Preview

Maintaining Security and Privacy of Business Records

Better Essays
Open Document
Open Document
962 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Maintaining Security and Privacy of Business Records
Maintaining the security and privacy of business files and employee records.
U06a1
Karen Lloyd klloyd@capellauniversity.edu IT 3006
Communication Strategies for the IT Professional
June 12, 2011

Introduction

In today’s business world the security and privacy of employee files, business trade secrets and proprietary information has became an increased problem. The information is being compromised and/or stolen from within the business environment itself. The files are not protected from unauthorized individuals. These files can be protected using various methods, such as individual user accounts or profiles, storing paper files in a secured area as well as, improved electronic data storage.

New employees will fill out many documents upon applying for employment and after accepting employment with a new company. These new and potential employees may not be giving any thought to the safety and privacy of their personal information. Within a corporation these records have been accessed for identity theft purposes. They are also viewed by employees that should not have access to these types of files.

A business stands to face the same type of security and privacy issues. Proprietary information that is important to a business’ success can be stolen, sold or sabotaged by employees within the company. Some of the information taken can be trade secrets, financial documentation and employee personnel files.

Description of Overall Problem

Businesses need to ensure the secure storage of company files and the guaranteed privacy of employee information. With the increased use and demand for network computing, information security has become a high priority. With all the ways in which someone can gain access to private and confidential information, the previous safe measures need to be enhanced and improved (Yaoxue Zhang; Laurenc T. Yang; Yuezhi Zhou; Wenyuan Kuang. 2010). For example, employee and company files are



References: Gueldenzoph, L. E., & Snyder, M. J. (2006). In Kaliski B. S. (Ed.), Encyclopedia of business and finance; privacy and security (2nd ed.). Detroit: Macmillan Reference USA. Retrieved from http://go.galegroup.com.library.capella.edu/ps/i.do?id=GALE%7CCX1552100254&v=2.1&u=minn04804&it=r&p=GVRL&sw=w Mironi, M. (1974). The confidentiality of personnel records: A legal and ethical view. Labor Law Journal, 25(5), 270-292. Retrieved from http://ezproxy.library.capella.edu/login?url=http://search.ebscohost.com.library.capella.edu/login.aspx?direct=true&db=tsh&AN=5816959&site=ehost-live&scope=site MyDocs Online . com. (n.d.). Data theft has gotten out of hand: Are you safe? Zhang, Y., Yang, L. T., Zhou, Y., & Kuang, W. (2010). Information security underlying transparent computing: Impacts, visions and challenges. Web Intelligence & Agent Systems, 8(2), 203-217

You May Also Find These Documents Helpful

  • Good Essays

    Implementing remote access will allow employees to telecommute which can bring down overhead costs and allow users the flexibility of accessing data outside of the office. In order to protect the data as well as users, audits and access control lists are to be implemented. Access Control allows the identity of the user to determine whether or not they are able to access certain file systems. In order for access control to work properly every user attempting to access the data will need to be entered into the system. Placing passwords on individual files will also provide an added layer of protection.…

    • 689 Words
    • 3 Pages
    Good Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    As with any other system, all data needs to be kept secure. Employee confidentiality is of paramount importance, particularly in a system that hold and utilizes potentially sensitive personal employee information. Moreover, seemingly innocuous information such as standards and procedures within the company also need to be kept secure. Any secure, sensitive, or proprietary information should be encrypted and password…

    • 793 Words
    • 3 Pages
    Good Essays
  • Good Essays

    BA L2 Unit 14

    • 449 Words
    • 2 Pages

    1.4 Confidential business information should be properly secured. If it isn't, data can potentially be misused. For instance, making sure the files you are using have a password put in place to…

    • 449 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical, and information technology assets, and to ensure that information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Chapter 6 Case Study

    • 1093 Words
    • 5 Pages

    A recent incident involving hacking and data theft prompted the implementation of a new data security system at Listo Systems. A “black box” system will be installed on every PC in the company and will not only affect the way data moves but also who has access to sensitive files. Nearly everyone at Listo Systems will be doing things very differently once the black boxes are in place.…

    • 1093 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    User domain is considered the weakest link in an IT infrastructure as employees can be motivated to violate company policies. Areas of concern that can affect keeping data private, is: Lack of user awareness, because some users do not pay attention to what data is considered private and fail to secure data properly; Security policy violations, where some users continue to leave private data in the open where others can see it; Disgruntled employee purposely takes personal data to cause some sort of damage between the company and the customer; and Employee blackmail or extortion by threatening to distribute or sell the personal data in trying to obtain a promotion or monetary gain3.…

