MMT2 - Task 3 - IT Strategic Solutions.docx - RUNNING...

This preview shows page 1 - 4 out of 6 pages.

The preview shows page 2 - 4 out of 6 pages.
RUNNING HEADER: IT Strategic Solutions - MMT2 Task 31MMT2 Task 3Student Name??/??/????Western Governors University
RUNNING HEADER: IT Strategic Solutions - MMT2 Task 32A: Evaluate AEnergy’s Security PoliciesAEnergyhas asked for a review of the company’s current security policies, safeguards, andprocedures.The documentation provided for review did have titles specific to employeepositions such as “Accounting” and “Employer”, and there were also a general policy relating toclients and employees for security.The policies verbiage in the policies was easily read andunderstandable making the material easy to retain.However, there were several areas that needto be addressed to protect AEnergyfrom future security and ethical issues.A1. Internal unethical uses by internal usersIn researching, there have been several companies that have had issues with internalemployees using or selling company clients personal information as if it were their own.Theftof Personal Identifiable Information (PII) is a possible threat that could arise within AEnergy’sinternal staff.As an example, an internal employee could potentially use the credit cardinformation of a client for personal expenses.This does not only affect clients but could also affect internal employees as well.Internalemployees have often used the information of fellow employees for blackmail and other immoralactions.Since AEnergy’s employees have access to PII and other confidential information, thecompany needs to address this unethical behavior and the misuse of this information.And lastly, the use of security cameras and video recordings need to be addressed.Forsecurity reasons, companies need to use cameras and retain their video recordings, but if anunethical employee were to use these for the purpose to invade someone’s privacy then an ethicalissue arises.The use of the security cameras and their retained video recordings should only beused for security related functions only.
RUNNING HEADER: IT Strategic Solutions - MMT2 Task 33A2. External unethical uses by external usersLeaked information from external users is also an issue with other companies.Leaked

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 6 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
N/A
Tags
Information Security, Computer Security, National security, Hard disk drive, Security engineering

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture