Access over 20 million homework & study documents

Protecting Data And Respecting Privacy Guidelines For Salsal

Content type
User Generated
Subject
Computer Science
Type
Homework
Rating
Showing Page:
1/4
1
Running Head: Protecting Data and Respecting Privacy
Protecting Data and Respecting Privacy
Name:
Institution:

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/4
2
Protecting Data and Respecting Privacy
Protecting Data and Respecting Privacy
Information security is a central necessity for all organizations and companies. Protecting
information from unauthorized access and controlling possible information leakages from
company databases is a task that all companies endeavor to achieve (Schinder, 2005). Companies
use the information security consultants to seal any holes that may be exploited by other parties
to gain access to classified organization information.
As Information security professional, one has access to loads of private data on which to conduct
tests. For instance, following the cookies and cache trails of employees to know what they are
doing from time to time. the very aspect of protecting the information systems of accompany and
at the same time dealing with quite confidential information calls for establishment of ethical
guidelines as to how and when, as an information security analyst should carry out his or her
activities (Tiwary, 2011). The fact that most Information Security personnel fails to appreciate
that their work encompasses ethical conduct reinforces the need for an elaborate ethical code of
conduct. The group, based on these factors, found it necessary to dwell on this topic.
For the purposes of this topic, various ethical codes are applicable. First, that as
individuals or group of information security experts, accessing personal information should be
under very stringent conditions. First, in case the information being sought is relevant to the
whole. Here, if for instance a team of information security personnel has been instructed to seal a
threat in a given area, they should focus on such an area. All other aspects should be left intact.
The second ethical code is to never ask the users of their passwords. Sometimes the Information
security analyst may be tempted to ask the users for their passwords. Doing this would definitely

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/4

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 4 pages?
Access Now
Unformatted Attachment Preview
1 Running Head: Protecting Data and Respecting Privacy Protecting Data and Respecting Privacy Name: Institution: 2 Protecting Data and Respecting Privacy Protecting Data and Respecting Privacy Information security is a central necessity for all organizations and companies. Protecting information from unauthorized access and controlling possible information leakages from company databases is a task that all companies endeavor to achieve (Schinder, 2005). Companies use the information security consultants to seal any holes that may be exploited by other parties to gain access to classified organization information. As Information security professional, one has access to loads of private data on which to conduct tests. For instance, following the cookies and cache trails of employees to know what they are doing from time to time. the very aspect of protecting the information systems of accompany and at the same time dealing with quite confidential information calls for establishment of ethical guidelines as to how and when, as an information security analyst should carry out his or her activities (Tiwary, 2011). The fact that most Information Security personnel fails to apprecia ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Great! 10/10 would recommend using Studypool to help you study.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Documents