Free Essay

Cis 207 Week 2 Information Use Paper

In:

Submitted By biglee24
Words 913
Pages 4
Information Use
CIS 207
April 10, 2013

Information Use
Company’s safeguard sensitive data like credit cards, social security numbers, or names by storing them in files. Businesses need this information to perform business functions. Identification theft is on the rise and protecting customers and employee’s personal information is paramount for any business to perform. The inability to protect their information could result in the loss of trust from a client or a lawsuit. Successfully protecting personal information is based on five key principles; they are take stock, scale down, lock it, pitch it, and plan ahead (Federal Trade Commission, n.d.). Take stock refers to the inventory of personal information stored and who has access to the information. Ensuring only those people who has a need to know is given access. For example, at the restaurant I own, the cashier handles credit card transactions. This is important because if there were an incident where a customer was over charged or had a complaint; it would be easy to investigate the source of the problem. When taking inventory of the personal information stored, computers, and file cabinets are a great place to start. Flash drives, mobile phones, and website are also places to conduct an inventory. The company must talk to employees who sends personal information and how they send it. Customers, banking institutions, and credit card company’s send sensitive data through a variety of ways. Sensitive information is sent through websites, e-mails, regular mail, and cash registers or point-of-sale (POS) terminals. Some sensitive information kept are credit card and checking account numbers from customers and can be stored in file cabinets, disks and tapes, computer or branch locations. The Fair Credit Reporting Act and Federal Trade Commission Acts require businesses to provide reasonable security of sensitive information (Federal Trade Commission, n.d.).
The second principle in protecting sensitive information is scale down. Scaling down, means to keep only the data required to conduct business transactions. If there is not a need to keep the sensitive data or if the data has served the purpose intended, dispose of it. Relevant data is keep only as long as it is required.
The third principle is to lock it. Securing sensitive information deals with four elements, physical security, electronic security, employee training, and contractor’s security practices. Many times sensitive information is compromised by documents lost or stolen, therefore it is important to keep those items locked. The first element is physical security or locking it. Devices that have sensitive information must be locked in a room or file cabinet.
Access to the room storing the data should be limited and only authorized employees should have keys to the room. Employees should be trained not leave sensitive data lying on their desks when not working on or using them. If the need to leave the area, documents must be locked in a cabinet and the office door should be locked. This makes it difficult for a thief to gain access to the data. The second element is computer security practices are to log off when they are away from computers. The use of security software that protects the computer from hackers and viruses must be used and updated as instructed by IT personnel. Websites such as www.us-cert.gov or www.sans.org gives alerts about new vulnerabilities. IT will often make available vendor-approved patches to correct problems. Sensitive information should always be encrypted when sent to third parties. When sending and receiving credit card information, it should be done using Secure Sockets Layer (SSL). Passwords used for logging into workstations must be at least eight characters, consisting of a mixture of upper and lowercase letter, numbers, and characters. This makes it difficult for hackers and thieves to solve. The passwords should charge every few months and under no circumstances should it be written on paper. Employees should be made aware of callers impersonating IT staff. These calls are fraudulent and no one within the company would ever ask for their password. The third element is employee training. Employees should attend regularly scheduled security training provided by IT staff. They should be trained on how to recognized security threats and procedures for reporting them. Contractors and vendors whom business functions are outsourced should be investigated to ensure that have data security practices in place. The fourth principle is to pitch it. Credit card receipts, credit reports, or any other devices containing sensitive data must be disposed of properly. Throwing items in a dumpster or trash bin is unacceptable. Paper records should always be destroyed by shredding, burning, or pulverizing them before throwing away. Disposing of old computers, use wipe utility programs to overwrite the entire hard drive so files cannot be recovered. Just deleting files is unacceptable because the files can still be recovered (Federal Trade Commission, n.d.). The same procedures apply to employees whom work from home. The last principle is planning ahead in case there is a security breach. If a computer is compromised, disconnect it from the Internet immediately. All incidents should be investigated immediately and inform customers, law enforcement, credit bureaus, of the breach if they are affected by it. Concerning protecting personal information it is important to remember the following principles: take stock of the personal information stored, scale down, lock it, pitch it, and plan ahead.

Reference
Federal Trade Commission. (n.d.). Protecting Personal Information: A Guide for Business. Retrieved from http://ww.ftc.gov

Similar Documents

Premium Essay

Individual Assignment

...Individual assignment Jenna Lee CIS/207 December 18, 2014 Krisda Cripe Individual assignment In the world today, there are many companies and homes who own computers. Computers that store personal information, which can be stolen by hackers. It is important to install anti-virus software and ensure their personal computers are secured with passwords. In the military, they have top security firewalls, with these security measures hackers are not able to transfer personal information. Gene Spafford states, “The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards.” Spafford,G. (2012). Keeping your system updated increases the protection of important information, although it is hard to maintain a track record of updates. There are many ways to ensure the disposal of personal data is performed properly, one way to dispose data is to completely erase the information in the system and hard drive. Data storage depends on the current space of your hard drive, but it is important for security measures to be installed and updated frequently. In a computer, there is a control panel to control the users of your computer system, setting up a password for users to specifically view certain websites and also a folder in which only the authorized account holder may access. Identity theft is the most common thing that happens when information is stored without ensuring the security protection on computers are...

Words: 590 - Pages: 3

Premium Essay

Individual Assignment

...Individual assignment Jenna Lee CIS/207 December 18, 2014 Krisda Cripe Individual assignment In the world today, there are many companies and homes who own computers. Computers that store personal information, which can be stolen by hackers. It is important to install anti-virus software and ensure their personal computers are secured with passwords. In the military, they have top security firewalls, with these security measures hackers are not able to transfer personal information. Gene Spafford states, “The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards.” Spafford,G. (2012). Keeping your system updated increases the protection of important information, although it is hard to maintain a track record of updates. There are many ways to ensure the disposal of personal data is performed properly, one way to dispose data is to completely erase the information in the system and hard drive. Data storage depends on the current space of your hard drive, but it is important for security measures to be installed and updated frequently. In a computer, there is a control panel to control the users of your computer system, setting up a password for users to specifically view certain websites and also a folder in which only the authorized account holder may access. Identity theft is the most common thing that happens when information is stored without ensuring the security protection on computers are maintained...

Words: 591 - Pages: 3

Premium Essay

New System Proposal Cis/207

...New System Proposal Team B CIS/207 January 16, 2013 New System Proposal Riordan Manufacturing Company is leader in industry, and the company uses polymer materials to create solutions to customers. Dr. Riordan, a professor of chemistry founded Riordan Plastics Inc. by 1993 the company went to Riordan Plastics Inc. to Riordan Manufacturing Company and expanded the company into China. In 1991 the company supported commercial applications for his patent and the customers that use the products are the manufacturer of automotive parts, appliance manufactures, the manufactures of aircrafts, and the Department of Defense (DoD), alone with bottlers, and beverage makers (Riordan Mfg., 2012). The company’s earnings are $46 million and the total revenue excesses $1 Billion. Riordan Manufacturing Company has over 500 employees in Albany GA, Pontiac MI, and Hangzhou China (Riordan Mfg., 2012). Looking into the company’s system, there isn’t any security features established to prevent anyone from accessing information on the company’s intranet. Logins should be required to access the information within the company’s intranet and also should be monitored by the IT department. When the company expanded their operations in to Hangzhou China the fan manufacturing operation moved from Pontiac Michigan to Hangzhou China, team B need to look at the financing and accounting department systems because it was never addressed on the switch, just added more software...

