Florida State Univ Security Policies and Ethical issues A Energy COs Discussion

User Generated

ZvffFurerOnol

Writing

Florida State University

Description

Evaluate the effectiveness of AEnergy Company’s security policies (see the attached “AEnergy Data Security Policy,” “AEnergy Employer Security Policy,” and “AEnergyy Accounting Security Policy”) regarding ethical issues. Requirement: look over the 3 security policies and talk about how good/bad they are regarding ethical issues.

1. Discuss two potential unethical uses of the company technology and/or data by internal users. Requirement: point out 2 potential unethical uses by internal users.

2. Discuss two potential unethical uses of the company technology and/or data by external parties. Requirement: point out 2 potential unethical uses by external parties.

B. Evaluate the effectiveness of AEnergy Company’s security policies (see the attached “AEnergy Data Security Policy,” “AEnergy Employer Security Policy,” and “AEnergy Accounting Security Policy”) regarding security threats. Requirement: look over the 3 security policies and talk about how good/bad they are regarding security threats.

1. Discuss two potential security threats to the company technology and/or data from internal users. Requirement: point out 2 potential security threats from internal users.

2. Discuss two potential security threats to the company technology and/or data from external parties. Requirement: point out 2 potential security threats from external parties.

C. Create updated company policies that outline expectations related to use of company technologies by internal users and issues with external parties. Requirement: outline new policies for the expectations toward the use of company technology by internal users and issues with external parties.

1. Explain how your changes would mitigate the unethical uses discussed in parts A1 and A2. Requirement: Address how the new policies mitigate the issues from A1 and A2.

2. Explain how your changes would mitigate the security threats discussed in parts B1 and B2. Requirement: Address how the new policies mitigate the issues from B1 and B2.

This task cannot be completed without the use of the information in the provided attached documents. This task needs to clearly address each requirement.

Unformatted Attachment Preview

A. Evaluate the effectiveness of AEnergy Company’s security policies (see the attached “AEnergy Data Security Policy,” “AEnergy Employer Security Policy,” and “AEnergyy Accounting Security Policy”) regarding ethical issues. Requirement: look over the 3 security policies and talk about how good/bad they are regarding ethical issues. 1. Discuss two potential unethical uses of the company technology and/or data by internal users. Requirement: point out 2 potential unethical uses by internal users. 2. Discuss two potential unethical uses of the company technology and/or data by external parties. Requirement: point out 2 potential unethical uses by external parties. B. Evaluate the effectiveness of AEnergy Company’s security policies (see the attached “AEnergy Data Security Policy,” “AEnergy Employer Security Policy,” and “AEnergy Accounting Security Policy”) regarding security threats. Requirement: look over the 3 security policies and talk about how good/bad they are regarding security threats. 1. Discuss two potential security threats to the company technology and/or data from internal users. Requirement: point out 2 potential security threats from internal users. 2. Discuss two potential security threats to the company technology and/or data from external parties. Requirement: point out 2 potential security threats from external parties. C. Create updated company policies that outline expectations related to use of company technologies by internal users and issues with external parties. Requirement: outline new policies for the expectations toward the use of company technology by internal users and issues with external parties. 1. Explain how your changes would mitigate the unethical uses discussed in parts A1 and A2. Requirement: Address how the new policies mitigate the issues from A1 and A2. 2. Explain how your changes would mitigate the security threats discussed in parts B1 and B2. Requirement: Address how the new policies mitigate the issues from B1 and B2. This task cannot be completed without the use of the information in the provided attached documents. This task needs to clearly address each requirement. A Energy “ A to the power of Energy” Data Security Policy Purpose This document defines the data security policy of A Energy Company. A Energy Company takes the privacy of our employees and clients very seriously. To ensure that we are protecting our corporate and client data from security breaches, this policy must be followed and will be enforced to the fullest extent. Intent The goal of this policy is to inform employees at A Energy Company of the rules and procedures relating to data security compliance. The data covered by this policy includes, but is not limited to, all electronic information found in e-mail, databases, applications, and other media; paper information, such as hard copies of electronic data, employee files, and internal memos; etc. Audience This policy applies to all employees, management, contractors, vendors, business partners, and any other parties who have access to company data. Data Types A Energy Company deals with two main kinds of data: 1. Company-owned data that relates to areas such as corporate financials, employment records, payroll, proprietary information about our products, etc. 2. Private data that is the property of our clients and/or employees, such as Social Security numbers, credit card information, contact information, etc. 1 Proprietary & Confidential A Energy “ A to the power of Energy” Data Classifications A Energy Company data is composed of 4 classifications of information: 1. Public/Unclassified This is defined as information that is generally available to anyone within or outside of the company. Access to this data is unrestricted, may already be available, and can be distributed as needed. Public/unclassified data includes, but is not limited to, marketing materials, annual reports, corporate financials (and other data as applicable). Employees may send or communicate a public/unclassified piece of data with anyone inside or outside of the company. 2. Private This is defined as corporate information that is to be kept within the company. Access to this data may be limited to specific departments and cannot be distributed outside of the workplace. Private data includes, but is not limited to, work phone directories, organizational charts, company policies (and other data as applicable). All information not otherwise classified will be assumed to be private. Employees may not disclose private data to anyone who is not a current employee of the company. 3. Confidential This is defined as personal or corporate information that may be considered potentially damaging if released and is only accessible to specific groups (e.g., payroll, HR, etc.). Confidential data includes, but is not limited to, Social Security numbers, contact information, tax forms, accounting data, security procedures, and other personal data. A Energy Company considers it a top priority to protect the privacy of our clients and employees. A separate privacy policy outlines our commitment to protecting personal data. Employees may only share confidential data within the department or named distribution list. 4. Secret/Restricted This is defined as sensitive data which, if leaked, would be harmful to A Energy Company, its employees, contractors, and other parties as applicable. Access is limited to authorized personnel and third parties as required. Secret/restricted data includes but is not limited to audit reports; legal documentation; business strategy details; and proprietary information about designs, materials, and processes. Secret/restricted data cannot be disclosed by anyone other than the original author, owner, or distributor. 2 Proprietary & Confidential A Energy “ A to the power of Energy” It is the responsibility of everyone who works at A Energy Company to protect our data. Even unintentional abuse of classified data will be considered punishable in accordance with the extent and frequency of the abuse. Responsibilities All employees are responsible for adhering to the policy and reporting any activities that do not comply with this policy. Management personnel are responsible for ensuring that those who directly report to them understand the scope and implications of this policy. Human resources must also ensure that all employees have a signed copy of this policy in their file. Security staff will be monitoring data for any unauthorized activity and are responsible for updating access requirements as needed. Any employee who authors or generates corporate or client data must classify that data according to the criteria outlined above. Management Ownership of this policy falls to the IT team. For any questions about this policy, or to report misuse of corporate or personal data, please contact the IT team at ITteam@aenergycompany.com. The IT team will work to maintain data access privileges, which will be updated as required when an employee joins or leaves the company. These are the accepted technologies A Energy Company uses to enforce and ensure data security: 1. Access controls 2. Strong passwords 3. System monitoring 4. Trend analysis 3 Proprietary & Confidential A Energy “ A to the power of Energy” Review Management is responsible for keeping this policy current. This policy will be reviewed annually or as circumstances arise. Also annually, a full security audit will be performed by the IT team and selected company members to ensure that the policy is properly aligned with industry standards. Enforcement Employees found to be in violation of this policy by either unintentionally or maliciously stealing, using, or otherwise compromising corporate or personal data may be subject to disciplinary action up to and including termination. Employee Acknowledgement I agree to the terms and conditions set forth in this policy: Employee Name: __________________________ Date: ________________________ Employee Signature: _______________________________________ Witness Name: __________________________ Witness Signature: _______________________________________ Date: ________________________ 4 Proprietary & Confidential A Energy “ A to the power of Energy” Employer Security Policy All new employees will receive training related to computer and organization security during the required new hire training. The employee must agree to the security requirements to receive the user ID and temporary password. All employees are expected to maintain secrecy of their password and abide by company security procedures. Computer and Workstation Security All computers accessing the A Energy Company network are required to have an IT administrative account to access the computer and the password-protected log in. All computer activity may be audited and all activity is tracked by user ID. All laptop computers and workstations are equipped to automatically lock at a set number of minutes of inactivity for protection from intentional or unintentional misuse of an employee's account. A single user ID and password is used to access the computer and e-mail system. All hardware, including computers, projectors, external hard disk drives, and printers, contain tracking mechanisms in case of loss or theft. Laptop computers are assigned to a single user. Workstations may be shared and require authentication by each user with the individual's user ID and password. All printing requires a pass code to be entered for proper billing and cost allocation. Internet browsing is managed to safeguard bandwidth. Select Internet sites are blocked using web filtering software. Appeals may be filed for access to sites that have been blocked and have a business necessity. Staff Security A Energy Company safeguards its employees with monitoring technology. High-definition digital security cameras monitor internal and external environments. All employees are offered personal safety training by an approved instructor. Entrance into the building and movement from one area to another requires each employee to swipe an electronic identification card. At no time are employees permitted to allow another employee or a guest access without the individual swiping an electronic identification card. Guest Security All guests are required to receive a visitor's electronic identification card. The card will be coded to allow access to the approved areas of the facility. Guests may be asked to sign a nondisclosure form to protect proprietary information and technology. Monitoring The physical location and network use are monitored to identify and respond to any unauthorized access to the facility or network. 1 Proprietary & Confidential A Energy “ A to the power of Energy” Physical Location Monitoring High-definition digital cameras record movement at internal and external locations at each site. Security personnel monitor the video output. All images are saved for future analysis. Motion sensors are in place for additional security. Network and Resource Usage Monitoring The A Energy Company network and servers are accessible only through authentication by an approved user ID and password. Some levels of the network require a SecurID token in addition to an approved user ID and password. Use of network resources is monitored and linked to the user ID and password that authenticated the computer accessing the network. Locking or logging off laptop computers or workstations when not in use is advised to avoid intentional or unintentional misuse of the network. Internet access to some sites is limited. If these blocked sites are necessary for business related activities, an appeal can be made. Reviews of appeals will be within one business day. E-mail accounts can be reviewed at any time. If a personal e-mail is sent from the work account, employees can mark the subject line as "personal" to avoid that e-mail being opened during the monitoring process. Confidentiality of trade secrets is essential for a competitive edge; each person must help protect the company. E-mail etiquette is suggested to portray the professional image of the company. Computer Security Each computer and workstation has virus protection software. This software automatically updates once per week and also whenever critical updates are identified. Each computer will be scanned for viruses and malware once a month. Updates and scans are scheduled to be performed to minimize impact on productivity. Passwords must be changed every 90 days, must be a minimum or 8 characters in length, and must contain at least three of the four following criteria: a capital letter, a lowercase letter, a symbol, or a number. All computers have VPN access that requires authentication with an approved user ID and password to tunnel through firewalls when using the internal network or any external network. Each laptop computer has an encrypted hard drive to