Reference no: EM131164857
Confidential Organizational Information and Employee Responsibility
As an employee, you are often required to sign confidentiality agreements when beginning work at a new company. You may also be required to sign a contract in which you waive the rights to any systems or products created while working for a company. When you log in to the company's systems, you may see notices that remind you that the information on the system is proprietary and the legal policies related to the release or dissemination of that information.
For this Assignment, conduct Internet research on a company that has experienced a breach of security of its customers' information. Then, suppose you are working for a company and have access to confidential information as well as the company's intellectual property.
Submit by Day 7 a 1,000- to 1,200-word paper addressing the following:
Describe the security breach of customer's information at the company you researched. Explain how the lessons learned may apply to other companies, both large and small. Put special emphasis on how such a security breach can affect small companies, such as a carwash. In your explanation, be sure to recommend preventive measures that can be taken to avoid such breaches. Justify your recommendations.
Explain the steps/measures you can take to fulfill your role and responsibilities to protect the confidential information of your company. How are these steps/measures unique to IT employees?
Required Resources
Readings
Haag, S., & Cummings, M. (2013). Management information systems for the information age (9th ed.). New York, NY: McGraw-Hill Irwin.
Chapter 8, "Protecting People and Information: Threats and Safeguards" (pp. 224-255)
Extended Learning Module H, "Computer Crime and Digital Forensics" (pp. 436-469)
Explain the analysis the china stock market
: Explain the Analysis the china stock market: testing weak-form efficiency between 2005 and 2015. To examine Chinese market efficiency, the data used in this study are daily price index data for Chinese stock exchanges in Shanghai and Shenzhen.
|
Deception allowable in healthcare research
: In particular, under what circumstances, if any, is deception allowable in healthcare research?
|
Major reasons for government involvement in market economy
: Determine whether or not government regulation to ensure fairness in the low-calorie, frozen microwavable food industry is needed. Cite the major reasons for government involvement in a market economy. Provide two (2) examples of government involveme..
|
Create a gantt chart
: Create a Gantt chart that displays 36 months (using the Office Timeline tool or any other tool to produce a Gantt chart) for a cosmetic manufacturing company expanding into a new market . Be sure to:
|
Describe the security breach of customer information
: Describe the security breach of customer's information at the company you researched. Explain how the lessons learned may apply to other companies, both large and small. Put special emphasis on how such a security breach can affect small companies..
|
Export contracts to be denoted in domestic currency
: Assume that a country with a fixed exchange reate has an import of 100 per month and an export of 100 per month. Suddenly and unexpectedly the exchange rate is devaluated with 10 percent. Calculate the change on net export due to the devaluation if w..
|
Presentation on the anti- kickback law
: Prepare a 3-5 slide PowerPoint presentation on the Anti- Kickback Law. Provide 3-5 references. APA format.
|
Design a normalized order management database
: Design a normalized order management database with the requirements provided in the MS Excel worksheet. Each record should have at least one primary key field specified
|
Development of your personal model of leadership
: Utilize the "Rokeach Values Survey" to help you determine your values hierarchy, which will assist you in the development of your personal model of leadership.
|