Words: 1392 - Pages: 6

Premium Essay

Doc1

...Journal of Business Case Studies – Second Quarter 2006 Volume 2, Number 2 Case Studies In Marketing Research Donald K. Hsu, (Email: yanyou@hotmail.com), Dominican College ABSTRACT The use of case studies for Marketing Research has been examined. Starting with a topic selection, students collected the background information from various sources. A focus group was conducted to gather detailed information. A questionnaire was designed for an in-depth survey of the general public. Using mall intercept, 100 or more convenient samples were collected from the questionnaire. SPSS software was used to analyze this data. Then a final report with possible recommendations was written. During the course of this research, students made face-to-face interview with senior managers or CEO, selected appropriate Harvard Business School cases, did research using Internet or library resources, and added much real-life learning to the theoretical in-class knowledge. INTRODUCTION V ase studies in Marketing Research have attracted much interest for global researchers. During the last two years, participants at the European Applied Business Research Conference presented findings in marketing related topics: 56 papers in 2003 and 25 papers in 2004. Out of the 81 papers, 24 reported work on marketing research. Cho and Ha (2004) measured consumer behavior by surveying 300 people on two brand names, Chow et al (2003) studied the environment friendly (eco-label) issues on the...

Words: 3534 - Pages: 15

Premium Essay

Aau Catalog

...ALLIED AMERICAN UNIVERSITY Personalized. Flexible. Dedicated. Online Programs – Individual Support – Open Enrollment – Ease of Transfer Credits UNIVERSITY CATALOG 2013 Seventh Edition 22952 Alcalde Drive, Laguna Hills, CA 92653 Phone: (888) 384-0849 ∼ Fax: (949) 707-2978 7:00 A.M. – 5:00 P.M. (Monday – Friday) Email: info@allied.edu Website: www.allied.edu KEY STAFF AND FACULTY Charlotte Hislop, Ph.D. Candidate, President/CEO Bonny Nickle, Ed.D., Provost Eric Sharkey, M.Ed., Director of Education Bill Luton, Ph.D., Director of Assessment and Dean of Business Carlo Tannoury, Ph.D. Candidate, Dean of Computer Information Systems Patricia Drown, Ph.D., Dean of Criminal Justice and General Studies C.J. Bishop, M.B.A., Institutional Research Frank Vazquez, Operations Director Parrish Nicholls, J.D., Director of Compliance Lindsay Oglesby, Admissions Director Abby Dolan, B.A., Registrar Sasha Heard, M.B.A., Student Services Manager Barbara Jobin, B.S.B.A., Career Center Manager Hugo Aguilar, B.A., Chief Financial Officer Richard Madrigal, B.A., Financial Aid Officer As a prospective student at Allied American University, you are encouraged to review this catalog prior to signing an enrollment agreement. You are also encouraged to review the student performance fact sheet which must be provided to you prior to signing an enrollment agreement. This catalog is not a contract between the student, AAU, or any party or parties. Reasonable effort was made at the time this document...

Words: 52297 - Pages: 210

Premium Essay

Form

...OFFICIAL CATALOG This Catalog contains information, policies, procedures, regulations and requirements that were correct at the time of publication and are subject to the terms and conditions of the Enrollment Agreement entered into between the Student and ECPI University. In keeping with the educational mission of the University, the information, policies, procedures, regulations and requirements contained herein are continually being reviewed, changed and updated. Consequently, this document cannot be considered binding. Students are responsible for keeping informed of official policies and meeting all relevant requirements. When required changes to the Catalog occur, they will be communicated through catalog inserts and other means until a revised edition of the Catalog is published. The policies in this Catalog have been approved under the authority of the ECPI University Board of Trustees and, therefore, constitute official University policy. Students should become familiar with the policies in this Catalog. These policies outline both student rights and student responsibilities. The University reserves the right and authority at any time to alter any or all of the statements contained herein, to modify the requirements for admission and graduation, to change or discontinue programs of study, to amend any regulation or policy affecting the student body, to increase tuition and fees, to deny admission, to revoke an offer of admission and to dismiss from the...

Words: 149595 - Pages: 599

Premium Essay

Systematic Review

...Sarina Abdul halim Lim Article information: Downloaded by North South University At 22:57 26 January 2016 (PT) To cite this document: Saja Ahmed Albliwi Jiju Antony Sarina Abdul halim Lim , (2015),"A systematic review of Lean Six Sigma for the manufacturing industry", Business Process Management Journal, Vol. 21 Iss 3 pp. 665 - 691 Permanent link to this document: http://dx.doi.org/10.1108/BPMJ-03-2014-0019 Downloaded on: 26 January 2016, At: 22:57 (PT) References: this document contains references to 63 other documents. To copy this document: permissions@emeraldinsight.com The fulltext of this document has been downloaded 961 times since 2015* Users who downloaded this article also downloaded: Saja Albliwi, Jiju Antony, Sarina Abdul Halim Lim, Ton van der Wiele, (2014),"Critical failure factors of Lean Six Sigma: a systematic literature review", International Journal of Quality & Reliability Management, Vol. 31 Iss 9 pp. 1012-1030 http://dx.doi.org/10.1108/IJQRM-09-2013-0147 M.P.J. Pepper, T.A. Spedding, (2010),"The evolution of lean Six Sigma", International Journal of Quality & Reliability Management, Vol. 27 Iss 2 pp. 138-155 http:// dx.doi.org/10.1108/02656711011014276 Diego Pacheco, Isaac Pergher, Guilherme Luís Roehe Vaccaro, Carlos Fernando Jung, Carla ten Caten, (2015),"18 comparative aspects between Lean and Six Sigma: Complementarity and implications", International Journal of Lean Six Sigma, Vol. 6 Iss 2 pp. 161-175 http:// dx.doi.org/10...

Words: 13381 - Pages: 54

Premium Essay

Supply Chain Management

...TWO PAPERS IN SUPPLY CHAIN DESIGN: SUPPLY CHAIN CONFIGURATION AND PART SELECTION IN MULTIGENERATION PRODUCTS by Sean Peter Willems B.S.E. Economics Wharton School, University of Pennsylvania, 1993 S.M. Operations Research Massachusetts Institute of Technology, 1996 Submitted to the Alfred P. Sloan School of Management in partial fulfillment of the requirement for the degree of Doctor of Philosophy in Management at the Massachusetts Institute of Technology February 1999 Copyright © Massachusetts Institute of Technology, 1999. All rights reserved. Signature of Author _____________________________________________________ Alfred P. Sloan School of Management January 26, 1999 Certified by ____________________________________________________________ Stephen C. Graves Abraham J. Siegel Professor of Management Co-director, Leaders for Manufacturing Program Accepted by ___________________________________________________________ This page intentionally left blank 2 TWO PAPERS IN SUPPLY CHAIN DESIGN: SUPPLY CHAIN CONFIGURATION AND PART SELECTION IN MULTIGENERATION PRODUCTS Abstract by Sean Peter Willems Submitted to the Alfred P. Sloan School of Management on January 26, 1999 in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in Management Increasing competitive pressures are forcing companies to increase their rates of innovation. The increasing rate of innovation shortens each product’s duration in the market, thereby compressing each product’s...

Words: 29847 - Pages: 120

Free Essay

The Controversy About a Possible Relationship Between Mobile Phone Use and Cancer

...Review The Controversy about a Possible Relationship between Mobile Phone Use and Cancer Michael Kundi Institute of Environmental Health, Medical University of Vienna, Vienna, Austria oBjective: During the last decade, mobile phone use increased to almost 100% prevalence in many countries of the world. Evidence for potential health hazards accumulated in parallel by epidemiologic investigations has raised controversies about the appropriate interpretation and the degree of bias and confounding responsible for reduced or increased risk estimates. data sources: Overall, I identified 33 epidemiologic studies in the peer-reviewed literature, most of which (25) were about brain tumors. Two groups have collected data for ≥ 10 years of mobile phone use: Hardell and colleagues from Sweden and the Interphone group, an international consortium from 13 countries coordinated by the International Agency for Research on Cancer. data synthesis: Combined odds ratios (95% confidence intervals) from these studies for glioma, acoustic neuroma, and meningioma were 1.5 (1.2–1.8); 1.3 (0.95–1.9); and 1.1 (0.8–1.4), respectively. conclusions: Methodologic considerations revealed that three important conditions for epidemiologic studies to detect an increased risk are not met: a) no evidence-based exposure metric is available; b) the observed duration of mobile phone use is generally still too low; c) no evidence-based selection of end points among the grossly different types of neoplasias is possible...

