Search for articles related to the importance of keeping certain stakeholder information confidential.
♥ 0 |
Search for articles related to the importance of keeping certain stakeholder information confidential. What types of information should be confidential? Describe two examples of actual problems that occurred when confidential information was leaked. Summarize your findings in a short paper or presentation. |
Explanation
"Secret data" incorporates all the private data (however recorded or put away) revealed or made accessible, legitimately or in a roundabout way by Nice or its representatives, officials, operators, or counsels.
Private Information may incorporate, yet isn't constrained to:
Data identifying with the presence, substance or result of classified interchanges;
Any data that might be viewed as secret by the important representative or social insurance proficient;
Financial models.
In today's increasingly competitive and competitive work environment, privacy is important for many reasons:
Failure to properly protect and protect confidential business information can result in loss of business/customer.
In the wrong hands, confidential information can be misused to perform illegal activity (e.g. fraud or discrimination), which can lead to expensive legal action against the employer.
High information breaks can cost organizations millions.
For example, the instance of TJX. At the point when Home Depot lost a PC containing individual data of 10,000 workers, it was only the most recent in a progression of prominent occasions. Veterans Administration, TJX, Monster.com, Fidelity National Information Services, Pfizer, AOL, Ameritrade have additionally lost classified information.
Not ensuring email can prompt genuine information spillage issues.
For example, George Washington University emergency clinic (GWU) is encountering an information break that could have national security results. Appointee President Dick Cheney was relied upon to visit the emergency clinic, while the Secret Service attempted to send a malevolent email that could have endangered his wellbeing.
Sample Response
The stakeholder register for sponsoring the project, the document contains basic information of stakeholder is shared with the project management for identifying. This also contains confidential information such as name, address, location, contact information, and the role in the project.
Types of information to be maintained confidentially.
1. Employee Information:- Employee's social security number, home address, telephone number, Internet identification names, passwords, parents' surname, and driver's license number, and immigration form.
2. ย Management Information:- Discussion about employees' relational issues, disciplinary actions, impending layoffs, terminations, company's policy matters.
3. Business Information:-Proprietary information, trade secrets, brand promotion activities, financial data, budgets, forecasting data, client-customer list, supplier list, recipes, and computer programs.
Examples
1- Yahoo:- Time:- 2013-14
Impact:- on 3 billion user account
Incident:- Due to confidential information leakage about customer's real name, date of birth, telephone numbers, email addresses. yahoo suffered a loss of sales revenue of around $300 million.[1]
2-eBay:- Time:- 2014
Impact:- 145 million customers
Incident:- eBay reported a cyber-attack in 2014 which compromised the customer's personal information. Security question answers. Hackers were able to complete access the Ebay's user database for 229 days that resulted in a huge decline in customer activity at Ebay's portal.[2]
***
Works cited.
1, "Yahoo data loss"
https://www.reuters.com/article/us-yahoo-cyber/yahoo-says-all-three-billion-accounts-hacked-in-2013-data-theft-idUSKCN1C82O1
2, "eBay data loss"
https://www.mcafee.com/blogs/enterprise/cloud-security/how-bad-is-the-ebay-breach-here-are-the-stats/#:~:text=eBay%20announced%20today%20that%20hackers,physical%20addresses%20and%20phone%20numbers.
Similarly, one can refer to various articles and make an analysis of the leakage of confidential information.
One should have a proper network connection and enter the required item to be searched in the search bar of a search engine.
By clicking enter certain links opens, where one can open the links and make research and write there in a paper.
The Best Research Paper Writing Service
Would you want to pay someone to write your paper professionally from scratch? 100% Original and 0% AI Content!.