Discuss first interaction with the customer should privacy

Assignment Help Computer Engineering
Reference no: EM131722830

Discussion 5 - Response 1, Brian

Assignment:

Respond to the discussion post below. Your response must be at least 100 words long with proper punctuation, capitalization, and grammar. You DO NOT need to do a cover page. You DO need to support your response with at least 3 sources (articles/journals) written/published in the United States of America within the last 5 years. You may use the same sources used in the discussion post if they support your response. Consult the grading rubric to ensure requirements are met for this segment of the assignment.

Discussion Post:

When it comes to ethics from my own to cooperation values, the options of what is right and wrong are rather widespread. Just looking at a company's values and how their employees treat each other and utilize the company assist will go a long way in forming a baseline for ethics within the workplace. A work center that gets along with each other and treats the company assets with respect has a much lower chance of stealing company assets may this be in the form of cash or customer information. (Duggan, 2016). Also, something that must be released to the customers like that the entity they are doing business with will do their best due eigenface to protect their information. (Pollice, 2006) This is due to with today's market no matter how secure you may be there will always be a way to get past the security and steal your vital information.

How dos ethics fit in the SDLC is an easy question as from the very first interaction with the customer should privacy protection be engaged.

First and foremost if their information is leaked it could cause the loss or business or worse a lawsuit. This protection should be at the forefront of each employee's mind until not only the completion of the project but the entire life of the company.(Hoven, 2016) Just become the SDLC has ended does not make the protection of past clients privacy any less necessary.

Reference no: EM131722830

Questions Cloud

What are the threat categories and associated business : The practice has a small LAN with four computers and Internet access. what are the threat categories and associated business impact for each
Benefits of referencing the guidelines in the icd-10-cm : What are the benefits of referencing the guidelines in the ICD-10-CM coding manual when assigning diagnosis codes?
Wind-wolf non-western education : Can somebody please help answer these questions based on the essay "An Indian Father's Plea," by Medicine Grizzlybear Lake.
Write a four page paper on american independence day : Write a 3-4 page paper on American Independence Day. This is just a detailed paper about this date. It's a pretty general topic so there aren't really.
Discuss first interaction with the customer should privacy : How dos ethics fit in the SDLC is an easy question as from the very first interaction with the customer should privacy protection be engaged
What do you think he means by that : Into the wild "The climactic battle to kill the false being within and victoriously conclude the spiritual revolution" is the greatest of the final adventures.
Discuss the relationship of vlans and trunking : describes the purpose, function and configuration for trunking between switches. Discuss the relationship of VLANs and trunking along with the types of Ethernet
How could a speaker prepare for questions : The high school and college age groups might ask in-depth questions to show off or because their instructor told them they had to ask a question
Identify and discuss the practical considerations the usss : Identify and discuss the "practical" considerations the USSS must consider about the type and design of the fence to be surrounding the White House.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd