Question

SSTCR9.2 At a department meeting, your manager, Ms. Tia Petersen, discusses a memo regarding company security....

SSTCR9.2
At a department meeting, your manager, Ms. Tia Petersen, discusses a memo regarding company security. She shakes her head and says, “This is the second memo the managers have received about security leaks. One of our competitors has just introduced a new product, and it’s identical to a product we have been working on. Apparently they discovered our plans. The president wants our thoughts on how to improve our product security. In addition to the main shredder in the copy center, he is suggesting a shredder for each office. Well, I’m just glad everyone in our department can be trusted.” As you hear this, you remember several situations you have observed in the office:
• You have seen poor photocopies—even photocopies of confidential material—discarded in the wastebasket.

• Computer printouts with product-testing results are stacked next to the filing cabinets rather than being locked inside them.

• Workers often talk about current projects during their breaks.

• Workers sometimes use the offices of other workers who are out of town.

• Workers too freely give out unnecessary information to callers, such as telling a caller exactly where an individual is.

“Tell me,” Ms. Petersen says, “do you think we need a shredder? What other measures can we take to tighten security? Please give this matter some thought and send me your ideas.”
1. Prepare a response to Ms. Petersen in an email message. Send the message to your instructor’s email address (or save and print the message). Prepare a memo to Ms. Petersen instead if you do not have access to email.
2. In the message, include suggestions for correcting the problems discussed as well as other security measures that you think would be effective.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

MEMORANDUM

TO :  Ms. Petersen

FROM : Team Member ( Name of the member)

DATE : 18/02/2020

SUBJECT : Security Issues in the Workplace

Ma'am,

The concern is regarding the security measures as asked from your end in the today's meeting.But before answering to your question I would like to highlight you with certain points you not aware of. Being the team member of your Team it becomes my duty to show utmost faith and honesty towards our organisation.

I would like to discuss that

  1. Recently I have seen photocopies of confidential material discarded in the wastebasket. Possibly someone from internally have given the idea to competitor and they made the identical product.
  2. Also, often there is buzz about the project by the employees and they do sometimes uses each other's office in their absence.
  3. The workers sometimes unintentionally provide excess of information than needed.

My aim to highlight these points is to make you aware about the current situation of our organisation. And if its continue then we can face this issue often

Along with this I would also like you to focus on the security measure to prevent our data from leaking. Although there is the security but with the recent scenario we need to have the tighten security. For this i would like to draw your attention towards the measure we can opt. These are :

  1. Gate pass of every individual other than the employee entering the premises. The gate pass should contain the name address and the reason for which they are visiting.In this way we can control the outside access.
  2. Tighten of both the security i.. digital and physical.
  3. Forming of Artificial intelligence to go virtual so that data cannot be theft or leaked.
  4. Password and login. The data's access should not be given to all the employee instead only those who required the data can have access that to with use of logins and password.
  5. Formation of protection policy and breach of that policy may allow heavy compensation to the person breaching it.
  6. Feedback boxes : there are employee who might know the culprit with the organisation bu is not able to speak. Feedback boxes helps the employee to reveal the name of culprit without revealing his identity.
  7. The infrastructure should also have provision of locker to protect the blue print or any confidential physical paper.

These are some of the measure I would request you to implement with immediate effect.

Also for sometime, make the strict policy with respect to buzzing around the campus. As communication of information from one end to another may leak the information without intention.

At the and I want to convey that only after implementation of all or any of the above measure we can have shredder for each office.

Thanks & Regards

Add a comment
Know the answer?
Add Answer to:
SSTCR9.2 At a department meeting, your manager, Ms. Tia Petersen, discusses a memo regarding company security....
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Protecting Health Care Privacy The U.S. Health Insurance Portability and Accountability Act (HIPAA) addresses (among other...

    Protecting Health Care Privacy The U.S. Health Insurance Portability and Accountability Act (HIPAA) addresses (among other things) the privacy of health information. Its Title 2 regulates the use and disclosure of protected health information (PHI), such as billing services, by healthcare providers, insurance carriers, employers, and business associates Email is often the best way for a hospital to communicate with off-site specialists and insurance carriers about a patient. Unfortunately, standard email is insecure. It allows eavesdropping, later retrieval of messages...

  • Instructor: Date: Part 1: Revision - Read the following document and identify errors in format, sentence...

    Instructor: Date: Part 1: Revision - Read the following document and identify errors in format, sentence structure, punctuation, word choice, word formation, tone, numbers, or capitalization. Re-write the poorly written message into an effective one, focussing on conciseness, accuracy, positive and bias-free expression, clear of grammar, spelling, and punctuation errors. (20 points) Nanaimo Sports Centre Vancouver Branch 8791 Austin Street Vancouver, BC Y2P 2P8 November 27, 2019 Ms. R. Ferguson Ferguson Athletic Apparel 315 Massey Cr. Port Moody, BC Z6T...

  • Budgeting for an Academic Department at a State University: Can You Believe the Numbers? INTRODUCTION You...

    Budgeting for an Academic Department at a State University: Can You Believe the Numbers? INTRODUCTION You are the senior accounting faculty member in the business school and your dean, Dean Weller, is asking for help. She is very discouraged after a midyear budget meeting with the Vice President of Finance. The college's Department of Social Work has a large budget deficit, and because of this the VP is inclined towards closing the department entirely or closing its bachelor's program. The...

  • Is Wal-Mart Waging War on Its Workers? Walmart, the world's largest private employer, is also one...

    Is Wal-Mart Waging War on Its Workers? Walmart, the world's largest private employer, is also one of organized labor's largest unionization targets. The retailer maintains a global work force of 1.3 million employees, and it hires thousands of employees every month as it continues to open new Wal-Mart and Sam's Club stores. The United Food and Commercial Workers Union (UFCW) says that Wal-Mart's employees would benefit from collective bargaining, citing the retailer's low wages, inadequate benefits, huge profits, and anti-union...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • SESSION 12 Workers for Ivanka's clothing company The reality of working in a factory making clothes...

    SESSION 12 Workers for Ivanka's clothing company The reality of working in a factory making clothes for Ivanka Trump’s label has been laid bare, with employees speaking of being paid so little they cannot live with their children, anti-union intimidation and women being offered a bonus if they don’t take time off while menstruating. The Guardian has spoken to more than a dozen workers at the fashion label’s factory in Subang, Indonesia, where employees describe being paid one of the...

  • FISCAL POLICY IN THEORY: March, 2020: we are on the verge of Congress and the President...

    FISCAL POLICY IN THEORY: March, 2020: we are on the verge of Congress and the President passing legislation that will empower the federal government to spend an unprecedented amount of EXTRA money not seen since World War 2 ---- in order to address the pandemic but also to help cushion the blow financially of perhaps ten or twenty million Americans --- or more --- losing their jobs, and thus suffering a drop in income. The scale of the 2020 recession...

  • Questions: 1. What trends are happening as it relates to consumer retail purchases, online vs. in-store?...

    Questions: 1. What trends are happening as it relates to consumer retail purchases, online vs. in-store? 2. What challenges do traditional retailers face in trying to transition from in-store sales to online sales? 3. List and briefly describe at least three of the strategies that Target has implemented in its staffing system to better accommodate online sales. 4. What are the career implications of the trends described in this article? 5. From a consumer perspective, what are the relative advantages...

  • Write 6-7 Sentences For Your Response: Did the City of Dixon have the appropriate internal controls?...

    Write 6-7 Sentences For Your Response: Did the City of Dixon have the appropriate internal controls? What elements do you think they fell short in? Information Welcome to Dixon Illinois about an hour and a half west of bustling Chicago but it has the genteel feel of a small town from the Dixon arch, a lucky horseshoe that hangs over the quaint community to the bright white boyhood home of Ronald Reagan. Reagan isn't just Dixon's claim to fame, he's...

  • Please see the articles below… 1.  What is your opinion on the subject? 2.  Which ethical views (i.e.,...

    Please see the articles below… 1.  What is your opinion on the subject? 2.  Which ethical views (i.e., utilitarian view, moral rights view, justice view, practical view) you feel are being used by both sides of the argument (i.e., for and against downloading) to justify their positions? High Court Enters File-Sharing Spat; Justices Must Determine Software Providers' Liability For Copyright Violations by Anne Marie Squeo. Wall Street Journal. (Eastern edition). New York, N.Y.: Mar 30, 2005. pg. A.2 WASHINGTON -- The Supreme...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT