What types of ethical issues and information security issues are common in organizations?
Ethics, as simple as it may seem is a social term with immense impacts on each and every area of business, impacting all spheres up from magazines, newspapers, and blogs, simple and even multi-billion organizations. While we can say that technology has provided broad opportunities, it is also true that similar chances are provided to the unethical people. Those who will go an extra mile each day only to see to it that they have broken all ethical and security aspects of businesses such as confidentiality and security of information held. This means that companies must ensure that any type of information they collect, may it be about the employees, partners, or customers, must be captured and stored in an ethical and secure manner, not only for its own benefit, but also as a fulfillment to law requirements.
How can a company participating in e-business keep its information secure?
As seen, the way the business handles information of its spheres plays a primary role. As a matter of fact, it directly influences the likelihood of its customer’s acceptance of both the electronic technology as well as doing business over the web, which as per the present trends in globalization and internationalization of markets, play as the company’s bottom line. Therefore, in order for an organization to successfully guide its basic income-line through safe-keeping of information the following policies can be employed. These include employing: ethical computer use policy, the workplace monitoring policy, acceptable use policy, email privacy policy, social media policy, and the information privacy policy (139). Definitely, if a firm successfully employs these measures, it is with no query that it stands the biggest chances of surviving in the e-business.
How can a company to better secure their information?
Oracle corporations provide a taster review of the types of ethics and information concerns faced by most organizations. The dangers come mostly upon when employees and other un-authorized persons try to access information in authorized means or even through hacking. Therefore, a company can still employ protective means which must include the below measures. Of all, the first line of defense is the people, and then technology. Among these, the people are the most basic source of threats to an organization’s information security. It does not all matter whether it is the employees, a customer, or a hacker; all the organization has to be aware of is the potential threats posed by the fellow humans and thus, must employ all possible policies necessary to govern the information aspects. Then comes the technology aspect as a threat. All the organization has to do in this field is ensuring data prevention and resistance (151) against the malicious software developed intentionally to destruct any valuable information.
Reference
The McGraw-Hill Company, 2014. “Ethics and information security: MIS business concerns.” Chapter 4.