Tuesday, December 24, 2019

Rights of Privacy in the Private Sector Workplace Essay

Employee Privacy Rights: Limitations to Monitoriing ?Companies are intruding more deeply into the lives of employees, and even though corporate intentions may be benign, the risk of backlash is growing.? ?Lee Smith (1) With the rise of advanced technology, there arose the threat of surveillance and privacy invasion in the workplace. An employee, by the very nature of the employment relationship, must be subject to some level of monitoring by the employer. However, this monitoring has its limits. Rights of privacy primarily are related to organizational invasion of a person?s private life and unauthorized release of confidential information about a person in a way that would cause emotional harm or suffering (2). It is the†¦show more content†¦Constitution ?No state shall make or enforce any law which shall abridge the privileges or immunities of citizens of the United States; nor shall any state deprive any person of life, liberty, or property, without due process of law; nor deny to any person within its jurisdiction the equal protection of the laws.Amendment XIV to U.S. Constitution When the founding fathers of the United States wrote the Constitution, they specifically addressed the most pressing issues of privacy during that period. Those issues included the government?s right to search one?s home as desired and the quartering of U.S. troops in the home. The privacy issues have evolved overtime due to technology and could not have possibly been predicted by the framers of the Constitution. Employees often look to the Fourth and Fourteenth Amendments of the Constitution with hopes of finding legal protection. So what does the Fourth and Fourteenth Amendments of the Constitution, written in 1791 and 1868 respectively, hold for Americans today in regards to right of privacy from a private organization?Show MoreRelatedpossible discharge after she was reported by a colleague in the district for posting a photo of her900 Words   |  4 Pagescaution that should be taken when using the Internet. There are other misdeamors that have been reported for unprofessionalism in the communication within the public sector on social media. This has led to disciplinary action, and the demand for employees to resign. The solid stream of high-profile cases relating to the public sector shows the importance of cutesy, and repercussions of the electronic footprint on the Internet. The resignation of a CIA director is one of the high profile cases weRead MoreA Brief Note On The State Of Privacy727 Words   |  3 PagesState of privacy in the workplace (Privacy in the Workplace: Overview) In the private sector employees don’t really have much privacy rights as far as company tools to communicate go. Most employees conduct some kind of big brother surveillance through cameras, computer log information or badges swipe log. The employers spy because they have the right to protect their building and office equipment. Essentially security trumps employee privacy in the workplace. Most states do not have employeeRead MoreTechnologys Impact On Technology And The Use Of Technology1408 Words   |  6 Pagesconsiderable ethical repercussions which may even result in customers’ backlash. â€Å"The negativities may result from deceptive practices, privacy invasion, breaches of confidentiality through sharing of information.† (Foley, 2006) 1. Organizational personal viewpoints regarding issues of privacy and the exchange of information: Organizations provide that privacy is a high-profile public policy issue which affects various stakeholders such as consumers and marketers. Organizations customarily haveRead MoreGerman Legislation Banned The Use Of Information From Social Networking Sites1476 Words   |  6 Pagesused in the employment process, but permitted the use of publically available information on job networking sites, such as LinkedIn. In fact, the Interior Minister, Thomas de Maizià ©re, recognized that social media is a private right stating that private social networks are private and not to be used as gateways for gaining information on job applicants. Though it may be difficult to prove that a company obtained information about a prospective candidate through their social media account, a firmRead MoreSocial Medi A Popular Platform For Communicating916 Words   |  4 Pagesa popular platform for communicating. Everyone from the government, to businesses, unions and individuals are finding social media to be an effective tool not just for communicating, but also for informing, promoting and organizing. In the public sector, social media has become an important open government tool for communicative exchange with the public it serves (Mergel, 2010). On social media platforms individuals are able express their thoughts, ideas, feeling and concerns about anything