StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

IT Managers, Data Access and Privacy - Research Paper Example

Cite this document
Summary
"IT Managers, Data Access and Privacy" paper addresses the core issues of Data Security and Privacy. The paper states that IT Managers may be held responsible for the data security issues and privacy concerning an organization but that may also be done only to a particular level. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96% of users find it useful
IT Managers, Data Access and Privacy
Read Text Preview

Extract of sample "IT Managers, Data Access and Privacy"

? IT Managers, Data Access and Privacy. Submitted to, Submitted By, of the Submitted on, [February 20th, Data Access and Privacy are two of the most critical issues that govern any organization. With the ongoing rapid advancements in the field of information and communications technology, the issues related to the sanctity of data have become more severe. How they affect the responsibilities of IT managers and their roles has been attempted to be discussed in the report narrated below. Let’s address the core issues of Data Security and Privacy first. Data Security This is a very vast term that is used to denote varying aspect of sanctity associated with data. Formally speaking, “protection of data from unauthorized (accidental or intentional) modification, destruction, or disclosure” is the definition.” (Its, 2012) as quoted at the Institute of Telecommunication Science Colorado. Data is everywhere around man. Present in different forms, it becomes of utmost importance when it holds value as information. The data pertinent to an organization needs to be kept from any alterations or maltreatment so as to prevent it from being damaged or being misused by unauthorized personnel. Thus the security that needs to be associated with all forms of data is referred to as data security. Privacy “Freedom from unauthorized intrusion” (Merriam-webmaster, 2012) is the formal way privacy may be explained. It may well be used interchangeably with data security as data also needs to be kept private in order to be secured. It is this Privacy that keeps the level of data and knowledge management at distinct levels within an organization. The discussion further proceeds with how data security and privacy issues are catered with the IT managers and Project Managers respectively. Bottom of Form IT MANAGERS VERSUS PROJECT MANAGERS: Project managers as compared to IT managers bear limited responsibility. The main role of project managers is to manage and handover a working project to a company, Afterwards the IT managers take over the running and overall execution of that project. Both the managers can be compared in terms of employee volume as project managers maintain and manage a very limited crew throughout their task whereas IT managers manage and fulfill the IT needs of whole organization. The main activities performed through the information system of an organization are always monitored and tested under IT managers. The requirements of business process re-engineering are initiated by the IT management and it always seeks a better IT system for an organization. Project managers on the other hand tend to reduce the workload by keeping the new requirements from springing up. IT managers are responsible for chipping in and processing the data of whole organization. This role demands imposition of certain ethical obligations regarding data sharing and security. The issue of data security is related to both i.e. organizational data (internal data, like personal data of employee etc.) and business data (external data like trade volumes and bidding details etc.). IT managers are responsible for safeguarding internal and external data. Regarding personal data of employee various hazards can easily be anticipated in case of any mishandling of data. For example all or few of the employee information like, employee history, increments, promotion evaluations, compensation offered by the company, previous employment record, salary amount, social security number and account information if leaked out, can not only be misused against that employee, but would also create a significantly negative impact on the whole organization. The usage and sharing of such information must be done under tightest scrutiny. The system designed for the purpose may be highly secure but the usage and sharing of data highly depends on the authorized IT personnel. There may be Standard Operating Procedures for data management and security but what if those rules are not properly enforced or followed. There are a lot of events happen inside an organization that demand data movement and sharing. This makes the data security more vulnerable as it doesn’t require any malicious act to breach the data security protocols. Instead the processes like database sharing and multi-dimensional query executions are enough to create insecure data traffic inside an organization. There are certain questions that arise here. How much responsible are the data managers for securing data? Would they be accountable for security breach in any case? How perfect are the data security mechanisms and what role do the authorize data managers ethically play in order to keep the organizational data secure? How would it be possible to assure compliance of ethical obligations by data managers? Since there would be no flawless solution to the problem of data security, to what extent the data managers can be constrained for ensuring maximum data security? KNOWLEDGE MANAGEMENT: Modern computing sciences address this issue under the head of knowledge management. According to Bertino et al (2006), “Knowledge management enhances the value of a corporation by identifying the assets and expertise as well as efficiently managing the resources. Security for knowledge management is critical as organizations have to protect their intellectual assets. Therefore, only authorized individuals must be permitted to execute various operations and functions in an organization.” Bertino et al (2006). SECURITY ISSUE UNDER KNOWLEDGE MANAGEMENT: Though not regarded as an integral part of an organizational setup, the security of knowledge management should not strictly be overlooked at any level within an organization. Often as a lack of effective knowledge management, organizations fall victim to knowledge management related security issues. Training can be one important phenomenon that can be used to address the conscience of security among the developers. For this purpose it is also a good practice to enable developers to be able to access a central repository on a regular basis that would have updated instructions on latest privacy issues. This is with special reference to large organizational setups. A software security portal is one of the most effective mediums that can be used to address the privacy issues connected to knowledge management within an organization. Such a portal is proposed to address a number of key issues. These would include: Management of a main repository that would incorporate within itself a record of all the organization’s main policy documents, process documents, best practice memos and development documentation. The creation of a model for the business processes to organize them upon. Only the building up of the first model would take the effort. The rest of the business processes would have for themselves a sort of a guideline that would serve as a building block for them. Stakeholders should be provided with the return on security investment that they would be receiving as a result of their association with the company. For that the actual data pertaining to the improvements in the productivity of the company and the reduction in the vulnerability of security may be used. The organization may formulate an organization wide wiki that may serve as a unanimous source of norms and information serving as a knowledge sharing portal for each individual concerned with the organization. A software Wiki would be an even better Wiki that would serve to evaluate and re assess the code snippets being promulgated within the securing fences of the organization. CONCLUSION Conclusively it may be said that IT Managers may be held responsible for the data security issues and privacy concerning an organization but that may also be done only till a particular level. Beyond that, the Managers should not be held responsible. There should be persistent laws that would cater to organizational needs beyond the IT managers’ jurisdiction. REFERENCES: Craig, T., & Ludloff, M. E. (2011). Privacy and big data. Sebastopol, Calif: O'Reilly. Subramanian, M. (2000). Network management: Principles and practice. Reading, Mass: Addison-Wesley. ITS. (2012) Data Security. Institute of Telecommunication Science, Colorado. Retrieved from http://www.its.bldrdoc.gov/ Bertino, E., Khan, L. R., Sandhu, R., & Thuraisingham, B. (2006). Secure knowledge management: confidentiality, trust, and privacy. Systems Man and Cybernetics Part A Systems and Humans IEEE Transactions on, 36(3), 429-438. Retrieved from http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1632278 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“IT Managers, Data Access and Privacy Research Paper”, n.d.)
IT Managers, Data Access and Privacy Research Paper. Retrieved from https://studentshare.org/information-technology/1442808-how-much-effort-and-expense-should-it-managers
(IT Managers, Data Access and Privacy Research Paper)
IT Managers, Data Access and Privacy Research Paper. https://studentshare.org/information-technology/1442808-how-much-effort-and-expense-should-it-managers.
“IT Managers, Data Access and Privacy Research Paper”, n.d. https://studentshare.org/information-technology/1442808-how-much-effort-and-expense-should-it-managers.
  • Cited: 0 times

CHECK THESE SAMPLES OF IT Managers, Data Access and Privacy

Security Manager: Ethical and Social Responsibilities

here are also copyright, intellectual property and patents issues involved as easy access and relatively difficult traceability can lead uncontrolled... Therefore, being aware of their ethical and social responsibilities in exercising control and not compromising on others' privacy is of paramount importance.... Compounded with technology innovations is the development in communications, with the Internet making access to any information from anywhere very easy....
15 Pages (3750 words) Essay

Privacy and Confidentiality of Client Health Information

The reporter underlines that health information managers have the professional duty to facilitate access and utilization of information for the benefit of the client.... However, this should be done while protecting the privacy and confidentiality of client information.... hellip; In the current world of expanding and sophisticated technology, there is need to also advance privacy and confidentiality policies and procedures in regards to information access....
6 Pages (1500 words) Research Paper

IT privacy protection, first mover and follower advantages

privacy policies and features have become an important consideration for websites and users, and use of such policies and features allows the website to increase its credibility, user's trust, and traffic on the website, whereas for users privacy policies and features works as… This study will first state the desirable privacy features of websites, than it will elaborate the discussion of privacy features, after discussing the privacy features it will select the industry and websites which will be discussed in s of privacy policies, after selecting the websites it will discuss privacy policy features of those websites, than it will analyse the availability of those privacy features and will rank them accordingly, and, in the end, the study will provide a brief conclusion....
8 Pages (2000 words) Essay

Evaluate the options at the security manager disposal to respond to organizational lost

Exposure of confidential information has been cited as one of the single greatest… The present attitude toward electronic data revolves around the notion that all employees ought to be able to gain access the information from anywhere and share it with colleagues, vendors, and The capability to access and circulate data quickly and readily sounds marvellous from a productivity viewpoint; however, this is terrifying from a security perspective.... In response to security threats to organization's data, organizations have implemented diverse tools to mitigate and contain those threats through approaches such as passwords, encryption, firewalls, access-control lists, network traffic monitoring, system audits, and patch management....
11 Pages (2750 words) Essay

Building a Business Network

An office network can allow employees to share files and other data and print documents more easily.... This essay discusses a computer network, which is simply a system of interconnected computers.... It's important to highlight that networks are constantly used every day to conduct transactions and communications among businesses, government agencies, and individuals....
16 Pages (4000 words) Essay

Cyber Criminals and Other Data Security Dangers

hellip; There are numerous cases where it managers have failed to provide or define adequate security for an enterprise-wide infrastructure of an organization.... In the following sections, we will critically evaluate a single most cybersecurity weakness for it managers within an organization.... It is the responsibility of the organization to protect and secure data privacy.... Although, every online organization has a privacy policy which states how they will handle and secure customer data at the same time there are no verification criteria....
16 Pages (4000 words) Term Paper

Social Networking in the Workplace

hellip; The organizational structure for monitoring is very important for ascertaining security, ethics, and privacy.... How do your organization's recruitment, training, and promotion strategies measure the required security and privacy skills, requirements, and competency in the delivery of IT activities?... iscussions and Findings ReportHardware security and privacySecurity, ethics, and privacy are increasing matters of concern in the workplace....
7 Pages (1750 words) Assignment

The Concept of Password Management

Unauthorized personnel can commit identity theft or get access to private company data if they get access to employee passwords.... Research methodology, data analysis, and presentation of findings will be conducted in 2 months respectively.... The paper focuses on the concept of password management and how to solve the issues of having so many passwords and having to change them for the different applications at the workplace....
9 Pages (2250 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us