Ol 442 Data Security Research Paper

1090 Words5 Pages
Lara Ramey Southern New Hampshire University OL 442 – Professor David Miller April 25, 2015 Final Paper: Data Security With technology taking over businesses and costs rising higher by the year, having a solid data security policy in place is an extremely beneficial and important part of protecting an organization. Sinrod (2010) discusses how financially damaging data breaches can be for an organization, with an average cost of $6.75 million per incident in 2009. Breaches can be expressed both in and out of the organization, with especially staggering statistics on employee theft. Dwyer (2014) states, “39 percent of data theft from businesses comes from company insiders. Even more troublesome, 59 percent of ex-employees admit they…show more content…
Jackson et al. (2014) proposes developing an ethics code for the entire company to follow and stressing the importance of managers to “practice what they preach.” If the organization follows its own protocols and demonstrates ethical behavior, it is more likely their employees will follow suit. Before the policy is communicated to employees, it must be written and shared among executives and top team members. According to Bayuk (2009), the policy should incorporate aspects that are company-specific: “...in order to compose an information security policy document, an organization has to have well-defined objectives for security and an agreed-upon management strategy for securing information.” Once the policy has been written, agreed upon, and established, it must then be presented…show more content…
Some policies should include the inability to process family/friends’ transactions and disabling cell phone and personal email use during work hours (except for emergencies). I would also enable supervisory programs that can track employee work history and set web portal controls through organizational databases. Video surveillance would be an important addition to the physical security plan in order to conduct investigations in the event of an actual incident. Hard drives and USB sticks should be banned unless they are considered company property and used appropriately. Since email monitoring tends to be controversial, it might be beneficial to look into software programs that can trace anything communicated through company technology that would be considered a threat instead of monitoring every

More about Ol 442 Data Security Research Paper

Open Document