Thursday, September 26, 2019
W5-Data Security Policy Essay Example | Topics and Well Written Essays - 1250 words
W5-Data Security Policy - Essay Example Modern technology poses modern confronts to the protection of entity privacy which existing (Laudon & Laudon, 1999). Privacy is the declaration of individuals to be theft alone, free from observation or intrusion from other individuals of organizations as well as the state. Declarations to privacy are also caught up at the place of work. Information technology and system pressure individual declarations to privacy by making the incursion of privacy inexpensive, cost-effective, and efficient (Laudon & Laudon, 1999). Organizational information security strategies, measures, and standards are entirely significant reflections. Organization has to properly file and put into practice a successful information safety plan. Every category of such information safety serves a diverse function. The W5-Data Security Policy incorporates following main points regarding the organizational data (W5-data security Policy, 2009) Security risk: The data and information security risk can be illustrated as the intensity of affect on organization activities (comprising operational jobs, illustrations, or status), organization possessions, or individuals ensuing from the procedure of an business information arrangement offers the possible influence of a hazard and the probability of that intimidation occurring (Rebecca, 2007). The above section has presented the possible hazard situation is business. Such situation can lead to lot of possible information exploitation cases. Like that any worker can take information regarding any customer and blackmail him for some reason. That will make some bad image of the company information management. Lot of customers will hesitate to provide their information or even do no come to that company. This will case a serious business problem. Data security procedures illustrate how to put into practice the data security strategy. Actions articulate the gradually comprehensive events essential to effectively fulfill a job that chains the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.