Where are any internal procedures violated by tom

Assignment Help Business Law and Ethics
Reference no: EM13764705

Late one night not long ago, George Corday, SCM's Senior Manager of Information Systems noticed some heavier than usual traffic moving between three operational sites; Tokyo, Milan, and Tampa. As usual Tom was at his desk when the call came in; some people claimed Tom slept and ate there. Tom answered "Hello, CSO Tom Brown speaking." George answered: "Hi Tom, have you got a minute? I noticed something odd with our net traffic and wanted you to look at it." Tom replied with a scripted answer, the first entry in the company incident response plan, "What do you think you saw, where and at what time or times?" George gave Tom the information he had observed. A few hours later Tom called George back to give him the initial report that someone had tapped into their system and was using it to transmit data around the world. The data was embedded in some typical transactions; however, the attacker had placed a worm in the system, which apparently had the potential for causing damage well beyond the company's system. He suggested to George that they could employ a track and trace procedure to attempt to isolate the attacker. Tom said he wanted to isolate those links in the system to prevent the attacker from launching attacks to other sites or hopefully to prevent the attacker from using their system to launch system attacks on the vendor and supply chain. Tom said he was more concerned over the ability of this worm to infiltrate their government contractors linked via VPN, which may have access to sensitive data and sites. The surprising part of the conversation turned out to be that an SCM laptop was being used to access the network. In this phone call to Tom, George OK'd the use of the track and trace system Tom had created to find the attacker and disable their ability to use SCM's network. He wanted the identity of who had use of the laptop, and wanted to know if there was any potential for proprietary data being removed from their network of if the network was just being used as a carrier. George also informed him that he would communicate the illegal use of their network to Takio Sumi, CIO, as soon as Tom had removed the attacker's ability to use their network.

Do you think any laws may have been violated by SCM in this investigation? Perhaps international laws?

Where are any internal procedures violated by Tom and George?

The chain of events and type of attack should have required what type of response from the two employees?

At what point in time should SCM involve their contractors, vendors, and the government agencies? What is the appropriate way to do that?

Reference no: EM13764705

Questions Cloud

Evaluate how well the organizational structure works : How does the structure relate to the particular sector that the organization is in -
Define business strategies for implementation : Create an implementation plan for your organization, a project from the websites such as or a state RFP site.
Report for cost of goods manufactured : Agale Combines, Inc. has $40,000 of ending finished goods inventory as of December 31, 2014. If beginning finished goods inventory was $25,000 and cost of goods sold was $75,000, how much would Agale report for cost of goods manufactured?
Are poor countries somehow different than wealthy countries : Are poor countries somehow different than wealthy countries - How can firms and markets increase the wealth of poor countries? Be sure to address each question in the problem.
Where are any internal procedures violated by tom : Where are any internal procedures violated by Tom and George? The chain of events and type of attack should have required what type of response from the two employees
Estimate what would happen to the volume of services : Estimate what would happen to the volume of services and the expected revenue to the practice, should the area's health insurers increase patient cost sharing from 20% to 30% of this charge. Use the concept of price elasticity to make the projecti..
Write research paper on criminal law : Write research paper on criminal law
Principles and theory of security management : think of some intrusions - the disgruntled mailman flying onto the Capitol lawn on his gyrocopter and remember the couple who crashed a White House function a few years ago
Write research paper on discrimination in police departments : Write research paper on Discrimination in police departments

Reviews

Write a Review

Business Law and Ethics Questions & Answers

  A new township has been incorporated the area of

a new township has been incorporated. the area of incorporation has had problems in the past with drug and alcohol

  Many theories have been advanced to explain the causes of

many theories have been advanced to explain the causes of juvenile crime. choose the theory that you think best

  What form of incorporation would be the most appropriate

Nicola is concerned about her potential liability for the debts and liabilities of the partnership. Also, she is concerned about the future of the business if one of them should decide to leave, as the lease is in both of their names.

  The supreme court has repeatedly asserted that a defendant

the supreme court has repeatedly asserted that a defendant is not entitled to a jury composed in whole or in part of

  Advise who should be appointed as directors of company

What ramifications does this have for Mr. Shifty, assuming that ASIC's records show that Mr. Shifty has, over the last nine months, had a similar track record with two other small, proprietary companies?

  For the discussion this week you explored how federal

for the discussion this week you explored how federal judges political ideologies impact judicial outcomes. in this

  Which country does the text describe as becoming the

1.the basic objective of the u.s. market-directed economic system is toa. minimize inflation.b. achieve an annual

  Find an article about this topic it may be one that

1. find an article about this topic. it may be one that includes a balanced discussion of the issues or it may argue

  Anna, as the operations manager

Anna, as the operations manager of the new corporation, determines that the money needed to expand is not available from traditional lenders such as banks. To purchase several new locations in New Jersey, Delaware and Maryland, Anna arranges with a w..

  Compare and contrast zero-sum game and non-zero-sum game

compare and contrast zero-sum game and non-zero-sum game and provide an example of each. with carol gilligans work on

  A key theory explored this week is labeling theory this

a key theory explored this week is labeling theory. this assignment examines how this particular theory may assist us

  Describing the laws governing legal authority

Write a 1,200- to 1,400-word paper, describing the laws governing legal authority and licensing requirements for private security companies and officers in your state. If you determine your state has no such statutes, select a neighboring state..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd