Wednesday, May 1, 2019

Ethics in infofmation systems Term Paper Example | Topics and Well Written Essays - 1500 words

Ethics in infofmation systems - Term Paper ExampleHowever, in order to celebrate customer data, a number of strategies stool be defined argon processd below persistently maintaining data protection controls and procedures aiding in optimum data integrity An incident response plan that can be triggered, whenever a security measure breach is found within the network or servers maintaining customer data. An healthy spyware, ad-ware and antivirus installation on workstations, in order to protect threats emerging from a workstation within the network. Moreover, discipline engine room facilitates CRM to maintain data in databases including customer names, contact details, buying history and usability of services. Likewise, the information retrieved from databases connected to CRM provides individualized processes for an organization to target customers. Likewise, the personalized processes provide value for the customers along with increment in customer loyalty for the organizatio n (Payne & Frow, 2006). For instance, notifications of new services and products are transmitted via emails short message services (SMS), phone calls, or WAP services. Consequently, customers are updated related to new services and products (Buttle, Ang, & Iriana, 2006). ... In order to evaluate the value for customers, they need to demonstrate at least one of the three factors listed below (Buttle, Ang, & Iriana, 2006) Customers demonstrating significant life time value Customers demonstrating targeting former(a) customers Customers encouraging modification of suppliers In order to disseminate customer information, cookies can be used, as they are isolated with textual information that is redirected from the web server to a web browser. Likewise, the cookies that are transmitted via hypertext enchant protocol (HTTP) are responsible for authenticating, tracking, and managing precise information related to the user. For instance, they can manage precise information related to site p references and data associated with shopping carts (Cookie.2007, n.d). 2 rule and Other Policy 2.1 Associated and Applicable Legislation To sidestep for any legal issues or security breaches, organization needs to define, document and demonstrate abidance with all applicable statutory, regulatory and contractual requirements for each information system. Owners of the systems must take advice from the information security officers for all issues related to Legal and security information. Local regulations must be addressed that are applicable where data is handled, stored or protected. Likewise, legal officer of the organization will examine applicable laws and regulations of policies at diametric regions. The legal officer will consult chief information security officer for establishing required exceptions to policies and particular proposition policies to different regions. 2.2 Intellectual Property Rights All employees at the organization will conform to the legal

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.