Legal Environment And Impact On Case Study


This could be something like another computer picking up someone's credit card number during what was supposed to be a secure transaction, or an employee of a company giving out a person's confidential information over the phone to someone who is not authorized to receive it. However it happens, confidentiality breaches are serious, and must be addressed immediately so they do not happen again (Allen 2001). Integrity of information assures that information can not be modified without such modification being detected. Most information management systems have some sort of protocol in place for protecting the integrity of information. The greatest danger to the integrity of information occurs when it is in transit from one computer to another. This is the perfect time for hackers to access the information and modify it without being detected. A secure information management system ensures that this is unlikely to happen and that any modifications can be detected easily in most cases, usually as soon as they occur, and the breach mended. The most secure businesses ensure than any breach of integrity is a highly remote possibility, unlikely to occur at all.

Finally, availability of information is also important. The information being stored must be secure, but it must also be accessible when it is needed. Security protocols used to protect the information must be functioning correctly, but so must the communication channels (passwords and encryption and such) used to gain access to it. The information systems that store the information must be protected from power outages, system upgrade interruptions,...


There should never be a time when information is needed and it is not able to be easily retrieved by someone with the proper authorizations (Layton 2007).
These are all important considerations for today's companies. Most businesses that deal with consumers maintain some sort of database of information on those consumers. How sensitive that data is depends on the type of business, and what the business is able to do with that data and who is allowed to have access to it depends on the industry and federal law regarding information privacy. There are certain expectations that all businesses dealing in personal, private information on individuals must adhere to and these businesses must make sure their information management systems are up to the task of protecting the confidentiality, integrity, and availability of information on its consumers. Federal law regarding the protection of this information must also be known and followed at all times. These are the regulations we must conform to in today's information age.

Sources Used in Documents:


Allen, Julia H. (2001). The CERT Guide to System and Network Security Practices. Boston, MA: Addison-Wesley.

Layton, Timothy P. (2007). Information Security: Design, Implementation, Measurement, and Compliance. Boca Raton, FL: Auerbach Publications.

McNab, Chris (2004). Network Security Assessment. Sebastopol, CA: O'Reilly.

Cite this Document:

"Legal Environment And Impact On" (2012, March 18) Retrieved June 13, 2024, from

"Legal Environment And Impact On" 18 March 2012. Web.13 June. 2024. <>

"Legal Environment And Impact On", 18 March 2012, Accessed.13 June. 2024,

Related Documents

Fixtures are considered part of personal property, but in cases where they become a part of real property and cannot be removed, they are considered part of real property. Building on a plot of land is a fixture that is considered part of real property, similarly things that are fixed with the real property and can not be removed without damage can be considered part of real property. In case

Ethics and the Legal Environment George Mackee has a problem. His wife is after him, his boss is after him, and one day soon, the whole community of Hondo, Texas may be after him. George has one very large, very simple problem: He works for Ardnak Plastics, Inc. Ardnack Plastics is a small manufacturing company making small parts for small machinery, yet its corporate problems are far larger. In the wake

Legal Immigration Is Good for the United States With the United States opening its boarders to thousands of legal immigrants each year, immigration has become one of the most hotly debated issues in the country. However, what has largely fueled this debate has to do with the impact of both illegal and legal immigrants on the United States' economy, crime rates as well as education and environment. While some continue to

Healthcare -- Administration and Legal Many vectors -- science, research funding, social acceptance or rejection -- influence how and whether medical technology is eventually adopted into medical praxis (Hogle, et al., 2012). Undergirding the choices and changes is a shared body of ethical standards and law, the establishment of which is often not consensual or efficacious. Any emerging technology can encounter unanticipated social resistance and ethical concerns that can change the

Legal Issues Case Study Plastics and resins are manufactured in the United States using petroleum products including liquid petroleum gases (LPG), natural gas liquids (NGL), and natural gas since they are fuels in the manufacturing process. Given that resin manufacture is a high-volume procedure, profitability of companies that manufacture the product is dependent on their operating efficiencies. While large companies have significant economies of scale for purchasing raw materials and production,

Environment Affects Organizational Effectiveness To achieve an ethical institution, individuals must concentrate as much on institutional culture as on individual behavior. When individuals focus on these two, they will find that culture is created by two processed the establishment of institutional values and the implementation of those values. This study focuses on the role of the environment in shaping the organizational culture. A number of ethical issues derive from vice, error