Monday, May 6, 2019

A guideline on the privacy of personal data stored on company-owned Essay

A guide absorb on the loneliness of personal information stored on community-owned winding devices - Essay ExampleIn cost of maintaining company privacy, the company can use IT experts to track their employees. This is useful for knowing the location of employees at a particular time compared to where they are supposed to be. Employers sometimes allow employees to carry company-issued mobile devices such as iPhones and iPods. It has been in the news that iPhones and iPods are able to track the physical location of the person possessing them secretly. These types of devices can be used for business purpose and track personal information of the user blurs privacy between collective information and personal information. This is because the devices can track personal location of the user and store it in unencrypted files imbed in the devices and on the owners computer. As a result, the brass of rules IT experts can obtain this info from the employees computer according to Bid gol. This type of device is usually equipped with a Global stead System (GPS) that tracks the individuals location. This proves to a threat to personal privacy of employees and thus the need for organizations to throw in up with a policy and a legal guideline on the type of information to be gathered using such devices. For instance, there should be a guideline on maintaining an employees privacy when using a personal Smartphone while conducting company business. Employees need to know how much to share with organization clients when using either personal device or company device. Organizations further, need to consider the issue of transparency if they are determined to track physical location of their employees or get customers. This will involve intercommunicate employees about the policies on how to shield their privacy while using company devices or while conducting company business with personal devices. There is also need for organizations to equip their mobile devices wi th mobile payment system that will discourage employees from misusing the devices. IT managers have estimated that employees often spend more than an hour every day on non-work related web services. These allow in online games, internet surfing, gambling and shopping among others. The downloading and storage of such personal data results in various internet based threats on critical company data stored in the devices misused. The threats include susceptibility to virus and worm attacks, malware infection, and hacking of private and restricted company sites and passwords. In most cases, this leads to the organizations taking cowl measures of protecting their devices by installing GPS functionality that later hinders the privacy of the user. The advantages gained by organizations in having their employees work at contrastive locations at different time brings out the need for protecting personal information used by employees while at work. For the same purpose, both the organizatio n and employees should understand the limit and the technical control involve when using such mobile devices. This includes the organizations coming up with policies based on technical control of their mobile devices to provide about the extent that the device as suggested by Garfinkel and Spafford (2002) can control the personal data of the employee. This may include providing a set download of a specific capacity before a using a personal device for connecting the network of the organization. An organization is required to draw a line regarding personal privacy infringement. Infringement of personal data occurs when the organization exposes personal information that may be a threat to their safety. In order to avoid this,

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.