Tuesday, May 7, 2019

Business driven information technoligy Term Paper

Business driven study technoligy - Term Paper ExampleBy taking into consideration of these policies, IBM effectively secures its information assets in instead an ethical manner. The company delivers two types of services one is Managed Security Services (MSS) and the other one is obnubilate Security Services (CSS). Through MSS, IBM offers single management console by which IT department team oft monitors its overall information infrastructure. With the help of CSS, the company provides an advanced technological platform called IBM Virtual-Security Operations Centre by which it delivers high value services to its customers which does not require low cost security devices and maintenance (IBM, 2012). isolated from these two services, IBM also offers performance & data security services, identify and access management services and IT & internet infrastructure security services. With the help of these services, the company has been ethically capable to secure its information asset s. Since the initiation, IBM has followed certain trade conduct guidelines in quite an ethical way by which it has been able to maintain confidentiality among its service software, application and information assets. The company ensures that every level of personnel should comply with IBM directives, polices and mentioned guidelines. For instance, employee who expertise in specific areas such(prenominal) as procurement, tax, imports and export must also obey certain kinds of guidelines. IBM has extensive precious assets which comprise considerable proprietary information such as the companys intellectual property, confidential information assets, remains software and physical property. The companys wide variety of services helps to strengthen its abilities in do to ethically manage, digitize and secure its valuable assets (IBM, 2012). Recommendations for Additional Types of Ethical Practices and Security By taking into anguish regarding IBMs business code of conduct, it has bee n observed that the company secures its information assets in quite an ethical manner. However, it is necessary for the company to understand employees issues and satisfaction levels regarding business policies and working environment. IBM should assess whether or not the employees are homely with the specified laws and policies. IBMs top level must understand and analyze every employees issues, behaviors and attitudes towards the work and should justify them in quite an ethical manner. Contextually, the security issue for IBM can be strengthened set ahead with the frequent changes in passwords by the employees link up to intellectual assets of the company such as project related blueprints among others. Upgradation of security software to track malpractices such as hacking of confidential organizational data can be ensured through use of firewall and augmentation of network security. Chapter 5 Steps pilen by Popular Technology Manufacturers to land E-Waste Electronic Waste o r E-Waste is one of the rapidly developing problems all over the world. E-waste primarily consists of a huge amount of various components such as toxic materials and hazardous materials among others which create undesirable tinct upon human health and environment if it is not dealt with adequately. The United Nations, non-governmental organizations and private IT sector companies have agreed to take serious

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.