andRead MoreDiploma in Business Essay1571 Words   |  7 Pagesbullying other members of staff will face disciplinary action ranging from counseling and performance management to dismissal. JKL takes care to respect your right to privacy and fully complies with our obligations under the Privacy Amendment (Private Sector) Act 2000. JKL uses any information we collect in accordance with our Privacy Policy and to provide a more customized service experience. It is company policy to comply in all respects with local/state/federal governments’ legislation.Read MoreFree Speech On The Internet1022 Words   |  5 Pagesschools, workplaces, and even other users misuse the idea of free speech on the internet and why we need to filter hate speech and introduce legal ramifications for these actions. Some schools have used their authorities to discipline students and teachers over things they posted on the internet from the privacy of their homes and on their private time. In America, students are not supposed to lose their constitutional rights â€Å"at the schoolhouse gate.† The protection of students’ rights to free speechRead MoreSocial Media s Impact On Society s Life Of Organizational Workforce1329 Words   |  6 Pagesmanage their employees. But the use of social media for employment decisions may raise many legal problems and concerns. Numerous discussions have focused on whether employers’ interests in the use of social media might invade employees’ privacy and speech rights (Segal, 2014; Lam, 2016; Abril, Levin, Riego, 2012; O’Connor Schmidt, 2015). This paper will closely examine three areas for organizational use of social media: (a) using social media for selection, (b) using social media for surveillanceRead MoreThe Civil Rights Act Of 19641581 Words   |  7 Pagesagainst a variety of groups that have historically been subjugated to unfair treatment. The major federal anti-discrimination law is Title VII of the Civil Rights Act of 1964. This law prevents discrimination on the basis of race/color, sex, religion, or national origin. It also prohibits retaliation against an employee for asserting their rights under the law and applies to all term and conditions of employment, including hiring, firing, promotion, compensation, and assignment decisions. AdditionallyRead MoreEmployee Handbook Privacy Section1397 Words   |  6 PagesIntroduction to Employee Privacy Rights This section of the employee handbook is provided as a guideline for employees to understand the company policy and procedures regarding privacy in the workplace. While this section cannot address every possible scenario that may occur, the general policy will serve as a basis of understanding the key workplace issues and employee privacy. This section addresses privacy issues related to personal background information, off-work activities, and the corporate

Monday, December 16, 2019

Bloodlines Chapter Twenty-Two Free Essays

string(193) " who he should call when he found something – and were about to leave when he asked, â€Å"Sage, why’d you pick me to be your partner in crime in this\?† I thought about it\." CLARENCE DIDN’T WANT to talk to us about what had happened. In fact, he adamantly denied anything was wrong, claiming he’d scratched his neck while shaving. â€Å"Mr. We will write a custom essay sample on Bloodlines Chapter Twenty-Two or any similar topic only for you Order Now Donahue,† I said as gently as I could, â€Å"this was made by a surgical tool. And it didn’t happen until Keith visited.† â€Å"No, no,† Clarence managed in a weak voice. â€Å"It has nothing to do with him.† Dorothy stuck her head in just then, carrying a glass of juice. We’d called for her shortly after my arrival tonight. For blood loss, the remedies were the same for Moroi and human alike: sugar and fluids. She offered the glass to him with a straw, her lined face filled with concern. I continued my pleas as he drank. â€Å"Tell us what your deal is,† I begged. â€Å"What’s the arrangement? What’s he giving you for your blood?† When Clarence remained silent, I tried another tactic. â€Å"People are being hurt. He’s giving out your blood indiscriminately.† That got a reaction. â€Å"No,† said Clarence. â€Å"He’s using my blood and saliva to heal people. To heal sick humans.† Saliva? I nearly groaned. Of course. The mysterious clear liquid. Now I knew what gave the celestial tattoos their addictive high. Gross. Adrian and I exchanged glances. Healing certainly was a use for vampire blood. The tattoo I wore was proof of that, and the Alchemists had worked long trying to duplicate some of the blood’s properties for wider medicinal use. So far, there was no way to synthetically reproduce it, and using real blood simply wasn’t practical. â€Å"He lied,† I replied. â€Å"He’s selling it to rich teenagers to help them with sports. What did he promise you for it? A cut of the money?† Adrian glanced around the opulent room. â€Å"He doesn’t need money. The only thing he needs is what the guardians wouldn’t give him. Justice for Tamara, right?† Surprised, I turned back to Clarence and saw Adrian’s words confirmed on the old Moroi’s face. â€Å"He†¦ he’s been investigating the vampire hunters for me,† he said slowly. â€Å"He says he’s close. Close to finding them out.† I shook my head, wanting to kick myself for not having figured out sooner that Clarence was the blood source. It explained why Keith was always unexpectedly here – and why he got so upset when I showed up without warning. My â€Å"fraternizing with vampires† had had nothing to do with it. â€Å"Sir, I guarantee the only thing he’s investigating is how to spend the money he’s been making.† â€Å"No†¦ no†¦ he’s going to help me find the hunters who killed Tamara†¦Ã¢â‚¬  I stood up. I couldn’t stand to hear any more. â€Å"Get him some real food, and see what he’ll eat,† I told Dorothy. â€Å"If he’s only weak from blood loss, he just needs time.† I nodded for Adrian to follow me out. As we walked toward the living room, I remarked, â€Å"Well, there are good and bad sides to this. At least we can be confident Keith’s got a fresh supply of blood for us to bust him with. I’m just sorry Clarence had to get hit so – â€Å" I froze as I entered the living room. I’d simply wanted to go there because it would be a familiar place to discuss our plans, one that was less creepy than Clarence’s bedroom. Considering how my imagination often ran wild while I was in this old house, I’d found that few things came as a surprise. But never in my wildest dreams had I imagined the living room would be transformed into an art gallery. Easels and canvas were set up all around the room. Even the pool table was covered by a big roll of paper. The pictures varied wildly in their content. Some simply had splashes of color thrown on them. Some possessed astonishingly realistic depictions of objects and people. An assortment of watercolors and oil paints sat around amidst the art. For a moment, all thoughts of Clarence and Keith disappeared from my head. â€Å"What is this?† â€Å"Homework,† Adrian said. â€Å"Didn’t you†¦ didn’t you just start your classes? How could they have assigned this much?† He walked over to a canvas showing a swirling red line traced over a black cloud and lightly tested to see if the paint was dry. Studying it, I tried to decide if I really was seeing a cloud. There was almost something anthropomorphic about it. â€Å"Of course they didn’t give us this much, Sage. But I had to make sure I nailed my first assignment. Takes a lot of tries before you hit perfection.† He paused to reconsider that. â€Å"Well, except for my parents. They got it on the first try.† I couldn’t help a smile. After watching Adrian’s moods oscillate so wildly in the last couple weeks, it was nice to see them on the upswing. â€Å"Well, this is kind of amazing,† I admitted. â€Å"What are they? I mean, I get that one.† I pointed to a painting of a woman’s eye, brown and long-lashed, and then to another one of roses. â€Å"But the others are open to, um, slightly more creative interpretation.† â€Å"Are they?† asked Adrian, turning back to the smoky painting with the red streak. â€Å"I figured it was obvious. This one is Love. Don’t you see it?† I shrugged. â€Å"Maybe I don’t have an artistic enough mind.† â€Å"Maybe,† he agreed. â€Å"Once we bust your buddy Keith, we’ll discuss my genius art all you want.† â€Å"Right,† I said, growing serious again. â€Å"We need to search his place for evidence. I figured the best way to do that is if I lure him out and you break in while he’s gone. To get through the lock – â€Å" Adrian waved me off. â€Å"I can pick a lock. How do you think I got into my parents’ liquor cabinet in middle school?† â€Å"Should’ve guessed,† I said dryly. â€Å"Make sure you look everywhere, not just in obvious places. He could have compartments hidden in the walls or in furniture. You want to find vials of blood or metallic liquid or even the tool that pierced Clarence.† â€Å"Got it.† We hashed out a few more details – including who he should call when he found something – and were about to leave when he asked, â€Å"Sage, why’d you pick me to be your partner in crime in this?† I thought about it. â€Å"Process of elimination, I guess. Jill’s supposed to be kept out of trouble. Eddie’d be a good asset, but he needed to go back with her and Lee. Besides, I already knew you didn’t have any moral qualms about breaking and entering.† â€Å"That’s the nicest thing you’ve ever said to me,† he declared with a grin. We headed out to Keith’s after that. All the lights were on in the first floor of his building, dashing a last-minute hope I’d had that maybe I wouldn’t have to lure him out. I would’ve actually liked to help with the search. I dropped Adrian off and then drove to a twenty-four-hour restaurant that was outside the opposite side of town. I figured it would be perfect for keeping Keith away from his home. The driving time alone would provide Adrian with extra searching time, though it meant Adrian had to wait outside for a while until Keith left. Once I finally arrived, I got a table, ordered coffee, and dialed Keith’s number. â€Å"Hello?† â€Å"Keith, it’s me. I need to talk to you.† â€Å"So talk,† he said. He sounded smug and confident, no doubt happy at pulling off the last-minute tattoo sale. â€Å"Not on the phone. I need you to meet me.† â€Å"At Amberwood?† he asked in surprise. â€Å"Isn’t it after hours?† It was indeed, but that was a problem for later. â€Å"I’m not at school. I’m at Margaret’s Diner, that place out by the highway.† Long silence. Then: â€Å"Well, if you’re already out past curfew, then just come here.† â€Å"No,† I said firmly. â€Å"You come to me.† â€Å"Why should I?† I hesitated only briefly before playing the card I knew would get him, the one thing that would make him drive out here and not raise suspicions about the tattoos. â€Å"It’s about Carly.† â€Å"What about her?† he asked after a moment’s pause. â€Å"You know exactly what.† After a second’s pause, Keith relented and hung up. I noticed that I had a voice mail from earlier in the day that I hadn’t heard come in. I called and listened. â€Å"Sydney, this is Wes Regan from Carlton College. Just wanted to go over a couple things with you. First, I’m afraid I have some bad news. It doesn’t look like I’m going to be able to retroactively admit your brother from auditor status. I can enroll him next semester for sure if he stays in good standing, but the only way he can keep taking classes now is if he continues to do so as an auditor. He won’t be able to get financial aid as a result, and in fact, you’ll actually need to pay the auditing fee soon if he’s going to stay in the classes. If he wants to drop altogether, we can do that too. Just call me and let me know what you’d like to do.† I stared at the phone in dismay when the message was over. There went our dreams of sliding Adrian into fully enrolled student status, not to mention his dreams of getting financial aid and moving out of Clarence’s. The next semester probably started in January, so Adrian was facing four more months at Clarence’s. Adrian would also be facing four more months of bus-riding and taking classes without college credit. But were the credits and financial aid really the most important things here? I thought back to how excited Adrian had been after only a couple classes, how he’d thrown himself into the art. His face had been radiant when he stood in his â€Å"gallery.† Jill’s words also echoed through my mind, about how the art had given him something to channel his feelings into and made the bond easier for her to cope with. Those classes were good for both of them. How much was an auditing fee? I wasn’t sure but knew it wasn’t as much as tuition. It was also a onetime cost that I could probably slide into my expenses without raising the attention of the Alchemists. Adrian needed those classes, of that I was certain. If he knew financial aid wasn’t an option this semester, there was a good chance he’d just drop them altogether. I couldn’t allow that. He’d known there might be â€Å"a delay† while the financial aid came together. If I could keep him going to Carlton a little longer, then maybe he’d get invested enough in the art that he’d stay on, even when the truth came out. It was a sneaky thing to do, but it would benefit him – and Jill – in the end. I dialed back Wes Regan’s office, knowing I’d get his voice mail. I left him a message saying that I’d drop off a check for the auditing fee and that Adrian would stay on until he could be enrolled next semester. I hung up, saying a silent prayer that it would take a while for Adrian to find out any of this. The waitress kept giving me the evil eye over just having coffee, so I finally ordered a piece of pie to go. She had just set the carton down on my table when an irritated Keith entered the restaurant. He stood in the doorway, looking around impatiently until he saw me. â€Å"Okay, what’s going on?† he demanded, making a big show of sitting down. â€Å"What’s so important that you felt the need to break school rules and drag me halfway across town?