Sunday, August 11, 2019
Business driven information technoligy Term Paper
Business driven information technoligy - Term Paper Example By taking into consideration of these policies, IBM effectively secures its information assets in quite an ethical manner. The company delivers two types of services one is ââ¬ËManaged Security Services (MSS)ââ¬â¢ and the other one is ââ¬Å"Cloud Security Services (CSS)ââ¬â¢. Through MSS, IBM offers ââ¬Ësingle management consoleââ¬â¢ by which IT department team frequently monitors its overall information infrastructure. With the help of CSS, the company provides an advanced technological platform called ââ¬ËIBM Virtual-Security Operations Centreââ¬â¢ by which it delivers high value services to its customers which does not require low cost security devices and maintenance (IBM, 2012). Apart from these two services, IBM also offers application & data security services, identify and access management services and IT & network infrastructure security services. With the help of these services, the company has been ethically capable to secure its information assets. S ince the initiation, IBM has followed certain business conduct guidelines in quite an ethical way by which it has been able to maintain confidentiality among its service software, application and information assets. The company ensures that every level of personnel should comply with IBM directives, polices and mentioned guidelines. For instance, employee who expertise in specific areas such as procurement, tax, imports and export must also obey certain kinds of guidelines. IBM has extensive precious assets which comprise huge proprietary information such as the companyââ¬â¢s intellectual property, confidential information assets, system software and physical property. The companyââ¬â¢s wide variety of services helps to strengthen its abilities in order to ethically manage, digitize and secure its valuable assets (IBM, 2012). Recommendations for Additional Types of Ethical Practices and Security By taking into concern regarding IBMââ¬â¢s business code of conduct, it has bee n observed that the company secures its information assets in quite an ethical manner. However, it is necessary for the company to understand employeesââ¬â¢ issues and satisfaction levels regarding business policies and working environment. IBM should assess whether or not the employees are comfortable with the specified laws and policies. IBMââ¬â¢s top level must understand and analyze every employeeââ¬â¢s issues, behaviors and attitudes towards the workplace and should justify them in quite an ethical manner. Contextually, the security issue for IBM can be strengthened further with the frequent changes in passwords by the employees related to intellectual assets of the company such as project related blueprints among others. Upgradation of security software to track malpractices such as hacking of confidential organizational data can be ensured through use of firewall and augmentation of network security. Chapter 5 Steps taken by Popular Technology Manufacturers to Reduce E-Waste ââ¬ËElectronic Wasteââ¬â¢ or ââ¬ËE-Wasteââ¬â¢ is one of the rapidly developing problems all over the world. E-waste primarily consists of a huge amount of various components such as toxic materials and hazardous materials among others which create undesirable impact upon human health and environment if it is not dealt with adequately. The United Nations, non-governmental organizations and private IT sector companies have agreed to take serious
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.