01.05.2017 Views

632598256894

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

of data privacy. Organizations need to explain compliance policies to end users so they understand<br />

why they need to do what must be done and will follow the necessary protocols. Wireless networks<br />

increase the need for encryption—data has to be protected in rest (stored) or in motion (transmitted).<br />

Laptop data has to be encrypted so if the laptop is lost or stolen, the data on the laptop is safe. Data<br />

loss prevention (sometimes referred to as data leak prevention) systems are designed to detect and<br />

prevent the unauthorized use and transmission of information. Breaches (unauthorized use) are costly<br />

and create a great deal of negative publicity.<br />

It is an organization‟s duty to secure its data. Just because data is encrypted, that doesn‟t necessary<br />

mean it is secure. A breach of data at the TJX Companies, Inc. in 2007 compromised an estimated 90<br />

million encrypted credit card records. Over 40 states have implemented breach notification laws that<br />

require organizations to report breaches to authorities and the persons affected by the breach. The state<br />

of Tennessee took privacy a step further with its Credit Security Act of 2007, which makes the use of<br />

a person‟s Social Security number in direct mailings or over the Internet a class B misdemeanor.<br />

An organization is responsible for compliance by its outsourcing partners as well. These partners<br />

are responsible for the organization‟s data, and therefore the organization itself is responsible for the<br />

security of the data even if it resides on a computer owned by another company. When evaluating<br />

relationships with third parties, an organization must look at the security measures that are in place<br />

and audit their compliance.<br />

Justifying the Cost of Information Technology<br />

Should companies take that giant leap of faith and invest millions of dollars in new machines and<br />

software? Can the return on a company‟s investment in technology be measured using conventional<br />

metrics as are discussed in Chapter 4, Discounted Cash Flow.<br />

These are questions that have concerned technology managers for years. Today, information<br />

technology consumes an increasing share of companies‟ budgets, but we cannot live without the<br />

technology. Thus, when a new version of the personal computer chip or Windows hits the market,<br />

companies must decide whether it is a worthwhile investment. Everyone wants the latest and greatest<br />

technology, believing that with it they will be more productive.<br />

Although IT is the medium for change, its costs and soft benefits are difficult to measure. As<br />

technology gets disbursed throughout a company, it becomes increasingly difficult to track costs and<br />

determine benefits. As workers become their own administrative assistants, each company must<br />

determine whether its workers are more or less productive when they type their own documents and<br />

prepare their own presentations. These are many of the issues that companies are facing now and in<br />

the future as they struggle with new IT investments.<br />

Conclusion

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!