Identify at least three alternatives

Assignment Help Basic Computer Science
Reference no: EM133245579

Star Enterprises provides manufacturing services to the city of Denver, and generates an annual revenue of at least $1.5 billion. The company employs over 10,000 people, and this includes a team of 20 members of the Business Intelligence Department. One the BI Department's primary responsibilities is analyzing all company data to keep management informed at all times of the business position, analyze financials, audit any discrepancies, identify possible fraud, and all other facets of business analytics. The employees in this department are held to the highest ethical standards, because as part of their job, they have access to all data, which includes many confidential pieces of information, including financials, pay data, confidential invoices, etc. When dealing with company data, it is expected that employees that have access will only use the information as part of what is necessary to perform the function of the projects or assignments they are working on. These employees should not use the data for personal gain.

Henry is a senior member of the Business Intelligence Team and is a direct report to the Jackson, the Director of Business Intelligence. Henry's morale and performance has been diminishing since the beginning of the year. Jackson scheduled a meeting with Henry to discuss his performance and morale. During the meeting, Henry confessed that he was unhappy with his bonus that was paid at the end of the year, and he was unhappy because he believed he was paid a lower bonus that others and felt he was more deserving than other members of the team, who he believed were paid higher bonuses. When probed about how he would have a basis to compare other employee bonus amounts, he illuded to having an understanding of all other bonuses that were paid to other employees, including other members of the BI team.

Immediately after the meeting, Jackson reviewed Henry's security and determined that he did have access to see all employee's pay and bonus data. Henry's job function pertains to analytics of company assets, and he does not have any reason to view employees' pay or bonuses for his current project, however, he does have access to view this information as a senior member of the BI team. Jackson then ran a report to determine which reports had been recently run concerning confidential information and noticed that several reports had been accessed recently that would list multiple pieces of employees' confidential information, including birth dates, addresses, pay rates, and bonus amounts. However, there seems to be an issue with the audit report, and while it was recording the date/time the report was run, it was not reporting the user name (it was reporting a generic system account name). Jackson should have been performing periodic checks on these reports to monitor his team's data use.

This prompted Jackson to review Henry's background check that is supposed to be performed prior to hire, and Jackson immediately noticed that Henry disclosed on his application that he had been fired from his previous employment for reasons concerning a data breach. Jackson realized that he must not have fully vetted Henry's application upon hire, which was Jackson's responsibility as the Director of BI.

Needless to say, a leak of information about employees' salaries and bonus data could have serious implications for the BI team, including loss of reputation and loss of employee morale if the information were to spread throughout the company. Depending on the information that was accesses and how much was disclosed, it could be necessary to notify other employees that their data has been breached.

Jackson is now in a position to determine if Henry did indeed break protocol and identify what his next steps will be.

Individual Ethical Assessment Questions

Identify at least three alternatives that can be used to solve or lessen the impact of this situation.

Reference no: EM133245579

Questions Cloud

Explain in detail network interface card : Explain in detail how wireless networking works. Explain in detail the Network Interface Card (NIC) and the MAC address.
Knowledge of technology influence access to cloud storage : Who has access to Cloud Storage? How does the cost of computers, access to the internet, and knowledge of technology influence access to Cloud Storage?
Advanced computer architecture : Evaluate the hardware components of modern computing environments and individual functions. Describe how to plan to integrate these core lessons into daily life
Vsphere standard and vsphere enterprise license : What are some differences between the vSphere Standard and vSphere Enterprise license
Identify at least three alternatives : Identify at least three alternatives that can be used to solve or lessen the impact of this situation.
What type of networking equipment : What type of networking equipment would you recommend for the 2 companies? Why did you select the network model?
Exif data for the file under analysis : Give THREE general categories of information that might be found within the Exif data for the file under analysis.
Rank the top six most vulnerable assets : List and discuss the vulnerabilities and assets. Rank the top six most vulnerable assets.
Transfer the security risk of the system : Choose a key information system of your organization to analyze. If your organization wants to transfer the security risk of the system,

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What are the three methods that provide a redundant

What are the three methods that provide a redundant/highly available DHCP solution?

  Total number of clock cycles

a) The clock rate for this machine is b) The total number of clock cycles consumed by the entire program is c) What speedup (expressed to two decimal places) would be obtained for this program by making the divide instructions twice as fast? Speedu..

  Describe how host-based intrusion detection works

Describe how host-based intrusion detection works, briefly contrasting it with network-based intrusion detection. Explain three types of threats against which HIDS is particularly effective.

  Baseline security requirements

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure

  Fund of data systems

Pick one industry and explain how you believe the integration of data systems will transform their business model in the next 3-5 years?

  Determining the educational and knowledge levels

Why does the IT industry in India is cheaper than it is in the USA even thought the educational and knowledge levels

  Develop an abstract data type

A wallet is something that we use to keep our money (paper notes). We want to develop an abstract data type called Wallet that can contain collection of Money. The Wallet should return the total amount of money it has.

  Corporate or professional environments

Do you consider that balanced scorecards have its niche in corporate or professional environments? Are those exclusive?

  Indicate the important water quality constituents

A particular wastewater stream has dissolved oxygen (DO) concentration of 2.0 mg / L and a discharge rate of 0.5 m3 / s. The river into which it is being discharged has DO equal to 8.3 mg / L, a flow rate of 4.35 m3 / s and a temperature of 20 °C...

  Assessing risks

Access control starts first with assessing risks so you can properly identify potential threats and determine how to mitigate those risks.

  Explain security or master plan and countermeasures

What is physical security? What are levels of physical security? Detail all five levels on separate slides. Explain security or master plan and countermeasures.

  Assume the relevant interest rate

How much will be available to Jennifer on her 18th birthday? Assume the relevant interest rate is 7.1% per year. Enter your answer to the nearest cent.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd