Explain a breach of security of its customers information

Assignment Help Management Information Sys
Reference no: EM131665276 , Length: word count : 1200

As an employee, you are often required to sign confidentiality agreements when beginning work at a new company. You may also be required to sign a contract in which you waive the rights to any systems or products created while working for a company.

When you log in to the company's systems, you may see notices that remind you that the information on the system is proprietary and the legal policies related to the release or dissemination of that information.

For this Assignment, conduct Internet research on a company that has experienced a breach of security of its customers' information. Then, suppose you are working for a company and have access to confidential information as well as the company's intellectual property.

Submit a 1,000- to 1,200-word paper addressing the following:

Describe the security breach of customer's information at the company you researched.

Explain how the lessons learned may apply to other companies, both large and small. Put special emphasis on how such a security breach can affect small companies, such as a carwash.

In your explanation, be sure to recommend preventive measures that can be taken to avoid such breaches. Justify your recommendations.

Explain the steps/measures you can take to fulfill your role and responsibilities to protect the confidential information of your company. How are these steps/measures unique to IT employees?

Reference no: EM131665276

Questions Cloud

Respond in manner that was appropriate to stockholders : In your initial post, respond to the following questions: Did BP respond in a manner that was appropriate to stockholders or did they take a stakeholder view?
Selection a key resource or asset : Identify a key resource or asset, that you feel is not adequately protected. What makes your selection a key resource or asset?
Explore various solutions to the given issue : Explore various solutions to the issue. Support your position with facts and figures. Determine your support and opposition.
Functions specifically used part of sustainability strategy : Are any operations functions specifically used as part of its sustainability strategy?
Explain a breach of security of its customers information : Describe the security breach of customer's information at the company you researched. Explain a breach of security of its customers information.
Nursing theories are the same and certainly no connection : Mary wrote, All nursing theories are the same and certainly there is no connection to APN practice
Lead and manage an organization : What is the purpose of a balanced scorecard? How is the balanced scorecard used to lead and manage an organization?
Today complex work environment : In today's complex work environment, do you believe it is possible for an organization to exist when all power is equally shared
Synopsis on the statistical distributions : Make a synopsis on the statistical distributions - Spelling and Grammar check twice before submission

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd