Sign In
Not register? Register Now!
Pages:
3 pages/β‰ˆ825 words
Sources:
5 Sources
Style:
APA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 16.2
Topic:

Critiquing Potential Violations Using Information Technology

Essay Instructions:

With the rapid advancement and adoption of technology in all areas of business, it is critical for you as a future business leader to understand how unethical actions occur and what you can do to mitigate future risk.
Assume you have been hired as a consultant in the IT Department at Northcentral University. One of the University’s current goals is to minimize security threats and prevent breaches. To accomplish this, you have been asked to research last year’s “major hacks” to understand technology, information security measures, and issues in security management.
You must present your findings to the IT supervisor before the supervisor’s meeting with senior leadership. Prepare an executive summary for the IT supervisor that include the following:
Select one major incident to research regarding technological breaches. Identify the company that was affected and then describe this incident and why you selected it.
Explain the implications associated with this breach, specifically in terms of privacy laws and violations of the law.
Analyze the impact that these technological breaches have on consumer safety and well-being.
Recommend further actions to protect the privacy of clients.
Support your executive summary with a minimum of three scholarly resources. In addition to these specified resources, other appropriate scholarly resources, including older articles, may be included.
Length: 3-5 pages, not including title and reference pages

Essay Sample Content Preview:

Critiquing Potential Violations Using Information Technology
Student’s Name
Institution
Course Number and Name
Instructor’s Name
Date
Critiquing Potential Violations Using Information Technology
Executive Summary
In the era of information technology (IT), companies are integrating IT into their operations to reap the benefits associated with IT. However, the integration of IT also exposes companies to online security threats that disrupt business operations. Therefore, more companies are assessing the available solutions to minimize security threats associated with the use of IT. This executive report explores a security breach that occurred last year to a telecommunication company and presents findings that can help Northcentral University safeguard its information systems.
Security Breach
On August 2021, the giant telecommunication company T-Mobile’s IT servers were breached. The breach occurred after a malicious party used brute force attacks to gain entry into the server and access personal information from millions of customers (T-Mobile, 2021). While the breach did not leak any financial-related information, it exposed customers’ addresses, driver’s licenses, names, and other personally identifiable information. This breach left customers vulnerable and exposed because they had shared their information with the company, hoping their information would be protected. According to Posey et al. (2017), when individuals share their information with organizations, their data privacy depends on the organization's information privacy safeguards and security measures. Therefore, when security breaches occur, it is implied that the organization lacks adequate safeguards and data protection mechanisms. T-Mobile's security breach makes a good case study because the company is multinational and has access to a lot of personal information. In addition, T-mobile has faced some legal ramifications following the breach. Northcentral University can learn from this organization about how to respond after a security breach and the potential ramifications of such a breach.
Implications of the Breach
The effects of a security breach are far and wide, ranging from reputational to legal consequences. The company was left vulnerable to some legal ramifications when the hacker gained access to customers' information during the security breach at T-Mobile. For instance, the company had to settle a class action lawsuit in 2022. According to Kurth (2022), affected customers raised claims that T-Mobile had violated privacy laws by inadequately notifying impacted individuals about the breach. In addition, the customers claimed that the company had failed to adequately safeguard the privacy of customers’ data. Posey et al. (2017) state that despite existing breach notification laws, companies sometimes fail to adequately notify customers about data breaches due to the fear of the negative publicity associated with such notifications. However, failure to adhere to these laws can have legal consequences, such as lawsuits.
In addition to the lawsuit, T-Mobile received legal scrutiny from federal agencies. In particular, T-Mobile was investigated by the Federal Communications Commission (FCC) ...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Essay Samples: