Verified Document

Information Security And Employees Term Paper

Information Security The discussion below provides answers to questions raised with regard to a case at Greenwood Company

A forensic plan of readiness comes with several advantages. If there arises a situation that forces a company to be engaged in litigation, and there is need for digital evidence, e-discovery is of central importance. The laws and rules that govern the e-discovery, such as the Federal Rules of Civil Procedure or the Practice 31B Direction of the UK call for the presentation of electronic evidence fast; and that such evidence must be in sound state, forensically (Sule). The Electronic Discovery Reference Model is reputed as the standard model for processing e-discovery, and is compliant with FRCP.10 Information management procedures require that electronic evidence should be collected and stored appropriately. Such evidence should be readily available when it is needed. E-discovery information management procedures include incident response, data retention, and discovery of disaster and business continuity policies. All the procedures are bound by the plan for forensic policy readiness. The monitoring usage of endpoints that is acceptable, the process may uncover malware infiltration in the system, and tracing the sources of the malware. These moves will help prevent future attacks of similar nature. The explanation given here is a single example of how an incident still in potential phase can be prevented from evolving into an actual security incident, hence causing serious concerns (Sule). Moreover, cyber threats of higher magnitude can be unearthed, their roots tracked and stopped. Examples in this regard include intellectual property theft, harassment, extortion and fraud. Overall, information security is enhanced. The main three requirements for a business in the private sector would be identifying scenarios that would need such a plan, defining the evidence type and instituting the necessary legal action to handle the situation.

2. Indeed, searching the locker is appropriate. Employers in the private sector have a right to inspect and search their employee's locker; if there is a policy that allows such action within the organization. Such a policy should inform the employees of their limited privacy at their places of work. It should also inform...

In this case, Mr. Jenkins is uneasy with the theft of source code for product X. Mcbride is a suspect.
3. There would be no need for searching an employee's locker or desk in an ideal working arrangement. However, there is an urgent need by most employers to keep the place of work free of drugs, alcohol and potential thieving tendencies by employees. Most employees believe that they should be shielded from acts of intrusive privacy intrusion by employers. The courts on their part have been faced with this difficult scenario. They have sought to grant each party its fair share of justice by striking a balance to fulfill each party's interests (Workplace Searches - Workplace Fairness). Cases that involve invasion of privacy at the work place include a lot of facts and are judges each case's merit of evidence. Employees in the public sector expect a greater level of protection of their privacy as spelled out in the constitution of the US.

Although the protection of privacy is captured in the constitution, nine states in the US, including Florida, Hawaii, Illinois, Louisiana, Alaska, South Carolina, California, Montana and Washington have granted employees in the private sector similar protection at their work places. Most states to not explicitly outline the dos and don'ts that employers should abide by when conducting searches at the work place (Workplace Searches - Workplace Fairness).

Employers are allowed by law to search an employee's clothes, locker or desk to establish whether an employee has stolen an item that belongs to the organization/company. It is, therefore expected that employees will be searched…

Sources used in this document:
References

Johnson. (n.d.). HR information resources | Federal and state employment law | XpertHR.com. Does an employer have a right to search an employee's locker or desk? | FAQs | Tools | XpertHR.com. Retrieved January 24, 2017, from http://www.xperthr.com/faq/does-an-employer-have-a-right-to-search-an-employees-locker-or-desk/6902/

Mendell. (2001). Symantec - Global Leader in Next-Generation Cyber Security. Incident Management with Law Enforcement | Symantec Connect. Retrieved January 24, 2017, from http://www.symantec.com/connect/articles/incident-management-law-enforcement

(n.d.). New York Employment Lawyer. The Limits to an Employer's Search. Retrieved January 24, 2017, from http://theemployeeslawyer.com/blog/2013/09/the-limits-to-an-employers-search/

(n.d.). Study Guides, Lesson Plans, Homework Help, Answers & More - eNotes.com. What are some explanations of the chain of custody: how is it used in court, and what is its purpose? | eNotes. Retrieved January 24, 2017, from http://www.enotes.com/homework-help/what-soem-examples-chain-custody-how-used-court-201099
Sule. (n.d.). Information Technology - Information Security -- Information Assurance | ISACA. Importance of Forensic Readiness. Retrieved January 24, 2017, from http://www.isaca.org/Journal/archives/2014/Volume-1/Pages/JOnline-Importance-of-Forensic-Readiness.aspx
(n.d.). Workplace Fairness - Employee Rights, Job Rights, Workers Rights. Workplace Searches - Workplace Fairness. Retrieved January 24, 2017, from http://www.workplacefairness.org/workplace-searches
Cite this Document:
Copy Bibliography Citation

Related Documents

Security Management Strategies for Increasing Security Employee
Words: 2501 Length: 8 Document Type: Essay

Security Management Strategies for Increasing Security Employee Retention Design Effective Job Characteristic Model Skill Variety Task Identity and Task Significance Autonomy and Feedback Meeting Expectations Market Competitive Package Strategies for Increasing Security Employee Retention Security employees constitute the most important component of organizational workforce. It is because; they ensure the core survival of organization and its assets. However, the ironic fact is the security employees are considered blue collar workers and their compensation packages are low (Hodson & Sullivan,

Information Security Management
Words: 549 Length: 2 Document Type: Essay

Security Management Information Security Management Managing the information security at a major university is never an easy task, and especially with a team of only ten the complexities and the resource demands can sometimes make the situation seem all but impossible even on the best of days. When the former head of information security management suddenly departs as the result of an FBI arrest -- and when that arrest stems from the

Information Security Management
Words: 1948 Length: 7 Document Type: Conclusion

Security Management During the span of one's college career, a select number of courses become something more than a simple requirement to be satisfied to assure graduation; these are moments in a student's educational process which make the most lasting impacts. In my personal case, the lessons I have learned as part of my studies in ISSC680 will likely be remembered in those terms, as my eventual career will find

Security Programs Implementation of Information Security Programs
Words: 1415 Length: 4 Document Type: Essay

Security Programs Implementation of Information Security Programs Information Security Programs are significantly growing with the present reforms in the United States agencies, due to the insecurity involved in the handling of data in most corporate infrastructure systems. Cases such as independent hackers accessing company databases and computerized systems, computer service attacks, malicious software such as viruses that attack the operating systems and many other issues are among the many issues experienced

Information Security Training Program
Words: 3414 Length: 12 Document Type: Research Paper

Federal Information Security Management Act (FISMA) The Federal Information Security Management Act places emphasis on the importance of training and awareness program and states under section 3544 (b).(4).(A), (B) that "security awareness training to inform personnel, including contractors and other users of information systems that support the operations and assets of the agency of- information security risks associated with their activities; and their responsibilities in complying with agency policies and procedures

Information Security
Words: 3704 Length: 10 Document Type: Research Proposal

Security A broad definition of information security is given in ISO/IEC 17799 (2000) standard as: "The preservation of confidentiality (ensuring that information is accessible only to those authorized to have access), integrity (safeguarding the accuracy and completeness of information and processing methods), and availability (ensuring that authorized users have access to information and associated assets when required" (ISO/IEC 17799, 2000, p. viii). Prior to the computer and internet security emerged as we

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now