BIS 219 Week 7 Checkpoint

BIS 219 Week 7 Checkpoint - transaction where sensitive...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Week 7 Checkpoint Doug Holt The way that my expectations would differ in these instances is that at home I expect my information stay there and not be leaked to anyone I would not want to have. At work, I expect there to be monitoring of some type so I would limit what I would do on that computer to just information that is needed to perform my duties of my job. In a public setting, such as a library, I would not want to divulge any personal information on that computer just to decrease the risk of revealing anything that someone could recover by simply browsing the computers history. The basis for my expectations is that my family and I are the only people using my computer at home, therefore with the security settings we have and the software we have in place I feel this is the safest place to do any form of online shopping or any
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: transaction where sensitive information needs to be provided. There are too many people that come into contact with public computers and without knowing what safeguards in place, I would not feel comfortable utilizing these for sensitive issues. Work computers should be used for just that, work. I would not feel comfortable putting personal information out there for my supervisors or coworkers to see. I feel that it is not only wrong but unethical to use a neighbors signal. This practice is essentially stealing from someone. Those who do so feel that this is not a crime because there is no victim. I do not agree with this because you are using a signal you are not paying for and that is not right....
View Full Document

This note was uploaded on 02/20/2011 for the course BIS 219 taught by Professor Chin during the Spring '10 term at University of Phoenix.

Page1 / 2

BIS 219 Week 7 Checkpoint - transaction where sensitive...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online