Words: 12276 - Pages: 50

Premium Essay

Contracts Course Study

...(holding no offer since item offered to large, military use, and expensive to objectively manifest a real offer) 2. That was not an offer but just a preliminary negotiation c. It was just a price quote i. SEE Owen v. Tunison (holding a price quote of “the least I could take” was not an offer) d. I was just telling you I am willing to sell it, but no offering it to you ii. SEE Harvey v. Facey (holding “lowest price is X” was not an offer when asked if willing to sell item) e. BUT if there is a price quote and quantity, then offer iii. SEE Fairmount Glass Works (holding offer where per unit price and quantity where specified along with “for immediate acceptance”) f. If liable to over-subscription, maybe not offer iv. SEE Kershaw (holding price quote sent to many buyers was a pre-offer since subject to over-subscription by many potential buyers) g. Advertisements are not offers, unless limited in some way 1. But check to see if award also v. SEE Lefowitz (holding an advertisement was an offer since it was limited by first come first serve clause and the ad left no room for further negotiations) There was no acceptance DOG hypo, THE BAVARIAN hypo, Football hypo 1. The offer was not meant to be communicated to you. a. You are not the offeree or his agent b. You got the offer, but I did not intent it for 2....

Words: 6474 - Pages: 26

Premium Essay

Gaap

...ethical, professional and educational standards and enhancing and promoting the Chartered Accountant brand. We also represent the interests of members to government, industry, academia and the general public by actively engaging our membership and local and international bodies on public policy, government legislation and regulatory issues. The Institute can leverage advantages for its members as a founding member of the Global Accounting Alliance (GAA), an international accounting coalition formed by the world’s premier accounting bodies. The GAA has a membership of 700,000 and promotes quality professional services to share information and collaborate on international accounting issues. Established in 1928, the Institute is constituted by Royal Charter. For further information about the Institute, visit charteredaccountants.com.au Foreword The use of extensions to traditional financial reporting to capture...

Words: 24934 - Pages: 100

Premium Essay

Fraternity

...Family Health Manager Tobie Mathew, Health Promotion Consultant – Early Child Development Project Karen Wade, Clinical Nurse Specialist, Planning & Policy – Family Health Mary Lou Walker, Family Health Manager Karen Whitworth, Mental Health Manager Copyright: Copyright of this document is owned by University Health Network Women’s Health Program. The document has been reproduced for purposes of disseminating information to health and social service providers, as well as for teaching purposes. Citation: The following citation should be used when referring to the entire document. Specific chapter citations are noted at the beginning of each chapter. Stewart, D.E., Robertson, E., Dennis, C-L., Grace, S.L., & Wallington, T. (2003). Postpartum depression: Literature review of risk factors and interventions. POSTPARTUM DEPRESSION: LITERATURE REVIEW OF RISK FACTORS AND INTERVENTIONS Table of Contents EXECUTIVE SUMMARY 2 OVERALL METHODOLOGICAL FRAMEWORK 5 CHAPTER 1: RISK FACTORS FOR POSTPARTUM DEPRESSION 9 Emma Robertson PhD, Nalan Celasun PhD, Donna E. Stewart MD FRCPC CHAPTER 2: DETECTION, PREVENTION AND TREATMENT OF POSTPARTUM DEPRESSION 71 Cindy-Lee Dennis RN PhD CHAPTER 3: THE EFFECT OF POSTPARTUM DEPRESSION ON THE MOTHER-INFANT RELATIONSHIP AND CHILD GROWTH AND DEVELOPMENT 197 Sherry L. Grace PhD, Stephanie Sansom MA CHAPTER 4: PUBLIC HEALTH INTERVENTIONS AND...

Words: 108533 - Pages: 435

Free Essay

Liquidity Risk and Specialness

...Journal of Financial Economics 64 (2002) 243–284 Liquidity risk and specialness$ Andrea Buraschia,*, Davide Meninia,b a London Business School, Institute of Finance, Sussex Place, Regents Park, London NW1 4SA, UK b Morgan Stanley, UK Received 11 July 2000; received in revised form 4 April 2001 Abstract Repo contracts, the most important form of collateralized lending, are widely used by financial institutions and hedge funds to create short-selling positions and manage their leverage profile. Moreover, they have become the primary tool of money management and monetary control of several central banks, including the Bundesbank and the newly born European Central Bank. This paper is an empirical study of this market. More specifically, we study the extent to which the current term structure of long term ‘‘special’’ repo spreads discount the future collateral value (specialness) of Treasuries. We ask whether repo spreads embed a liquidity risk premium and whether such a risk premium is time-varying. We quantify the size of the average liquidity risk premium and we provide empirical evidence of the extent of its time-variation. r 2002 Elsevier Science B.V. All rights reserved. JEL classification: G12; G13; G14; C22; C31; E43 Keywords: Liquidity risk; Treasury bonds; Repo contracts; Special repo rate; Expectation hypothesis; Treasury auctions The authors want to thank Federico Bandi, Ravi Bansal, Jacob Boudoukh, Mark Britten-Jones, Ian Cooper, Francesco Corielli, Mark Fisher...

Words: 21572 - Pages: 87

Free Essay

How to Develop and Implement a Winning Trading Sytem

...• Toronto • Singapore • Weinheim This text is printed on acid-free paper. Copyright © 1997 by Tushar S. Chande. Published by John Wiley & Sons, Inc. Data Scrambling is a trademark of Tushar S. Chande. TradeStadon, System Writer Plus, and Power Editor are trademarks of Omega Research, Inc. Excel is a registered trademark of Microsoft Corporation. Continuous Contractor is a trademark of TechTools, Inc. Portfolio Analyzer is a trademark of Tom Berry. All rights reserved. Printed simultaneously in Canada. Reproduction or translation of any part of this work beyond that permitted by Section 107 or 108 of the 1976 United States Copyright Act without the permission of the copyright holder is unlawful. Requests for permission or further information should be addressed to the Permissions Department of John Wiley & Sons. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If legal advice or other expert assistance is required, the services of a competent professional person should be sought. Library of Congress Cataloging in Publicaton Data: Chande, Tushar S., 1958Beyond technical analysis : how to develop & implement a winning trading system / Tushar S. Chande. Includes index. ISBN 0-471-16188-8 (cloth : alk. paper) 1. Investment analysis. I. Tide. II. Series. HG4529.C488 1997 332.6—dc20...

Words: 19157 - Pages: 77

Premium Essay

Manager/Service Tech

...COURSE PROJECT: E-COMMERCE PROJECT PROPOSAL & MILESTONE 1 and 2 TOPIC This proposal discusses the use of e Commerce- buying and selling goods and services online – is one of the biggest uses of the World Wide Web. Starting an e Commerce business or website or expanding an existing business with an e Commerce website can be highly profitable, as the overhead costs of running a web site are very small compared to running a physical shop and have access to a global market. Small businesses that are considered appropriate become options. Tips and Strategies for attracting and keeping customer are also presented. While the paper focused on implement many technologies options available and strategies help companies to success in using e Commerce. There are all sorts of features and tools businesses owner can include in an e Commerce website design which will make the shopping experience quicker, easier, and more enjoyable for customers - and ultimately drive sales. This paper will analyze the difficulty of company and suggest solution can guide will give an overview of the different kinds of e Commerce web site and some of the features that can be included to help drive your sales. There’s also a guide to finding and choosing the right company to help set up own e Commerce web site and start trading online that most business owners should consider. POTENTIAL PROBLEMS & SOLUTIONS Problem When starting an online business selling products or services there are some...

Words: 7981 - Pages: 32