Information Security: Confidential Records Removal

Is it a violation of the law for an employee to remove confidential records from the workplace without permission, without special controls, and against the policy?

Information security management is a critical subject in managing information flow in organizations. An organization’s information is essential for the smooth running of its functions. Organizations often secure their information and protect it from being accessed by anyone outside the organization. In some instances, information is classified into two categories. These entail private information and public information. The flow and use of information that belongs to organizations are considered a policy issue. The movement of information from an organization is monitored to protect the organization from external exposure (Straub, 2008). This issue is presented in the case of Stratified Custom Manufacturing where the security control system detects an employee leaving the premises with the organization’s documents (Whitman & Mattord, 2011).

According to the case study, the company has an elaborate security management system that is used to safeguard its information. The security management system of the company is used for safeguarding the information flow from the organization. Routine security checks are conducted by the company. They aim at ensuring that employees do not leave the company with the organization’s documents. This means that security screening has a policy backup, which gives it the legal force. According to the company, it is illegal to take out information from the company without the company’s permission. Corporate policies stipulate the guidelines that are used in the access and use of the company’s information. The company’s information is part of the resources of an organization. Therefore, any person who wants to get the company’s information out of the premises has to follow procedures and get permission from the company (Whitman & Mattord, 2011).

A punishment for a policy violation involving removal of confidential records for a “harmless” reason such as catching up on reading them at home

The exposure of confidential information or records containing such information is considered a breach of the information security policy of an organization. Cases of violation of the information management policies of organizations are commonly reported. In the current information and communication technology era, such cases are increasing. It is caused by the fact that information is not only accessed and passed manually. Digital platforms are often used to sneak information out of organizations. Strict regulations and punishments for such offenders could serve as a way of preventing the breach of information security management policies (Vacca, 2010). The first step is enhancing the security systems to track such offenders. Once tracked, the offenders have to be barred from accessing any confidential information belonging to the company. The other method of punishing such people is subjecting them to strict surveillance systems. This includes monitoring them from every place, including their homes. These are slight forms of punishment, which are meant to discourage the breach of rules that are meant to secure companies’ information (Straub, 2008).

How the recommendation would change if the violator used confidential records for a different purpose

According to Workman, Phelps & Gathegi (2013), people have different motives that direct them to acquire an organization’s information. Confidential firm records can be used by people with ill motives. Among the negative motives, including the plan to use the information in swindling money from the organization. This malpractice is common in organizations today. It is reported in a substantial number of organizations. The other form of violating the security information management practices in organizations is by using the information to cover certain faults committed in the organization. These are serious breaches of the organization’s information. It should be handled with the seriousness that it deserves. Employees or any person found committing such practices should be prosecuted. Such a person should be considered a criminal and should face the full force of the law by being arrested and prosecuted. When proved to have committed the crime, the person should be dismissed from the organization. Before dismissal, the person will be compelled to surrender all the pieces of information under his custody. All the company information should be recovered from the person as it may be further used by the accomplices of the accused person (Vacca, 2010).

References

Straub, D. W. (2008). Information security: Policy, processes and practices. Armonk, NY [u.a.: Sharpe.

Vacca, J. R. (2010). Managing information security. Burlington, MA: Elsevier.

Whitman, M. E., & Mattord, H. J. (2011). Readings and cases in information security: Law and ethics. Boston, MA: Course Technology, Cengage Learning.

Workman, M. D., Phelps, D. C., & Gathegi, J. N. (2013). Information security for managers. Burlington, MA: Jones & Bartlett Learning.

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
$0.00
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
How it works
Receive a 100% original paper that will pass Turnitin from a top essay writing service
step 1
Upload your instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
Pro service tips
How to get the most out of your experience with MyhomeworkGeeks
One writer throughout the entire course
If you like the writer, you can hire them again. Just copy & paste their ID on the order form ("Preferred Writer's ID" field). This way, your vocabulary will be uniform, and the writer will be aware of your needs.
The same paper from different writers
You can order essay or any other work from two different writers to choose the best one or give another version to a friend. This can be done through the add-on "Same paper from another writer."
Copy of sources used by the writer
Our college essay writers work with ScienceDirect and other databases. They can send you articles or materials used in PDF or through screenshots. Just tick the "Copy of sources" field on the order form.
Testimonials
See why 20k+ students have chosen us as their sole writing assistance provider
Check out the latest reviews and opinions submitted by real customers worldwide and make an informed decision.
Management
Thank you!!! I received my order in record timing.
Customer 452551, February 9th, 2021
Humanities
Thank youuuu
Customer 452729, May 30th, 2021
Business and administrative studies
excellent job! got an A, thank you
Customer 452773, May 24th, 2023
ACC/543: Managerial Accounting & Legal Aspects Of Business
EXCELLENT JOB
Customer 452773, January 10th, 2024
BUSINESSADMINECO535
excellent work
Customer 452773, October 6th, 2023
Managerial Accounting & Legal Aspects of Business ACC/543
excellent work
Customer 452773, February 7th, 2024
Criminal Justice
This has been the greatest help while I am recovering from an illness. Thank your team so much.
Customer 452671, May 2nd, 2021
Nursing
Impressive writing
Customer 452547, February 6th, 2021
Business and administrative studies
great job as always
Customer 452773, February 26th, 2023
Business and administrative studies
excellent work
Customer 452773, March 9th, 2023
Business and administrative studies
looks good thank you
Customer 452773, March 3rd, 2023
Psychology
Thank you!
Customer 452545, February 6th, 2021
11,595
Customer reviews in total
96%
Current satisfaction rate
3 pages
Average paper length
37%
Customers referred by a friend
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat
Close

Sometimes it is hard to do all the work on your own

Let us help you get a good grade on your paper. Get professional help and free up your time for more important courses. Let us handle your;

  • Dissertations and Thesis
  • Essays
  • All Assignments

  • Research papers
  • Terms Papers
  • Online Classes
Live ChatWhatsApp