As we all know security is an important protocol for any organization.docx

As we all know security is an important protocol for any organization.docx

Info icon This preview shows pages 1–4. Sign up to view the full content.

Running head: WORKPLACE SECURITY Security in the workplace Eric Perry MGT460: Leadership Priorities & Practice Jennifer Beaman January 25, 2015
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

Workplace Security 2 Security in the workplace As we all know security is an important protocol for any organization. When it comes to ethical practices taking security measures is vital. Throughout the degree program ethics is something that has been always involve in every course. Whether an individual has good or bad ethics security measures should be in place for the unknown. The implementation of basic security measures is vital to any organization because information breaches have been rapidly rising over the past decade at an alarming level. “An important set of ethical issues involves our psychological makeup as human beings. There is no doubt that our personal expectations, desires, and thought processes have an impact on what motivates us to behave morally” [Fie12]. Examining the effectiveness or ineffectiveness of security protocols will be the main focus of this report. Using this as the main focus Credit Acceptance Corporation is an organization that is very familiar for identifying and taking steps in solving and updating their security protocols. First and foremost, policies must be design and formulated to the understanding of each staff member. Second, physical security is very vital to this organization and examining how effective or ineffective these measures are will be included in this report. Finally, the information technology (I.T.) department will be examine since most organizations have been experiencing a breach in their network. Having security is such a vital commodity to any organization. The most importance is having these policies in place and ensuring that these protocols are working. “Credit Acceptance is a proven industry leader, and has been copied by many. The difference between Credit Acceptance and others trying to emulate our business model is our experience and our commitment to helping deserving consumers receive a fresh start”[Cre15] . First and foremost, policies must be design and formulated to the understanding of each staff member. “A security policy should not be a static document but one that evolves to
Image of page 2
Workplace Security 3 accommodate changing economic conditions, business plans, corporate cultures, and operating environments. To be effective, policies must be continually reviewed, improved, communicated to employees, and enforced throughout the organization” [And]. It is important that organizations take a proactive approach to ensure that the security policies are understood by each staff member. “It's every employee's responsibility to periodically review the company intranet for new information and to review security policies and guidelines. By reviewing the policies, employees can help the company identify suspicious activity and prevent malicious code from being introduced into the network”[Thu03]. Credit Acceptance Corporation is an organization that takes great pride in ensuring that all employees understand policies of security.
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

Image of page 4
This is the end of the preview. Sign up to access the rest of the document.
  • Fall '09
  • NelsonLauer
  • workplace security

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern