StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Manager's Hot Seat #1-Burned by the Privacy Firewall - Essay Example

Cite this document
Summary
If I were the manager in the scenario, I would have intervened in the punitive action taken against him and will subsequently review the policy that involves the use of company’s communication devices such as cellphone and internet. I believe that the existing policy is very…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.9% of users find it useful
Manager's Hot Seat #1-Burned by the Privacy Firewall
Read Text Preview

Extract of sample "Manager's Hot Seat #1-Burned by the Privacy Firewall"

Teacher Burned by the Privacy Firewall If I were the manager in the scenario, I would have intervened in the punitive action taken against him and will subsequently review the policy that involves the use of company’s communication devices such as cellphone and internet. I believe that the existing policy is very prone to abuse as implementing managers just peer review anyone’s communication on record at will and could even impose administrative action on whim. This is dangerous because it might drive the company’s best people away especially those who are doing well.

In the case of Willy, I would have refrained from immediately putting him on administrative leave which is a euphemism for suspension. I would have instead first asked him to explain why the personal and long distance calls through a proper channel which is to course through his superior who is the other lady in the video. Willy’s explanation must be taken into account because he is a performer in the company. In addition, any administrative meted against Willy must also be made known to his superior first.

Also, the threshold of what constitutes excessive calls must be clearly established. It should not just be based on a mere whim such as in the video. If an employee asks for the threshold and his or her record, it should be made available to him or her to review company use of equipment. In the video, the policy was clearly abused because even Willy’s superior was subjected to review and cannot ask for her record or the threshold of calls. The concrete action that I would take is to recall Willy’s administrative leave and have it reviewed.

I will also review the policy and make the threshold of company’s communication equipment very concrete and clear.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Manager's Hot Seat #1-Burned by the Privacy Firewall Essay”, n.d.)
Manager's Hot Seat #1-Burned by the Privacy Firewall Essay. Retrieved from https://studentshare.org/business/1674439-manageraposs-hot-seat-1-burned-by-the-privacy-firewall
(Manager'S Hot Seat #1-Burned by the Privacy Firewall Essay)
Manager'S Hot Seat #1-Burned by the Privacy Firewall Essay. https://studentshare.org/business/1674439-manageraposs-hot-seat-1-burned-by-the-privacy-firewall.
“Manager'S Hot Seat #1-Burned by the Privacy Firewall Essay”, n.d. https://studentshare.org/business/1674439-manageraposs-hot-seat-1-burned-by-the-privacy-firewall.
  • Cited: 1 times

CHECK THESE SAMPLES OF Manager's Hot Seat #1-Burned by the Privacy Firewall

Firewalls and Proxy Servers

Our organization employs both hardware and software firewalls and any solution for enhancing the defense of our network system, or protecting us from the Internet's hostile environment, will operate in conjunction with our firewall system.... At the present moment, we are involved in the implementation of a Stego system to operate in conjunction with our firewall system.... In order to better understand how the one will compliment and enhance the other, it is necessary that I overview our operative firewall system....
5 Pages (1250 words) Essay

Importance of Information Security and Privacy

Basically a firewall is capable f preventing... Networks are built in order to allow users to share, however it also allows other users the possibility to obtain information and other data that are not meant for them.... This is becoming a bigger problem as organizations connect their private networks onto the internet....
6 Pages (1500 words) Essay

Power point presentation about Firewall Technologies

These threats lead to the creation of the firewall technology in order to protect a computer or network of computer which is connecting to the internet.... A firewall is defined as a "computer, router, or other communication device that filters access to the protected network" (Abie 2000).... Thus, it gives the implication about the main tasks of a firewall.... Accordingly, a firewall inspects traffic network passing through it and is responsible for permitting or denying access....
5 Pages (1250 words) Essay

Networking and Security: Firewalls

hellip; Because traffic is limited software firewall can perform well with a computer of good specifications; however in a medium size organization or an enterprise these dimensions are quite Networking and Security: Firewalls Security is the core issue of all present and future networks.... More often than not a software firewall can manage the major security issues of a home user.... Because traffic is limited software firewall can perform well with a computer of good specifications; however in a medium size organization or an enterprise these dimensions are quite different and require specialized hardware firewall....
1 Pages (250 words) Essay

Firewall Applications

A firewall is a software/hardware tool that is used to protect a computing device from malware/other malicious software or Trojan horses' intrusion.... These external threatening agents often attack a computing device when it is connected to another external computing device that… This connection may be via a network etc. firewall prevents unauthorized access to a computing device by checking every message transfer to and from the computing device.... It restricts any message transfer that does not comply with the defined firewall Applications Submitted to, Submitted By, of the Submitted on, [November 6th, INTRODUCTION A firewall is a software/hardware tool that is used to protect a computing device from malware/other malicious software or Trojan horses' intrusion....
2 Pages (500 words) Essay

Security Technology Firewalls and VPN

They therefore try and make their system secure so that… This paper discusses security technology, firewalls and VPNs that can be used to make our system secure. Stewart (233) defines a firewall as a written program and a vital network component that screens the movement of information through a In my research, i came about Comodo internet security, pc tools firewall plus free edition and zonealarm free firewall that are the best firewalls to be used at present because they are very light, cheap, easy to maintain as some of them like comodo has combined its antivirus program with firewall pro hence free security program for everyone....
3 Pages (750 words) Coursework

A Firewall Software

This means that stateful inspection firewall monitors IP addresses… These firewalls take decisions more intelligently than the simple packet filtering firewalls.... 6 8 A firewall is a device (it could be software or hardware system) that disallows any illegitimate access towards or from a network.... Packet filtering firewall is one of the basic firewall that works on transport and network layer of TCP/IP layering model....
3 Pages (750 words) Essay

Multitunneling Grid Transactions

Apart from this SSH can be used as a tool to connect machines on opposite sites of a firewall(s).... Apart from this SSH can be used as a tool to connect machines on opposite sites of a firewall(s).... The SSH tunnel forwards a TCP port at one end(local) to another TCP port at the other end (remote) through the firewall.... The following are the situations that this can be important Where one needs to talk directly to a specific TCP port to a machine that is separated by a firewall/gateway if it is possible to SSH into the gateway....
6 Pages (1500 words) Lab Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us