protect sensitive information in the event of loss or theft. Each employee is issued a security cable to use when traveling to help deter theft. Violations Violations of the security policies will be reviewed to determine the cause of the security breech. Intentional misuse will be prosecuted to the full extent of the law. 2 Proprietary & Confidential A Energy “ A to the power of Energy” Accounting Security Policy The A Energy Company Accounting Security Policy is to be provided to each employee at the time of acceptance of the employment offer. The policy is available for review by users of our website through a request to customer service. Updates to the policy are documented and available on the company intranet for review. The website policy is updated as needed and the last date of revision is posted on the website as well. Audits for compliance are budgeted to occur annually at six months after the start of the fiscal year, July 1. Billing and cost allocation analyses are completed monthly. Trend analysis is analyzed daily in a manner similar to how production data is analyzed. A thorough examination of the accounting data is completed quarterly. Accounting Security Policy The accounting controls for A Energy Company keep a time-stamped record of resource usage including logins and network use. The accounting controls do not permit or deny access. The purpose of collecting resource usage information is for the purpose of trend analysis, auditing, billing, or cost allocation. Information about users of services provided by the A Energy Company website and network is collected, stored, and secured to protect the users' personal information and privacy. For Employees of A Energy Company Each employee is assigned a user profile and password at the time of employment. Each request to connect to a network or service queries a check within the system to determine if the user is permitted access or if enough licenses are available for use. If authorization is granted, the user ID, IP address, location, time of connection, and location of the file or information accessed are recorded. Use information is analyzed for billing and cost allocation to internal and external cost centers. Trend analysis provides information on infrastructure functionality and requirements for infrastructure modifications. Usage information is shared only in aggregate for evaluation to appropriate management staff for confirmation of acceptable use. For Users of the A Energy Company Website The website of A Energy Company collects and safeguards personal information and other usage data. The data collected through participation in website activity and completing survey or contest forms includes name, ID, phone number, e-mail or mailing address, and other contact information as necessary for participation. The data collected through subscription to newsletters delivered via e-mail include name, 1 Proprietary & Confidential A Energy “ A to the power of Energy” company name, and e-mail address. The data collected through browsing the website include user IP, browsing profile, content tracking, location tracking, time of use, and search terms. The A Energy Company website uses cookies to transfer short pieces of information to the user's hard drive to store settings and for record keeping purposes. If users have set their browsers to refuse cookies, there is the possibility that some features and activities on the A Energy Company website may not be accessed. The purpose of using cookies is to provide a better and more personalized service to the user by facilitating logging in to and out of the website and customizing the presentation of the website. The information from the cookies tracks access counts and frequency of participation in promotional activities. A Energy Company does not rent, sale, or otherwise distribute the data collected with other organizations or individuals. Those data transmissions that are not completed through an SSL connection between the website and the user may not be completely secure, and the user must bear the risk of data transfer via the Internet. Personal information submitted in public sections of the website may be collected by others and used by third parties. To reduce exposure to the risk, users of the public forums and other public sections of the website are reminded in the agreement of use statement that they are not required to reveal personal information publicly. A Energy Company is not responsible for consequences resulting from disclosure of personal information in the public sections by users. Users of the A Energy Company website will be reminded to adhere to the latest privacy safeguard measures and guidelines. Announcements will be posted on the website to inform users of any changes to the policies, guidelines, or uses of personal information. Inquiries about the A Energy Company privacy policy may be sent via e-mail to customerservice@aenergycompany.com or by calling Customer Service during regular business hours. 2 Proprietary & Confidential
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached. Please let me know if you have any questions or need revisions.

Surname 1
Student’s Name
Professor’s Name
Course
Name
Company’s Security Policies and Ethical issues
The A Energy Company's security policies embrace ethical issues by recognizing the
difference between private and company data. All the stakeholders in the organization are
expected to adhere to the policy by keeping boundaries where expected. The policies, however,
violate the privacy and autonomy of the employees. The workers are under surveillance when in
the internal and external environment of the company. The fact that the workers are not required
to use the internet for personal uses shows the lack of trust from the management team.
Unethical Uses by Internal Users
Internal users in the company are the employees and the management. Potential unethical
use of the company’s technology by internal users is theft. All the organization stakeholders are
expected to respect the policies and adhere to the outlined guidelines. Theft can include using
company data for personal benefits. In case the staff in the accounting department decides to
benefit themselves using the company’s resources, this is also classified as theft. Violating the
company’s internet policies is also a potential unethical use. Misusing the network by nonbusiness related sites ...

Similar Content

Related Tags