developed within the company hence evidence that it is property of the company. The best way to document this would be through printing out the original codes as they are in the desktop. The laptop will possibly carry the copied data from the desktop that would provide evidence of possible movement of the data from the original company source where it should be at.

This too will require a printout in order to show the generic form of the original data as was in the desktop. The hard disks on the desktop will need to be captured through several photos as well as video record them and then I will tether them to the computer and read the content and the relevant copies of the product X and the related source code will be printed out.

These three items will be serialized and I will restrict my search and documentation only to the folders and data that is related to the source code under investigations. There are also non-digital items on the desktop that would be of evidential interest in my investigations and these are the sticky notes that are on the workstation and the monitor, the notepad that is next to the keyboard and the paper file with some papers in it at the top of the workstation.

In these sticky notes, there are possibilities of having codes that need to be used for the access of the product X and activation of it. The notepad could be holding the contacts and the schedule to pass on the secret information that needs to be kept secret in the company and the file could be holding the crucial printouts of the codes for the product that the former employee was intending to ferry to his new employer and would do so to avoid detection through the digital sources. These.

154 words remaining — Conclusions

You're 80% through this paper

The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.

$1 full access trial
130,000+ paper examples AI writing assistant included Citation generator Cancel anytime
Sources Used in This Paper
source cited in this paper
3 sources cited in this paper
Sign up to view the full reference list — includes live links and archived copies where available.
Cite This Paper
"Company Product Security" (2015, March 26) Retrieved April 22, 2026, from
https://www.paperdue.com/essay/company-product-security-2149353

Always verify citation format against your institution's current style guide.

80% of this paper shown 154 words remaining