Describe the security breach of customer information

Assignment Help Management Information Sys
Reference no: EM131164857

Confidential Organizational Information and Employee Responsibility

As an employee, you are often required to sign confidentiality agreements when beginning work at a new company. You may also be required to sign a contract in which you waive the rights to any systems or products created while working for a company. When you log in to the company's systems, you may see notices that remind you that the information on the system is proprietary and the legal policies related to the release or dissemination of that information.

For this Assignment, conduct Internet research on a company that has experienced a breach of security of its customers' information. Then, suppose you are working for a company and have access to confidential information as well as the company's intellectual property.

Submit by Day 7 a 1,000- to 1,200-word paper addressing the following:

Describe the security breach of customer's information at the company you researched. Explain how the lessons learned may apply to other companies, both large and small. Put special emphasis on how such a security breach can affect small companies, such as a carwash. In your explanation, be sure to recommend preventive measures that can be taken to avoid such breaches. Justify your recommendations.

Explain the steps/measures you can take to fulfill your role and responsibilities to protect the confidential information of your company. How are these steps/measures unique to IT employees?

Required Resources

Readings

Haag, S., & Cummings, M. (2013). Management information systems for the information age (9th ed.). New York, NY: McGraw-Hill Irwin.

Chapter 8, "Protecting People and Information: Threats and Safeguards" (pp. 224-255)

Extended Learning Module H, "Computer Crime and Digital Forensics" (pp. 436-469)

Reference no: EM131164857

Questions Cloud

Explain the analysis the china stock market : Explain the Analysis the china stock market: testing weak-form efficiency between 2005 and 2015. To examine Chinese market efficiency, the data used in this study are daily price index data for Chinese stock exchanges in Shanghai and Shenzhen.
Deception allowable in healthcare research : In particular, under what circumstances, if any, is deception allowable in healthcare research?
Major reasons for government involvement in market economy : Determine whether or not government regulation to ensure fairness in the low-calorie, frozen microwavable food industry is needed. Cite the major reasons for government involvement in a market economy. Provide two (2) examples of government involveme..
Create a gantt chart : Create a Gantt chart that displays 36 months (using the Office Timeline tool or any other tool to produce a Gantt chart)  for a cosmetic manufacturing company expanding into a new market . Be sure to:
Describe the security breach of customer information : Describe the security breach of customer's information at the company you researched. Explain how the lessons learned may apply to other companies, both large and small. Put special emphasis on how such a security breach can affect small companies..
Export contracts to be denoted in domestic currency : Assume that a country with a fixed exchange reate has an import of 100 per month and an export of 100 per month. Suddenly and unexpectedly the exchange rate is devaluated with 10 percent. Calculate the change on net export due to the devaluation if w..
Presentation on the anti- kickback law : Prepare a 3-5 slide PowerPoint presentation on the Anti- Kickback Law. Provide 3-5 references. APA format.
Design a normalized order management database : Design a normalized order management database with the requirements provided in the MS Excel worksheet. Each record should have at least one primary key field specified
Development of your personal model of leadership : Utilize the "Rokeach Values Survey" to help you determine your values hierarchy, which will assist you in the development of your personal model of leadership.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Erp framework and open source of erp software

Write a report of 8 to 10 pages on the topic of "Information Technology For Managers"Report must be in proper format along with title page and refrences.

  Quality amp supply chain management wreferencesbackground

quality amp supply chain management wreferencesbackground product quality and distribution problems at the denver

  Research five areas of publicly available information

Research at least five areas of publicly available information (such as the Dow Jones or top search engine results) that help to establish the health and public image of a company

  Employee training and development - fransystemsyou have

employee training and development - fransystemsyou have just been hired as the training department of one for

  Question about communication techniques

Question about Communication Techniques - When you prepare for meetings like this, you keep notes in a "work journal". Make notes in your "work journal" by posting to the Discussion Board

  Calculating the minimum level of annual savingslawrence

calculating the minimum level of annual savingslawrence hospital is tax exempt. it would like to install a new computer

  How they would benefit a smaller airline

Using the airlines example mentioned above, propose several possible IT solutions and how they would benefit a smaller airline to become more successful or attract more clients.

  It is common practice to categorize computers into groups

it is common practice to categorize computers into groups such as personal computers network servers network computers

  What types of licensure and accreditation do they have

Identify a facility in your area (Maryland preferred) by looking on the Internet. What types of licensure and accreditation do they have? Do they provide ambulatory care or acute care? Did your findings surprise you

  Create a constructor to initialize student''s attributes

Create a constructor to initialize Student's attributes and use setters (you need to encapsulate your attributes). In the constructor, use the setter methods to set the attributes rather than setting them directly. The constructor should take the ..

  What do you meant by database security

What is meant by Database Security and What are the essential considerations in Database Security and How are they specifically relevant to ABC's planned computing environment?

  1do analogue samples in depression research advance

1.do analogue samples in depression research advance meaningfully ourknowledge of depression and its treatment?2.are

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd