Search for articles related to the importance of keeping certain stakeholder information confidential.

Search for articles related to the importance of keeping certain stakeholder information confidential.

Category:
June 11, 2021
47 Views
0
0

Search for articles related to the importance of keeping certain stakeholder information confidential. What types of information should be confidential? Describe two examples of actual problems that occurred when confidential information was leaked. Summarize your findings in a short paper or presentation.

Answer and ExplanationSolution by a verified expert

Explanation

"Secret data" incorporates all the private data (however recorded or put away) revealed or made accessible, legitimately or in a roundabout way by Nice or its representatives, officials, operators, or counsels.
Private Information may incorporate, yet isn't constrained to:
Data identifying with the presence, substance or result of classified interchanges;
Any data that might be viewed as secret by the important representative or social insurance proficient;

Financial models.

In today's increasingly competitive and competitive work environment, privacy is important for many reasons:
Failure to properly protect and protect confidential business information can result in loss of business/customer.
In the wrong hands, confidential information can be misused to perform illegal activity (e.g. fraud or discrimination), which can lead to expensive legal action against the employer.

High information breaks can cost organizations millions.
 

For example, the instance of TJX. At the point when Home Depot lost a PC containing individual data of 10,000 workers, it was only the most recent in a progression of prominent occasions. Veterans Administration, TJX, Monster.com, Fidelity National Information Services, Pfizer, AOL, Ameritrade have additionally lost classified information.
Not ensuring email can prompt genuine information spillage issues.
For example, George Washington University emergency clinic (GWU) is encountering an information break that could have national security results. Appointee President Dick Cheney was relied upon to visit the emergency clinic, while the Secret Service attempted to send a malevolent email that could have endangered his wellbeing.

 

Sample Response

The stakeholder register for sponsoring the project, the document contains basic information of stakeholder is shared with the project management for identifying. This also contains confidential information such as name, address, location, contact information, and the role in the project.
Types of information to be maintained confidentially.
1. Employee Information:- Employee's social security number, home address, telephone number, Internet identification names, passwords, parents' surname, and driver's license number, and immigration form.
2. ย Management Information:- Discussion about employees' relational issues, disciplinary actions, impending layoffs, terminations, company's policy matters.
3. Business Information:-Proprietary information, trade secrets, brand promotion activities, financial data, budgets, forecasting data, client-customer list, supplier list, recipes, and computer programs.
Examples
1- Yahoo:- Time:- 2013-14
Impact:- on 3 billion user account
Incident:- Due to confidential information leakage about customer's real name, date of birth, telephone numbers, email addresses. yahoo suffered a loss of sales revenue of around $300 million.[1]
2-eBay:- Time:- 2014
Impact:- 145 million customers
Incident:- eBay reported a cyber-attack in 2014 which compromised the customer's personal information. Security question answers. Hackers were able to complete access the Ebay's user database for 229 days that resulted in a huge decline in customer activity at Ebay's portal.[2]
***
Works cited.
1, "Yahoo data loss"
https://www.reuters.com/article/us-yahoo-cyber/yahoo-says-all-three-billion-accounts-hacked-in-2013-data-theft-idUSKCN1C82O1
2, "eBay data loss"
https://www.mcafee.com/blogs/enterprise/cloud-security/how-bad-is-the-ebay-breach-here-are-the-stats/#:~:text=eBay%20announced%20today%20that%20hackers,physical%20addresses%20and%20phone%20numbers.

Similarly, one can refer to various articles and make an analysis of the leakage of confidential information.
One should have a proper network connection and enter the required item to be searched in the search bar of a search engine.
By clicking enter certain links opens, where one can open the links and make research and write there in a paper.

Purchase this answer to view it.
Click the button to login/signup and buy full solution at 2 USD only.

The Best Research Paper Writing Service

Would you want to pay someone to write your paper professionally from scratch? 100% Original and 0% AI Content!.

๐ŸŽ“ Write my Essay
๐Ÿ“š Write my Persuasive Essay
๐Ÿ“‹ Humanize AI Content for Turnitin
๐Ÿ’ป Write my Reflective Essay
๐Ÿ“‘ Write my Research Paper
๐Ÿ“œ Write my Thesis Paper
๐Ÿ“˜ Write my Dissertation
๐Ÿ“‹ Write my Case Study
๐Ÿ“ Write my Online Exam
โœ’๏ธ Write my Term Paper
Write my Paper