Hrm/531 Week 2

Improved Essays
Every business is required by law to have some form of security policy in place that will protect their customer’s information. How robust these policies are, may, and do, differ from company to company and can depend on many different factors unique to each individual business. Information security is very important and at my widget company it would be my responsibility and ethical duty to do everything in my power to find out how my system was breached and exactly what customers information was compromised as well as who is responsible for taking this information. I would also be ethically responsible for finding out which employees have not been adhering to the company's security policy and accessing customer information when it was not part of their duties, and under what circumstances this happened. Where these employees instructed to do this or did the do it of their own accord and if so reprimand these individuals up to and including termination of their employment with my company. Also I would be responsible for insuring that that rest of my employees received proper training on security to ensure that there will not be anyone taking a nonchalant attitude toward security in the future. I would also be …show more content…
It would also make those companies look at their current guidelines for employees that they have regarding information security and update them or replace them with newer more efficient guidelines. Improving a company’s security policy and guidelines will only help them stay ahead of the people who try to take advantage of the weakness that they can find in these policies. In conclusion, as long as there are information systems, there will be those out there trying to steal that information, so all business are ethically responsible for doing everything they can to protect this

Related Documents

  • Improved Essays

    Hcr 220 Week 9 Rcm

    • 443 Words
    • 2 Pages

    RCM unifies the clinical and business side of healthcare using both primary and secondary patient data, insurance, and provider and the revenue cycle is vital in creating compliant and efficient reimbursement processes. The revenue cycle is divided into four which are preclaims activities, claims processing, account receivable and claims reconciliation and collection. The preclaims submission is the first process in the cycle which begins with patient case management and preregistration such as collection insurance information before patient arrives then collecting subsequent patient information to create a medical record number to meet financial, clinical and regulatory requirement and Medicare patient are advised on financial responsibilities if…

    • 443 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Hrm/531 Week 2

    • 802 Words
    • 4 Pages

    Demand in the market economy is clarified as purchaser's desire and capability to consume a specific merchandise. Expand in cost will reduce the amount of goods given. A decrease in price will increase the quantity demanded of most goods. The reciprocal relationship between cost and the amount of goods identified as the demand of law and is normally act of a slopped line going downwards which can be identified as the demand curve. The demanded curve displays that the quantify demanded of a particular good at various amount of costs.…

    • 802 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Hs/531 Week 8 Checkpoint

    • 415 Words
    • 2 Pages

    Stage 1- verbal warning This is the first step of the formal disciplinary hearing. The employee receives a verbal warning for his wrong doings. This is a meeting with the employer and employee. The employee may bring a representative.…

    • 415 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Hrm/531 Week 3

    • 252 Words
    • 2 Pages

    The hospital administration will take the necessary actions to ensure that a child abduction sentinel event never occurs again. One resource that will be used to support the changes to the risk management program will be mandatory monthly training luncheons for the nursing teams. The Chief Nursing Officer will conduct the training luncheon program by using slides and computer presentations covering potential sentinel events and the steps required to prevent the occurrence, nursing documentation criteria, and effective communication techniques. Additionally, the training luncheons will be used as reinforcement to the training sessions provided by the nursing managers. Moreover, the nursing team members will have the opportunity to ask questions, voice concerns, and offer suggestions.…

    • 252 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    The first being the security of personally identifiable information. Now in this instance the company itself is not fully responsible for this release but they are indirectly responsible. The hackers are directly responsible for the dissemination of the users personal data but the company could have avoided this incident by shutting down but chose not to which directly constitutes a breach of privacy and security proposed by the company to protect the users information. The next issue is the release of users information that paid the company the fee of $19 to delete their information. The company decided not to delete the users information for some reason from their servers.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Reading 8.10 Discussion Question (p.524) Question: 1.In 1993, Jack-in-the-Box adopted tougher standards for its meat suppliers than those required by the federal government so that suppliers test more frequently for E. coli. Could Jack-in-the-Box have done more before the outbreak occurred? 2.The link between cooking to a 155-degree internal temperature and the destruction of E. coli bacteria had been publicly known for five years at the time of the outbreak. The Centers for Disease Control and Prevention (CDC) tests showed Jack-in-the-Box hamburgers were cooked to 120 degrees.…

    • 997 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    In the case of the week, I learned to effectively communicate and work independently on the final Summer Company inquiries and arrange meetings prior the deadline. The toll of responsibility granted me the chance to interact with clients on a greater scale while operating in the front-desk. This week, I continued analyzing, developing and working on spreadsheets, business inquiries and shadowing colleagues. Moreover, several events on Eventbrite modified with up-to-date information regarding where clients can register to attend these entrepreneurship sessions. Notably, Summer Company has deadlines were closing shortly, with last minute applications piling up were closely identify eligibility.…

    • 298 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    The following case study is based on a company called Target, which experienced a security breach in 2013 (Aguilar, 2014). Hackers penetrated the Target’s system through their web server (Aguilar, 2014). The hack exposed 40 million credit card and debit card details such as CCV numbers, credit card numbers, etc. as a result, employees lost their jobs, and board members were threatened with retrenchment (Aguilar, 2014). After that 140 lawsuits followed (Aguilar, 2014).…

    • 377 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Recently while I was writing my screenplay I had a question about formatting so I turned to Google typing in my question. When the search options came up the first link led me to a website entitled: allexperts. While I was there I discovered that other writers had similar questions I had regarding their scripts. I read one of your reviews and I was hooked to this website because your review demonstrated: competent use of knowledge, politeness, and clarity. When I had another question I turned to this website and read yet another great review -- after checking to see who submitted the answer of all the reviews I read it was you each time.…

    • 150 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Walmart Equal Pay

    • 721 Words
    • 3 Pages

    While looking at the Equal Employment Opportunity in Chapter 3 I found two Laws that stood out to me which were the Equal Pay Act of 1963 and the Pregnancy Discrimination Act of 1978. One reason they stood out to me is because I feel that both of these laws get broken daily. Although both of them were implemented years ago some companies have a hard time abiding by them. After conducting my research I found two well-known companies that have dishonored these laws and ended being in lawsuits.…

    • 721 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The data protection act covers personal data, information about specific people, something identifiable as them. For instance someone’s name (e.g. Helen Jones) is not personal data as there could be hundreds of Helen Jones’. However, Helen Jones combined with her date of birth and last address is personal data and falls under the data protection act.. Write a short paragraph to explain each of the 8 points clearly. Information must be, by law, created, used and distributed according to the points below.…

    • 794 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Employees are considered an extension of the company and it is in the best interest of all parties to refrain from conduct that could detrimentally harm business…

    • 2220 Words
    • 9 Pages
    Great Essays
  • Decent Essays

    Identity Theft Affidavit

    • 235 Words
    • 1 Pages

    request customers to 1) report if their credit card has been stolen 2) if necessary file an Identity Theft Affidavit with the Federal Trade Commission (FTC) if they feel they have been affected. If companies lack an appropriate system to act upon a situation of data breach, they can take the following preventive measures. A company can train and educate employees with the latest malicious and virus threats by having the IT department shoot out an informative email with updates. In addition, provide a training workshop directed by the IT department on how to respond to a matter of data breach in a company.…

    • 235 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Desktop Research

    • 811 Words
    • 4 Pages

    Besides, cultivating the philosophical ethics and treating others as we want to be treated (golden rule) can aid to minimize the complexity of this issue (Wattles, 1997). For example, if we consider ourselves in the situation of a customer, would we like our information to be leaked out and our privacy interrupted? The architecture of the database and the law can solve this issue to some extent (Tavani, 1999). However, if the company is still misusing customer personal information, any of the staff can blow the whistle to outside world obviously after giving them an warning about the use of the data in wrong purposes (Near & Miceli,…

    • 811 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Whistleblowing Analysis

    • 708 Words
    • 3 Pages

    My Thoughts On Whistle Blowing In my opinion whistle blowing is one of the most important rights and obligations that employees have. Take for example the whistle blowing case of Dinesh Thakur and Ranxbay, it is clear that if he hadn’t have informed made an FCA complaint many people could have been injured or killed through the use of the unsafe medicine. In this way, Thakur was not only justified in what he did but also obligated to do so because other human being’s lives were at stake. This same principle applies to the Walter and BP case in which many animals could have been killed or endangered due to leftover oil in their habitats if he hadn’t have blown the whistle.…

    • 708 Words
    • 3 Pages
    Improved Essays