Identify at least three alternatives

Assignment Help Basic Computer Science
Reference no: EM133245579

Star Enterprises provides manufacturing services to the city of Denver, and generates an annual revenue of at least $1.5 billion. The company employs over 10,000 people, and this includes a team of 20 members of the Business Intelligence Department. One the BI Department's primary responsibilities is analyzing all company data to keep management informed at all times of the business position, analyze financials, audit any discrepancies, identify possible fraud, and all other facets of business analytics. The employees in this department are held to the highest ethical standards, because as part of their job, they have access to all data, which includes many confidential pieces of information, including financials, pay data, confidential invoices, etc. When dealing with company data, it is expected that employees that have access will only use the information as part of what is necessary to perform the function of the projects or assignments they are working on. These employees should not use the data for personal gain.

Henry is a senior member of the Business Intelligence Team and is a direct report to the Jackson, the Director of Business Intelligence. Henry's morale and performance has been diminishing since the beginning of the year. Jackson scheduled a meeting with Henry to discuss his performance and morale. During the meeting, Henry confessed that he was unhappy with his bonus that was paid at the end of the year, and he was unhappy because he believed he was paid a lower bonus that others and felt he was more deserving than other members of the team, who he believed were paid higher bonuses. When probed about how he would have a basis to compare other employee bonus amounts, he illuded to having an understanding of all other bonuses that were paid to other employees, including other members of the BI team.

Immediately after the meeting, Jackson reviewed Henry's security and determined that he did have access to see all employee's pay and bonus data. Henry's job function pertains to analytics of company assets, and he does not have any reason to view employees' pay or bonuses for his current project, however, he does have access to view this information as a senior member of the BI team. Jackson then ran a report to determine which reports had been recently run concerning confidential information and noticed that several reports had been accessed recently that would list multiple pieces of employees' confidential information, including birth dates, addresses, pay rates, and bonus amounts. However, there seems to be an issue with the audit report, and while it was recording the date/time the report was run, it was not reporting the user name (it was reporting a generic system account name). Jackson should have been performing periodic checks on these reports to monitor his team's data use.

This prompted Jackson to review Henry's background check that is supposed to be performed prior to hire, and Jackson immediately noticed that Henry disclosed on his application that he had been fired from his previous employment for reasons concerning a data breach. Jackson realized that he must not have fully vetted Henry's application upon hire, which was Jackson's responsibility as the Director of BI.

Needless to say, a leak of information about employees' salaries and bonus data could have serious implications for the BI team, including loss of reputation and loss of employee morale if the information were to spread throughout the company. Depending on the information that was accesses and how much was disclosed, it could be necessary to notify other employees that their data has been breached.

Jackson is now in a position to determine if Henry did indeed break protocol and identify what his next steps will be.

Individual Ethical Assessment Questions

Identify at least three alternatives that can be used to solve or lessen the impact of this situation.

Reference no: EM133245579

Questions Cloud

Explain in detail network interface card : Explain in detail how wireless networking works. Explain in detail the Network Interface Card (NIC) and the MAC address.
Knowledge of technology influence access to cloud storage : Who has access to Cloud Storage? How does the cost of computers, access to the internet, and knowledge of technology influence access to Cloud Storage?
Advanced computer architecture : Evaluate the hardware components of modern computing environments and individual functions. Describe how to plan to integrate these core lessons into daily life
Vsphere standard and vsphere enterprise license : What are some differences between the vSphere Standard and vSphere Enterprise license
Identify at least three alternatives : Identify at least three alternatives that can be used to solve or lessen the impact of this situation.
What type of networking equipment : What type of networking equipment would you recommend for the 2 companies? Why did you select the network model?
Exif data for the file under analysis : Give THREE general categories of information that might be found within the Exif data for the file under analysis.
Rank the top six most vulnerable assets : List and discuss the vulnerabilities and assets. Rank the top six most vulnerable assets.
Transfer the security risk of the system : Choose a key information system of your organization to analyze. If your organization wants to transfer the security risk of the system,

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd