Is it ok to read employees e-mail as a security measure

Assignment Help Management Information Sys
Reference no: EM132244417

As the IoT (Internet of Things) grows, and users access corporate data with personal devices, companies are stuck balancing the ethical line between security with privacy. In regards to MDM systems and BYOD policies, answer the following questions:

Is it OK to read employees' e-mail as a security measure to ensure that sensitive company information isn't being disclosed?

Should you have access to those emails and files on a personal device that is accessing the company data via a 3rd party app (i.e. Outlook Mobile, or iOS default mail program)?

If you do read employees' e-mail, should you disclose that policy to them? Before or after the fact?

Is it OK to read the documents and look at the graphics files that are stored on users' computers or in their directories on the file server? On their mobile device?

Reference no: EM132244417

Questions Cloud

Explain the differences between glba and hipaa : What U.S. government agency acts as the legal enforcement entity for businesses and organizations involved in commerce?
What steps can companies take to protect trade secrets : With more persons working from home, how does one separate data intended for the employer from what might be considered personal property?
Evaluate current processes and workflow : Evaluate current processes and workflow and explain how MTC can use IT to improve its processes and workflow.
Are businesses making advances against the threat : Open Google and search for the IBM X Force Intelligence Index 2017 PDF. Describe the purpose of this report. How is this information useful to a business?
Is it ok to read employees e-mail as a security measure : Is it OK to read employees' e-mail as a security measure to ensure that sensitive company information isn't being disclosed?
What cryptography may be doing in the future : List and explain the three basic operations in Cryptography? What Cryptography may be doing in the future?
Present a detailed proposal of your recommendations : Present a detailed proposal of your recommendations for physical, technical and administrativesecurity measures.
Explain how you would reduce potential vulnerabilities : Explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats.
How might a business encourage the involvement of the fan : How might a business encourage the involvement of the fan base of a movie or a band by using the media-creation tools available?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Create the program which converts fahrenheit to celsius

Create the program which converts Fahrenheit to Celsius - The output Celsius should be a floating point - Format your manual according to APA style

  This addresses web apps and document production

this addresses web apps and document production softwarequestion 1.web apps are becoming increasingly popular. define

  What the project hopes to accomplish

Identify at least 4 different stakeholders; for each, list at least 2 things that the stakeholder requires in order to deem the project successful.

  What are the security or control issues

IT 210:What are the security or control issues that should be addressed as part of the technology selection process for Kirby's business?

  Roles and responsibilities - retail supply managementi need

roles and responsibilities - retail supply managementi need some help getting started with the following

  What role do security analysts play in preventing web server

What roles do security analysts play in preventing Web server, application, and database attacks?

  Write paper on user privileges and permission levels

Write an 8 page paper on user privileges and permission levels. 8-10 pages (double-spaced) Times New Roman 12 pt font

  Write a research paper about the spin-out organizations

Write an original research report consisting of one of the following topic areas: 1) Virtual Organizations, 2) Network Organizations, etc.

  Pros and cons to implementing a switched network

Imagine that you work as a network administrator for a medium-size company. You have suggested to your boss to upgrade the existing hubs with Cisco Catalysts switches. Provide justification for this action. Include at least three (3) pros and thre..

  How retail stores use databases for retaining customers

Design a database solution and the potential business rules that could be used to house the sales transactions of the department store.

  Why should gloria share her userid and password

Why should Gloria share her userid and password? Why or Why not? If you answered no, recommend changes to correct the problem?

  How widespread use of mcommerce technology could affect life

How the widespread use of m-commerce technologies could affect your life? A comprehensive evaluation of the components that are associated with M-Commerce.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd