Hrm/531 Week 2

Improved Essays
Every business is required by law to have some form of security policy in place that will protect their customer’s information. How robust these policies are, may, and do, differ from company to company and can depend on many different factors unique to each individual business. Information security is very important and at my widget company it would be my responsibility and ethical duty to do everything in my power to find out how my system was breached and exactly what customers information was compromised as well as who is responsible for taking this information. I would also be ethically responsible for finding out which employees have not been adhering to the company's security policy and accessing customer information when it was not part of their duties, and under what circumstances this happened. Where these employees instructed to do this or did the do it of their own accord and if so reprimand these individuals up to and including termination of their employment with my company. Also I would be responsible for insuring that that rest of my employees received proper training on security to ensure that there will not be anyone taking a nonchalant attitude toward security in the future. I would also be …show more content…
It would also make those companies look at their current guidelines for employees that they have regarding information security and update them or replace them with newer more efficient guidelines. Improving a company’s security policy and guidelines will only help them stay ahead of the people who try to take advantage of the weakness that they can find in these policies. In conclusion, as long as there are information systems, there will be those out there trying to steal that information, so all business are ethically responsible for doing everything they can to protect this

Related Documents

  • Decent Essays

    Hrm/531 Week 3 Quiz

    • 497 Words
    • 2 Pages

    Purchasing Units Recipe Units Physical Inventory Count Meat & Poultry Unit Unit Price Unit Conversion Unit Cost Inv Count Unit Conversion Unit Cost On Hand $ Total Beef Beef, Stew Meat, Frzn lb $ 2.18 oz 16 $ 0.14 lb 1 $ 2.18 20 $ 43.60 Black Angus lb $ 7.83 oz 16 $ 0.49 lb 1 $ 7.83 13 $ 93.96 Filet, Steak lb $ 9.56 oz 16 $ 0.60 lb 1 $ 9.56 12 $ 114.72 Pork Bacon 10# $ 25.83 oz 160 $ 0.16 lb 10 $ 2.58 8 $ 20.64 Chop lb $ 4.80 oz 16 $ 0.30 lb 1 $ 4.80 15 $ 72.00 Pork Rib Back lb $ 2.45 oz 16 $ 0.15 lb 1 $ 2.45 45 $ 110.25 Chicken Tenders 2/5 lb $ 25.50 oz 160 $ 0.16 lb 10 $ 2.55 0 $ - Brst lb $ 2.49 oz 16 $ 0.16 lb 1 $ 2.49 12 $ 29.88 Other Duck lb $ 1.98 oz 16 $ 0.12…

    • 497 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Hrm/531 Week 4 Assignment

    • 481 Words
    • 2 Pages

    I was assigned as a Service Delivery Manager on a project to manage services related to QA Environment for one of the largest Retail Organization in Canada. I was very excited to get exposure to the Retail Industry. Soon after joining the project, as I started reviewing the financial, I recognized that there is huge backlog of Invoice payments from client due to the dispute. Some of the invoices were as old as 6 Months and total amount exceeded $2M. As the year was approaching to the end pressure started to mount to clear these payments to meet our revenue targets. I was not the only one facing this challenge other Service Delivery Managers in the account also had the same issue.…

    • 481 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Hcr 220 Week 9 Rcm

    • 443 Words
    • 2 Pages

    RCM unifies the clinical and business side of healthcare using both primary and secondary patient data, insurance, and provider and the revenue cycle is vital in creating compliant and efficient reimbursement processes. The revenue cycle is divided into four which are preclaims activities, claims processing, account receivable and claims reconciliation and collection. The preclaims submission is the first process in the cycle which begins with patient case management and preregistration such as collection insurance information before patient arrives then collecting subsequent patient information to create a medical record number to meet financial, clinical and regulatory requirement and Medicare patient are advised on financial responsibilities if…

    • 443 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Hrm/531 Week 6 Paper

    • 848 Words
    • 4 Pages

    Week 1: Christie attended SkillQuest 5 days this week. Each day Christie received staff support to actively engage and participate with her peers. Christie successfully participated in a group activity 2 out of 4 days this week. This week Christie participated in bowling on the Xbox Kinect game system (Xbox). Staff supported Christie by pushing her wheelchair from the classroom to the lounge, turning on the TV and game console, and signing into the game.…

    • 848 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Hs/531 Week 8 Checkpoint

    • 415 Words
    • 2 Pages

    Stage 1- verbal warning This is the first step of the formal disciplinary hearing. The employee receives a verbal warning for his wrong doings. This is a meeting with the employer and employee. The employee may bring a representative.…

    • 415 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Reading 8.10 Discussion Question (p.524) Question: 1.In 1993, Jack-in-the-Box adopted tougher standards for its meat suppliers than those required by the federal government so that suppliers test more frequently for E. coli. Could Jack-in-the-Box have done more before the outbreak occurred? 2.The link between cooking to a 155-degree internal temperature and the destruction of E. coli bacteria had been publicly known for five years at the time of the outbreak. The Centers for Disease Control and Prevention (CDC) tests showed Jack-in-the-Box hamburgers were cooked to 120 degrees.…

    • 997 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    In the case of the week, I learned to effectively communicate and work independently on the final Summer Company inquiries and arrange meetings prior the deadline. The toll of responsibility granted me the chance to interact with clients on a greater scale while operating in the front-desk. This week, I continued analyzing, developing and working on spreadsheets, business inquiries and shadowing colleagues. Moreover, several events on Eventbrite modified with up-to-date information regarding where clients can register to attend these entrepreneurship sessions. Notably, Summer Company has deadlines were closing shortly, with last minute applications piling up were closely identify eligibility.…

    • 298 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    The following case study is based on a company called Target, which experienced a security breach in 2013 (Aguilar, 2014). Hackers penetrated the Target’s system through their web server (Aguilar, 2014). The hack exposed 40 million credit card and debit card details such as CCV numbers, credit card numbers, etc. as a result, employees lost their jobs, and board members were threatened with retrenchment (Aguilar, 2014). After that 140 lawsuits followed (Aguilar, 2014).…

    • 377 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Walmart Equal Pay

    • 721 Words
    • 3 Pages

    While looking at the Equal Employment Opportunity in Chapter 3 I found two Laws that stood out to me which were the Equal Pay Act of 1963 and the Pregnancy Discrimination Act of 1978. One reason they stood out to me is because I feel that both of these laws get broken daily. Although both of them were implemented years ago some companies have a hard time abiding by them. After conducting my research I found two well-known companies that have dishonored these laws and ended being in lawsuits.…

    • 721 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Recently while I was writing my screenplay I had a question about formatting so I turned to Google typing in my question. When the search options came up the first link led me to a website entitled: allexperts. While I was there I discovered that other writers had similar questions I had regarding their scripts. I read one of your reviews and I was hooked to this website because your review demonstrated: competent use of knowledge, politeness, and clarity. When I had another question I turned to this website and read yet another great review -- after checking to see who submitted the answer of all the reviews I read it was you each time.…

    • 150 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Employees are considered an extension of the company and it is in the best interest of all parties to refrain from conduct that could detrimentally harm business…

    • 2220 Words
    • 9 Pages
    Great Essays
  • Decent Essays

    Identity Theft Affidavit

    • 235 Words
    • 1 Pages

    request customers to 1) report if their credit card has been stolen 2) if necessary file an Identity Theft Affidavit with the Federal Trade Commission (FTC) if they feel they have been affected. If companies lack an appropriate system to act upon a situation of data breach, they can take the following preventive measures. A company can train and educate employees with the latest malicious and virus threats by having the IT department shoot out an informative email with updates. In addition, provide a training workshop directed by the IT department on how to respond to a matter of data breach in a company.…

    • 235 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    The data protection act covers personal data, information about specific people, something identifiable as them. For instance someone’s name (e.g. Helen Jones) is not personal data as there could be hundreds of Helen Jones’. However, Helen Jones combined with her date of birth and last address is personal data and falls under the data protection act.. Write a short paragraph to explain each of the 8 points clearly. Information must be, by law, created, used and distributed according to the points below.…

    • 794 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Desktop Research

    • 811 Words
    • 4 Pages

    Besides, cultivating the philosophical ethics and treating others as we want to be treated (golden rule) can aid to minimize the complexity of this issue (Wattles, 1997). For example, if we consider ourselves in the situation of a customer, would we like our information to be leaked out and our privacy interrupted? The architecture of the database and the law can solve this issue to some extent (Tavani, 1999). However, if the company is still misusing customer personal information, any of the staff can blow the whistle to outside world obviously after giving them an warning about the use of the data in wrong purposes (Near & Miceli,…

    • 811 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Whistleblowing Analysis

    • 708 Words
    • 3 Pages

    My Thoughts On Whistle Blowing In my opinion whistle blowing is one of the most important rights and obligations that employees have. Take for example the whistle blowing case of Dinesh Thakur and Ranxbay, it is clear that if he hadn’t have informed made an FCA complaint many people could have been injured or killed through the use of the unsafe medicine. In this way, Thakur was not only justified in what he did but also obligated to do so because other human being’s lives were at stake. This same principle applies to the Walter and BP case in which many animals could have been killed or endangered due to leftover oil in their habitats if he hadn’t have blown the whistle.…

    • 708 Words
    • 3 Pages
    Improved Essays