Thursday, November 21, 2019
Bogart A Case in Point Essay Example | Topics and Well Written Essays - 500 words
Bogart A Case in Point - Essay Example 1. Review and evaluate corporate policies and procedures on the use of both computer hardware and software and determine the need to revise and amend areas that need focus, especially involving the use of critical information programs and systems. Policies in recruiting new IT personnel must likewise be strengthened in terms of background checking for past working experiences, qualifications and credentials. 2. Design and implement a code of discipline complete with sanctions for violations of policies. Appropriate sanctions for employees found to violate such policies should range from reprimand, warning, suspension, expulsion to outright firing, as required. 3. The current status of computer hardware and software systems at Bogart need to be protected in terms of confidentiality clauses and current employees directly using these systems must sign an official agreement that they abide by the policy of secrecy and confidentiality, otherwise, the sanctions indicated in the Code of Discipline, should be strictly enforced. 4. Categorize the computer hardware and software systems in terms of crucial importance to the organization. Those identified highly classified should only be used by authorized and trusted personnel whose trust has been gained by senior management through lengths of service within the company. If there are critical workloads that need to be finished at defined time frames, everything must be done within the premises of Bogart to prevent loopholes and to prevent compromising privacy and confidentiality. 7. Enforce strict monitoring and control of all computer resources through regular check-ups or audits to determine if there is any security breach at any points in time, or in any critical programs. Bogart could also incorporate it their policy the need to rotate authorized employees handling of critical programs to serve as a check and counter-check mechanism. 8. External audits must be scheduled aside from the in-house monitoring and control to ensure that programs are not compromised, tampered, or breached. Outside IT personnel who are constantly updated on the
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.