U06a1
Karen Lloyd klloyd@capellauniversity.edu IT 3006
Communication Strategies for the IT Professional
June 12, 2011
Introduction
In today’s business world the security and privacy of employee files, business trade secrets and proprietary information has became an increased problem. The information is being compromised and/or stolen from within the business environment itself. The files are not protected from unauthorized individuals. These files can be protected using various methods, such as individual user accounts or profiles, storing paper files in a secured area as well as, improved electronic data storage.
New employees will fill out many documents upon applying for employment and after accepting employment with a new company. These new and potential employees may not be giving any thought to the safety and privacy of their personal information. Within a corporation these records have been accessed for identity theft purposes. They are also viewed by employees that should not have access to these types of files.
A business stands to face the same type of security and privacy issues. Proprietary information that is important to a business’ success can be stolen, sold or sabotaged by employees within the company. Some of the information taken can be trade secrets, financial documentation and employee personnel files.
Description of Overall Problem
Businesses need to ensure the secure storage of company files and the guaranteed privacy of employee information. With the increased use and demand for network computing, information security has become a high priority. With all the ways in which someone can gain access to private and confidential information, the previous safe measures need to be enhanced and improved (Yaoxue Zhang; Laurenc T. Yang; Yuezhi Zhou; Wenyuan Kuang. 2010). For example, employee and company files are
References: Gueldenzoph, L. E., & Snyder, M. J. (2006). In Kaliski B. S. (Ed.), Encyclopedia of business and finance; privacy and security (2nd ed.). Detroit: Macmillan Reference USA. Retrieved from http://go.galegroup.com.library.capella.edu/ps/i.do?id=GALE%7CCX1552100254&v=2.1&u=minn04804&it=r&p=GVRL&sw=w Mironi, M. (1974). The confidentiality of personnel records: A legal and ethical view. Labor Law Journal, 25(5), 270-292. Retrieved from http://ezproxy.library.capella.edu/login?url=http://search.ebscohost.com.library.capella.edu/login.aspx?direct=true&db=tsh&AN=5816959&site=ehost-live&scope=site MyDocs Online . com. (n.d.). Data theft has gotten out of hand: Are you safe? Zhang, Y., Yang, L. T., Zhou, Y., & Kuang, W. (2010). Information security underlying transparent computing: Impacts, visions and challenges. Web Intelligence & Agent Systems, 8(2), 203-217