Legal Environment and Impact on Case Study

Total Length: 992 words ( 3 double-spaced pages)

Total Sources: 3

Page 1 of 3

This could be something like another computer picking up someone's credit card number during what was supposed to be a secure transaction, or an employee of a company giving out a person's confidential information over the phone to someone who is not authorized to receive it. However it happens, confidentiality breaches are serious, and must be addressed immediately so they do not happen again (Allen 2001).

Integrity of information assures that information can not be modified without such modification being detected. Most information management systems have some sort of protocol in place for protecting the integrity of information. The greatest danger to the integrity of information occurs when it is in transit from one computer to another. This is the perfect time for hackers to access the information and modify it without being detected. A secure information management system ensures that this is unlikely to happen and that any modifications can be detected easily in most cases, usually as soon as they occur, and the breach mended. The most secure businesses ensure than any breach of integrity is a highly remote possibility, unlikely to occur at all.

Finally, availability of information is also important. The information being stored must be secure, but it must also be accessible when it is needed. Security protocols used to protect the information must be functioning correctly, but so must the communication channels (passwords and encryption and such) used to gain access to it. The information systems that store the information must be protected from power outages, system upgrade interruptions, and hardware malfunctions, as well, so that the information, while not easily accessible to those who are not authorized to receive it, is still accessible at all times to authorized people when it is needed.
There should never be a time when information is needed and it is not able to be easily retrieved by someone with the proper authorizations (Layton 2007).

These are all important considerations for today's companies. Most businesses that deal with consumers maintain some sort of database of information on those consumers. How sensitive that data is depends on the type of business, and what the business is able to do with that data and who is allowed to have access to it depends on the industry and federal law regarding information privacy. There are certain expectations that all businesses dealing in personal, private information on individuals must adhere to and these businesses must make sure their information management systems are up to the task of protecting the confidentiality, integrity, and availability of information on its consumers. Federal law regarding the protection of this information must also be known and followed at all times. These are the regulations we must conform to in today's information age......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Legal Environment And Impact On" (2012, March 18) Retrieved April 28, 2024, from
https://www.aceyourpaper.com/essays/legal-environment-impact-55131

Latest MLA Format (8th edition)

Copy Reference
"Legal Environment And Impact On" 18 March 2012. Web.28 April. 2024. <
https://www.aceyourpaper.com/essays/legal-environment-impact-55131>

Latest Chicago Format (16th edition)

Copy Reference
"Legal Environment And Impact On", 18 March 2012, Accessed.28 April. 2024,
https://www.aceyourpaper.com/essays/legal-environment-impact-55131