Explain a breach of security of its customers information

Assignment Help Management Information Sys
Reference no: EM131665276 , Length: word count : 1200

As an employee, you are often required to sign confidentiality agreements when beginning work at a new company. You may also be required to sign a contract in which you waive the rights to any systems or products created while working for a company.

When you log in to the company's systems, you may see notices that remind you that the information on the system is proprietary and the legal policies related to the release or dissemination of that information.

For this Assignment, conduct Internet research on a company that has experienced a breach of security of its customers' information. Then, suppose you are working for a company and have access to confidential information as well as the company's intellectual property.

Submit a 1,000- to 1,200-word paper addressing the following:

Describe the security breach of customer's information at the company you researched.

Explain how the lessons learned may apply to other companies, both large and small. Put special emphasis on how such a security breach can affect small companies, such as a carwash.

In your explanation, be sure to recommend preventive measures that can be taken to avoid such breaches. Justify your recommendations.

Explain the steps/measures you can take to fulfill your role and responsibilities to protect the confidential information of your company. How are these steps/measures unique to IT employees?

Reference no: EM131665276

Questions Cloud

Respond in manner that was appropriate to stockholders : In your initial post, respond to the following questions: Did BP respond in a manner that was appropriate to stockholders or did they take a stakeholder view?
Selection a key resource or asset : Identify a key resource or asset, that you feel is not adequately protected. What makes your selection a key resource or asset?
Explore various solutions to the given issue : Explore various solutions to the issue. Support your position with facts and figures. Determine your support and opposition.
Functions specifically used part of sustainability strategy : Are any operations functions specifically used as part of its sustainability strategy?
Explain a breach of security of its customers information : Describe the security breach of customer's information at the company you researched. Explain a breach of security of its customers information.
Nursing theories are the same and certainly no connection : Mary wrote, All nursing theories are the same and certainly there is no connection to APN practice
Lead and manage an organization : What is the purpose of a balanced scorecard? How is the balanced scorecard used to lead and manage an organization?
Today complex work environment : In today's complex work environment, do you believe it is possible for an organization to exist when all power is equally shared
Synopsis on the statistical distributions : Make a synopsis on the statistical distributions - Spelling and Grammar check twice before submission

Reviews

Write a Review

Management Information Sys Questions & Answers

  What recommendations would you have for developing countries

Contrasting the lessons learned in the US and the UK what recommendations would you have for developing countries considering healthcare system implementations (note that you could strengthen your argument by comparing the US and UK systems to the..

  Cost benefits to cloud computing using specific examples

Discuss whether or not there are cost benefits to cloud computing using specific examples. Be sure to include at least three reference sources.

  Describe methods of handling the digital forensics evidence

Describe your methods of handling the digital forensics evidence that you used in this exercise. Explain why you chose the two data-recovery programs you selected. Illustrate how you used the digital forensics tools you downloaded to locate, recover,..

  Discuss project description and alternative option

Based on your consistent outstanding performance in the past, you have been hand-picked to lead and manage this initiative. Besides all other things that you need to work on to get the project started, senior management wants to review a Project M..

  Explain how the system could be verified as operational

Describe the series of malicious events that led up to the incident. Identify who needs to be notified based on the type and severity of the incident. Outline how the incident could be contained.

  What are some of the applications that salesforce offers

What is SalesForce? What are some of the applications that it offers? What are the hardware and software requirements for them?

  A safe working environment for personnel

Security managers are tasked with providing a safe working environment for personnel. How is that achieved and what are the consequences if a safe working environment is not provided?

  Key components of information systems management

Research Paper identifying the key components of information systems management. What steps this organization taken in securing their information and knowledge

  Describe component of comprehensive business continuity plan

Describe the key components of a comprehensive business continuity plan for an attack or incident which could affect Sunshine Machine Work's network and data.

  Making information systems investments

As an MBA student, Young had learned about the importance of an overall information systems strategy. McHardy's request, however, required Young to formalize a full plan, complete with an assessment of the current situation as well as future proje..

  Determine who is attending conferences and events

Once an activity has been completed, employees will use the system to submit the documentation. The system should support notifications to management personnel whenever their direct reports have submitted documentation. The system should also noti..

  Discuss about the freedom with fences

Assess the impact that the " Freedom with Fences" concept, as described by Robert Stephens, would have on the operations of an organization.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd