Dropbox Special Access: Week 3 – Assignment: Critique Potential Violations Using Information Technology – Availability Ends

Dec 22, 2019 11:59 PM

MGT-7019 v4: Ethics in Business (0205954095)

With the rapid advancement and adoption of technology in all areas of business, it is critical for you as a future business leader to understand how unethical actions occur and what you can do to mitigate future risk.

Assume you have been hired as a consultant in the IT Department at Northcentral University. One of the University’s current goals is to minimize security threats and prevent breaches. To accomplish this, you have been asked to research last year’s “major hacks” to understand technology, information security measures, and issues in security management.

You must present your findings to the IT supervisor before the supervisor’s meeting with senior leadership. Prepare meeting notes for the IT supervisor that include the following:

  • Select one major incident to research regarding technological breaches. Identify the company that was affected and then describe this incident and why you selected it.
  • Explain the implications associated with this breach, specifically in terms of privacy laws and violations of the law.
  • Analyze the impact that these technological breaches have on consumer safety and well-being.
  • Recommend further actions to protect the privacy of clients.

Support your meeting notes with a minimum of three scholarly resources. In addition to these specified resources, other appropriate scholarly resources, including older articles, may be included.

Length: 3-5 pages, not including title and reference pages

Your meeting notes should demonstrate thoughtful consideration of the ideas and concepts presented in the course by providing new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards where appropriate. Be sure to adhere to Northcentral University’s Academic Integrity Policy.

Upload your document, and then click the Submit to Dropbox button.

Week 3 - Assignment: Critique Potential Violations Using Information Technology Week 3 – Assignment: Critique Potential Violations Using Information Technology

Is this the question you were looking for? Place your Order Here