    • 517 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Unix File Protection

    • 716 Words
    • 3 Pages

    UNIX offers a file protection system that is straightforward and simple to use. However, many people are not aware of the value of this powerful mechanism. A secure environment is achieved not only by the operating system, but also through vigilant user and administrative practices. There are many schemes and mechanisms used in the UNIX operating system, as well as some simple tricks that are available to give the kind of file protection administrators want. For the purpose of this paper, a company with 5,000 employees, where 4,990 employees are allowed access to a specific file will be assessed.…

    • 716 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Paper on Physical Security

    • 4681 Words
    • 19 Pages

    An important consideration of an information or operating system of a business or organization is to have a security system that protects information, data, and integrity of the company’s sensitive information and records. If a business or company does not have adequate security, financial, sensitive, and classified information may be compromised and prone to possible viruses and malware, hacking, or at risk of a cyber-attack to the company’s data resulting in possible financial loss. If this scenario is the case, extensive resources most likely will be required to repair or undo the damage caused by the breach of security or virus. This essay will discuss the Service Request SR-rm-013 for Riordan Manufacturing and address security issues and concerns. In addition, this document proposes solutions, methods, and options, and provide information that would best suit the company’s needs and requirements for the security and integrity of sensitive data, based on Riordan’s current security, operating system, and database.…

    • 4681 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    Information Technology

    • 277 Words
    • 1 Page

    Information technology has become spreading widely throughout our society. We live in a modern world with Internet access from our home, fast food chains, offices, schools and on our mobile devices, such as iPhones, iPods, Blackberries and Android Phones. Nowadays, the use of internet became essential to communicate distantly and the use of social medias for interactions as well as businesses through online marketing or other called as the e-commerce. The rapid advancement of this system has elevated the importance of the IT function. Information technology in the modern enterprise has developed gradually from a back-office component to a most important operational constituent that could improve businesses performances and increases shareholders value. Enterprises such as marketing, sales and finance are now cooperated by information technology. The core success of an organization is information technology because it serves daily operational support and enables enterprise wide change. Since information technology is essential in a modern enterprise it is sometimes serve as a threat in today’s organization. One of the examples is the personal information which can be sending through the use of systems and it can be a threat if this information consolidated from banks and accounts pertaining to financial aspects. In these cases, applying triad could be helpful that is Confidentiality, Integrity and Availability. The protection of the information from disclosure to unauthorized users is confidentiality while integrity refers to protecting information from being modified by unauthorized users. Ensuring that authorized users are able to access the information when needed is availability.…

    • 277 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Internet security is a division of actions aimed at securing information based on computers and in transit between them. In the modern environment the two subjects are intimately linked. Neither computers nor the networks that connect them are inherently secure. Computers were subject to attack before the Internet became a public utility—because illegitimate software hidden on commercial diskettes could be fashioned to load itself on a computer and play havoc with data in memory or placed on a fixed drive. The Internet, by its very nature—initially conceived of as an open network to facilitate free exchange of ideas and information—is vulnerable. According…

    • 3034 Words
    • 13 Pages
    Powerful Essays
  • Best Essays

    White Paper

    • 1119 Words
    • 5 Pages

    All small private businesses have confidential information about their customers, employees, researches, products and financial status. This confidential information is now collected, processed and saved on computers and by the help of efficient networks they are transmitted to other computers. Following problems that may be faced by those business companies which do not make efforts to secure their data and information:…

    • 1119 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    Security Plan

    • 3805 Words
    • 16 Pages

    The purpose of this security plan is to elicit the potential threats to an organisation physical and electronic information holdings. Organisations in general are starting to take information security more sincerely due to the proliferation of mobile services, VPN connections, terrorism and natural disasters. We must however acknowledge that this very technology advancement is regarded as efficient but is also leading to a higher level of security risks. These risks must be mitigated to ensure the confidentiality, integrity, and availability of information assets. (The SANS Institute. 2007)…

    • 3805 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    Revolution in technology makes the world as convenient as they can, many advancements have been made to maintain the privacy and security issues in the organizations with their employees. In today’s world of technology the privacy and security concerns plays a major role in any organization from initial stage to the ending of some work.…

    • 672 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Information Security

    • 1955 Words
    • 8 Pages

    This research paper provides information about information security. Information security is about protection of important files and data. It is about stopping hackers from breaching over your files and maintaining the privacy, security and confidentiality of a certain files and information. This research also talks about risks and common attacks which may harm, delete, steal and lead to possible loss of your files. These threats can also show the vulnerability of your security that will lead to exposure of your files. In information security, there are three main objectives; these are confidentiality, integrity and availability. Confidentiality means the only person can access the system are the one who need the information while integrity means that the person who can only update and add files are the one who are authorized and lastly, availability is all about time management and when security is requested.…

    • 1955 Words
    • 8 Pages
    Powerful Essays