WGU MMT2 IT
Strategic SolutionTask 3 - Highly Rated Work
IF You Want To Purchase A+ Work Then
Click The Link Below , Instant Download
If You Face Any Problem E- Mail Us
At JohnMate1122@gmail.com
Task 3
Introduction:
Read the attached “AEnergy Company Case Study” before completing this task.
Scenario:
AEnergy Company has some security policies established. However, there have been some incidents that have created doubt about the effectiveness of the protections offered by the current policies. For example, an employee’s laptop computer was recently stolen at the airport while the employee was traveling on company business.
Management has asked you to analyze the company systems and update the policies as necessary so the company is protected from potential threats from both external parties and internal users of the company technology.
Task:
A. Evaluate the effectiveness of AEnergyCompany’s
security policies (see
the attached “AEnergy Data Security Policy,” “AEnergyEmployer
Security Policy,” and “AEnergyAccounting Security Policy”)
in regard to ethical issues.
1. Discuss two potential unethical uses of the company technology
and/or data by internal users.
Answer: Security policies are deployed and provisioned on the core network
resources to provide an additional layer of security. AEnergyEmployer
Security Policy is
highly effective compared to its other policies. After review of this policy,
it shows that the company is using enterprise level security precautions to
protect highly sensitive data and access to designated system. In my opinion,
even though the employer security policy is effective, it can be considered
unethical to review employees’ personal email which is sent from the work email
system. However, to maintain the enterprise level security system, this review
system cannot be unethical from the employer perspective but it is unethical
from the employees perspective as email is entitles as “personal” so that it is
not reviewed by the security staff as per policy of the company. Another
potential unethical uses of the company technology/data by internal users is as
client or corporate information (e.g., payroll, HR, etc.) that may be
considered potentially damaging if revealed which is only accessed by the
specific groups such as company management and security staffs. Confidential
data includes Social Security numbers, contact information, tax forms,
accounting data, security procedures, and other personal data. If any person of
the company management or security staff uses this information to harm its
customer and corporate client then it is unethical uses of company
technology/data by the internal user. As per company private policy, employees
can only share information of its clients and customers within the internal
department not outside the company.
No comments:
Post a Comment