5 list and briefly describe the methods you will use

This preview shows page 3 - 6 out of 7 pages.

We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
Management of Information Security
The document you are viewing contains questions related to this textbook.
Chapter 4 / Exercise 4
Management of Information Security
Mattord/Whitman
Expert Verified
5. List and briefly describe the methods you will use to communicate your policy to the internal and external stakeholders.
6. Discuss how the feedback from the stakeholders will be implemented to update the policy Scenario 1:
We have textbook solutions for you!
The document you are viewing contains questions related to this textbook.
Management of Information Security
The document you are viewing contains questions related to this textbook.
Chapter 4 / Exercise 4
Management of Information Security
Mattord/Whitman
Expert Verified
Scenario 2: Scenario Title: How to deal with corporate sabotage Scenario Summary: This scenario describe a company receive a package which contain a client list replete with contact details which belongs to their competitors. Scenario Title: The Big Deal This Scenario Describe an Australia Inventor name Ric Richardson challenge Scenario Summary: Microsoft about breaches his copyright by using his invention on computer software without his knowledge or permission and went to court and awarded a victory worth an astonishing half a billion dollars. Why is this unethical and/or breaches This is unethical because Microsoft didn’t get his permission and use his invention privacy and/or breaches copyright? as their own and try to earn profit from his invention. This will make Ric Richardson getting huge loss and it was serious. Relevant State or Federal Legislation: Australia, Copyright Act 1968 What action would you take to When Ric Richardson discovered that Microsoft had used his invention without his implement the policy? knowledge or permission he went to court and sue Microsoft about breaches his copyright. First I will communicate with Microsoft to ask them disarmed copyright item and How would you communicate? ask for compensation. If Microsoft refuse to my request. And I will go to court and sue Microsoft about breaches my copyright issue. Future Improvement For future, End user was suggested register copyright immediately to prevent those issue.
Why is this unethical and/or breaches privacy and/or breaches
copyright?

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture