Where are any internal procedures violated by tom

Assignment Help Business Law and Ethics
Reference no: EM13764705

Late one night not long ago, George Corday, SCM's Senior Manager of Information Systems noticed some heavier than usual traffic moving between three operational sites; Tokyo, Milan, and Tampa. As usual Tom was at his desk when the call came in; some people claimed Tom slept and ate there. Tom answered "Hello, CSO Tom Brown speaking." George answered: "Hi Tom, have you got a minute? I noticed something odd with our net traffic and wanted you to look at it." Tom replied with a scripted answer, the first entry in the company incident response plan, "What do you think you saw, where and at what time or times?" George gave Tom the information he had observed. A few hours later Tom called George back to give him the initial report that someone had tapped into their system and was using it to transmit data around the world. The data was embedded in some typical transactions; however, the attacker had placed a worm in the system, which apparently had the potential for causing damage well beyond the company's system. He suggested to George that they could employ a track and trace procedure to attempt to isolate the attacker. Tom said he wanted to isolate those links in the system to prevent the attacker from launching attacks to other sites or hopefully to prevent the attacker from using their system to launch system attacks on the vendor and supply chain. Tom said he was more concerned over the ability of this worm to infiltrate their government contractors linked via VPN, which may have access to sensitive data and sites. The surprising part of the conversation turned out to be that an SCM laptop was being used to access the network. In this phone call to Tom, George OK'd the use of the track and trace system Tom had created to find the attacker and disable their ability to use SCM's network. He wanted the identity of who had use of the laptop, and wanted to know if there was any potential for proprietary data being removed from their network of if the network was just being used as a carrier. George also informed him that he would communicate the illegal use of their network to Takio Sumi, CIO, as soon as Tom had removed the attacker's ability to use their network.

Do you think any laws may have been violated by SCM in this investigation? Perhaps international laws?

Where are any internal procedures violated by Tom and George?

The chain of events and type of attack should have required what type of response from the two employees?

At what point in time should SCM involve their contractors, vendors, and the government agencies? What is the appropriate way to do that?

Reference no: EM13764705

Questions Cloud

Evaluate how well the organizational structure works : How does the structure relate to the particular sector that the organization is in -
Define business strategies for implementation : Create an implementation plan for your organization, a project from the websites such as or a state RFP site.
Report for cost of goods manufactured : Agale Combines, Inc. has $40,000 of ending finished goods inventory as of December 31, 2014. If beginning finished goods inventory was $25,000 and cost of goods sold was $75,000, how much would Agale report for cost of goods manufactured?
Are poor countries somehow different than wealthy countries : Are poor countries somehow different than wealthy countries - How can firms and markets increase the wealth of poor countries? Be sure to address each question in the problem.
Where are any internal procedures violated by tom : Where are any internal procedures violated by Tom and George? The chain of events and type of attack should have required what type of response from the two employees
Estimate what would happen to the volume of services : Estimate what would happen to the volume of services and the expected revenue to the practice, should the area's health insurers increase patient cost sharing from 20% to 30% of this charge. Use the concept of price elasticity to make the projecti..
Write research paper on criminal law : Write research paper on criminal law
Principles and theory of security management : think of some intrusions - the disgruntled mailman flying onto the Capitol lawn on his gyrocopter and remember the couple who crashed a White House function a few years ago
Write research paper on discrimination in police departments : Write research paper on Discrimination in police departments

Reviews

Write a Review

Business Law and Ethics Questions & Answers

  Legal environment of business caselet

The assignment in Law deals with the topic "Legal Environment of Business". A case study about Mary, a newly joined employee who is working in the USA and Europe. She faces few issues at her work place in Europe and tries to talk to her manager who s..

  Business ethics & legal issues caselet

This assignment is about the concept of Business Ethics & Legal Issues. The laws relating to these can be found in Antitrust laws. These laws are concerned with those large corporations which have a majority of market share, mergers and acquisitions.

  Questions on business law and ethics

Examples of securities that are exempted from the registration provisions of the 1933 Act and involving misstatement of material facts in a prospectus.

  Discuss the doctrine of ratification of pre-incorporation

With the aid of a decided cases, discuss the doctrine of ratification of pre-incorporation contract.

  Discuss the extent of phoenixing activity

It has been estimated that about 6,000 phoenix companies operate in Australia, costing government and the community hundreds of millions of dollars per year and impacting on individuals.

  Application of law to facts

Company Law, Application of Law to Facts and Conclusion.

  Question on business law and ethics

This assignment related to business law.

  Questions on business law

Answer all the questions under business law.

  Iidentify the issue raised by the facts

Iidentify the issue(s) raised by the facts, identify the relevant legal principles, apply the relevant legal principles to the facts, reach a conclusion.

  Evaluation of software development

Prepare a report and present an evaluation of the subsequent methodologies for software development in terms of cost, resources and time.

  Business value and ethics

Business value and ethics,  Bart agrees to put Sam's Super Bowl champion-ship autographed football in his sports store to sell for $1,500. Sam agrees to pay Bart a 15% commission for selling the ball. If Joe comes in the sports store and offers Bart ..

  Explain what is meant by income by ordinary concepts

Advise what tax consequences arise in respect of the payments.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd