preview

MMT2 IT strategic solutionTask 3

Decent Essays

Running Head: MMT2 Task 3 – Security Policies

IT Strategic Solutions – MMT2 Task 3

Evaluating Security Policies
Western Governor’s University

1

MMT2 Task 3 – Security Policies

2

A. Evaluation of AEnergy’s Security Policies in Regard to Ethical Issues
Security policies constitute a single or group of documents that explicitly define the security safeguards, processes and procedures adopted by an organization to govern access to its premises and systems. Security policies also serve to govern the behavior and activities of internal and external users to whom access to the organization’s network, data or other sensitive information might be granted. In order for security policies to be effective, they must be
comprehensive, …show more content…

Although it is within the company’s rights to track its equipment, this policy may inadvertently become a way to track employee whereabouts and location at all times in violation of their privacy.
Just because an employee has a company laptop in their personal car does not give the company implicit license to track and monitor their private movements especially when they are not on company business.


Acknowledgement of security policies by employees and external users

With the exception of AEnergy’s data security policy, none of the other policies require employees to sign them acknowledging their reception of the policy as well as their intent to adhere to it. This is a potential ethical issue since the company is requiring employees to adhere to rules without making explicitly certain that they understand the rules and intend to obey them.
The above-mentioned areas of focus could lead to ethical violations if they are not properly reviewed and addressed.
A1. Two Potential unethical uses of company technology and/or data by internal users
1. Use of on premise security cameras to spy on the activities of fellow employees
AEnergy employs security cameras on its premises for the primary purpose of monitoring the company’s perimeter for intrusion and protecting the company’s physical and digital assets.
It would be unethical for an employee or another internal user with the appropriate access to

MMT2 Task 3 –

Get Access