Monitoring To Prevent Data Breaches Term Paper

PAGES
2
WORDS
702
Cite

¶ … Security The author of this report has been asked to answer a few questions as it relates to information security. Specifically, it will be answered to what metrics or proverbial yardsticks could or should be used to measure information security and information privacy. Indeed, there are a number of ways to measure precisely that. However, there are implications with doing do that have a bearing on both privacy and security of the people involved in divulging (or not divulging) the secrets of the firm. On one hand, there is the need and desire to keep the private and confidential information of a firm safe. On the other, there is a line, at least for many, between keeping an eye out and being too invasive even if company phones and computer equipment is the communication tool in question. While companies can be rather aggressive in monitoring what is going on with their equipment and what information is being communicated, pushing too hard and observing too much can cause privacy-related and other blowback.

Analysis

As far as monitoring business information privacy and so forth, there are a number of things that can be done. First, there can be a monitoring...

...

A similar amount of monitoring can be done as it relates to media that is removed from a workstation or network server and placed on removable/portable media such as a tablet, smartphone, USB thumb drive, external hard drive or burnable disk like a DVD-ROM or BD-ROM. There are also software tools that can scan ingoing and outgoing emails and/or attachments to make sure that something is not being sent improperly. For example, if a company has a high frequency of emails and such that contain sensitive information such as bank account numbers or Social Security numbers, each email leaving the company's servers can be scanned to ensure that a file is not being sent improperly or insecurely. An employee doing so in large fashion or in excess over time can lead to a huge nightmare for a firm and/or its customers. As Baltzan explains, among other places, in the fourth chapter of the class text, there are ethical challenges in doing all of this (Baltzan, 2015).
As far as the ethics involved of scanning emails, listening to phone calls and…

Sources Used in Documents:

References

Baltzan, P. (2015). Business driven information systems (5th ed.).

FindLaw. (2016). Privacy in the Workplace: Overview - FindLaw. Findlaw. Retrieved 27 April

2016, from http://employment.findlaw.com/workplace-privacy/privacy-in-the-workplace-overview.html


Cite this Document:

"Monitoring To Prevent Data Breaches" (2016, April 27) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/monitoring-to-prevent-data-breaches-2155724

"Monitoring To Prevent Data Breaches" 27 April 2016. Web.25 April. 2024. <
https://www.paperdue.com/essay/monitoring-to-prevent-data-breaches-2155724>

"Monitoring To Prevent Data Breaches", 27 April 2016, Accessed.25 April. 2024,
https://www.paperdue.com/essay/monitoring-to-prevent-data-breaches-2155724

Related Documents
Marriott Data Breach
PAGES 5 WORDS 1448

Security in Networking Data breaches have become common in today’s business environment as organizations are increasingly vulnerable to a data breach or cyber-attack. Jain & Ropple (2018) state that many companies or institutions face huge challenges in successful management of cyber risk despite increased expenditures on their network security. Even though some industry standards have been established, they are relatively vague. Additionally, existing solutions for safeguarding companies or institutions against data

Authors Note: Rosenbaum is technology and retail analysts. She writes articles for the New York Times and Forbes. Saikali, A. (2013, December 30). The Target Data Breach Lawsuits: Why every Company Should Care. Data Security Law Journal. Retrieved from: http://www.datasecuritylawjournal.com/2013/12/30/the-target-data-breach-lawsuits-why-every-company-should-care/ The article provides insight on the number of lawsuits filed against different organizations and strengthens the need for the companies to protect their information from data breach. The article shows the significant

Diagnosing Cyber Vulnerabilities of Systems that Support an Organization's Supply ChainIntroductionCybersecurity has become a critical concern for organizations of all sizes and industries. With the increasing dependence on technology, cyber threats are becoming more sophisticated and frequent, posing a significant risk to organizations and their customers. In recent years, numerous high-profile cyber breaches have occurred, affecting major corporations and compromising sensitive information. One such example is the Equifax breach that

Security Breaching in healthcareHow serious was this e-mail security breach? Why did the Kaiser Permanente leadership react so quickly to mitigate the possible damage done by the breach?Data breaches are regarded as severe violations of privacy and security. For HIPAA violations, the county prosecutor has the right to file legal actions on the representation of the individuals. When they were informed of the breach, the Kaiser Permanente leadership immediately investigated

Breach For a criminal investigator, analyzing key evidence is an important part in being able to establish a pattern of behavior for the suspect. The film the Breach, is discussing the Robert Hanssen case and its long-term impacts on U.S. national security. To fully understand how criminal investigators were able to catch him requires carefully examining the film. This will be accomplished by focusing on: the facts of the case, the

Assurance Program Why/How to create an Information Assurance Just as paramount as the availability and access to information is significant in every company or business outfit, certain concerns always come to the fore: the kind of information is to be made. How the information is going to be organized? How will it be possible to ensure that the information released represents the judgment of the management of the company and gives