† For a moment, I froze up. Looking into Keith’s eyes – real and artificial – triggered all the conflicting feelings I’d had about him this last year. Fear and anxiety over what I was trying to pull off warred with the deep hate I’d long carried. Baser instincts wanted me to make him suffer, to throw something at him. Like the pie. Or a chair. Or a baseball bat. â€Å"I – â€Å" Before I could say another word, my phone chimed. I looked down and read a text message from Adrian: GOT IT. CALL MADE. ONE HOUR. I slipped the phone into my purse and exhaled. It had taken Keith twenty minutes to get here, and during that time, Adrian had been dutifully searching the apartment. He’d apparently been successful. Now it was up to me to delay Keith until reinforcements showed up. One hour was actually a lot less time than I’d expected. I’d given Adrian Stanton’s phone number, and she would’ve dispatched whatever Alchemists were closest. I’d figured that would mean Los Angeles, but it was hard to say with the scope of our jobs. If there were Alchemists on the east side of the city, they’d get here very quickly. It was also possible they could cut time by simply flying a private jet in. â€Å"What’s that?† asked Keith irritably. â€Å"A text from one of your vampire friends?† â€Å"You can stop the act,† I said. â€Å"I know you don’t really care about me ‘getting too close’ to them.† I hadn’t intended this to be the topic that distracted him, but I’d take it. â€Å"Of course I do. I worry about your soul.† â€Å"Is that why you called my dad?† I asked. â€Å"Is that the reason you wanted me out of Palm Springs?† â€Å"It’s for your own good,† he said, putting on that holier-than-thou air. â€Å"Do you know how wrong it was that you even wanted this job in the first place? No Alchemist would. But you, you practically begged for it.† â€Å"Yeah,† I said, feeling my anger rise. â€Å"So Zoe wouldn’t have to do it.† â€Å"Tell yourself that if you want. I know the truth. You like these creatures.† â€Å"Why does it have to be so cut-and-dried? In your view, I either have to hate them or be in league with them. There’s a middle ground, you know. I can still be loyal to the Alchemists and on friendly terms with vampires and dhampirs.† Keith looked at me like I was ten years old. â€Å"Sydney, you’re such an innocent. You don’t understand the ways of the world like I do.† I knew all about his â€Å"ways of the world† and would’ve said as much if the waitress hadn’t come by to take his drink order just then. When she was gone, Keith continued his spiel. â€Å"I mean, how do you even know you’re feeling the way you do? Vampires can compel, you know. They use mind control. Spirit users like Adrian are really good at it. For all we know, he’s been using his powers to endear himself to you.† I thought of all the times I’d wanted to shake some sense into Adrian. â€Å"He’s not doing a very good job, then.† We bickered back and forth about this, and for once, I was glad of Keith’s obstinacy and refusal to see reason. The longer he argued with me, the more time the Alchemists had to get to his apartment. If Stanton had told Adrian one hour, she probably meant it. Still, it was best to be safe. My breaking point came when Keith said, â€Å"You should be glad I’m looking out for you like this. This is about more than vampires, you know. I’m teaching you life lessons. You memorize books but don’t understand people. You don’t know how to connect to them. You’re going to carry this same naive attitude with you into the real world, thinking everyone means well, and someone – some guy, probably – will just take advantage of you.† â€Å"Well,† I snapped, â€Å"you’d know all about that, wouldn’t you?† Keith snorted. â€Å"I have no interest in you, rest easy.† â€Å"I’m not talking about me! I’m talking about Carly.† So. Here it was. The original purpose of our meeting. â€Å"What’s she have to do with anything?† Keith kept his tone steady, but I saw it. The slightest flicker of anxiety in his eye. â€Å"I know what happened between you guys. I know what you did to her.† He became very interested in stirring ice around with his straw. â€Å"I didn’t do anything to her. I have no idea what you’re talking about.† â€Å"You know exactly what I’m talking about! She told me. She came to me afterward.† I leaned forward, feeling confident. â€Å"What do you think my dad would do if he found out? What would yours do?† Keith looked up sharply. â€Å"If you’re so certain something terrible happened, then why doesn’t your dad already know? Huh? Maybe because Carly knows there’s nothing to tattle on. Anything we did, she wanted to, believe me.† â€Å"You are such a liar,† I hissed. â€Å"I know what you did. You raped her. And you will never suffer enough for it. You should’ve lost both of your eyes.† He stiffened at the reference to his eyes. â€Å"That’s harsh. And has nothing to do with any of this. What the hell’s happened to you, Sydney? How’d you turn into such a bitch? Maybe making you associate with vampires and dhampirs has caused more damage than we realized. First thing tomorrow, I’m going to call Stanton and ask that they pull you now. No waiting until the end of the week. You need to be away from this dark influence.† He shook his head and gave me a look both condescending and pitying. â€Å"No, you need to be re-educated, period. It should’ve happened a long time ago, as soon as they caught you busting out that murderer.† â€Å"Don’t change the topic.† I spoke haughtily, though he’d again woken a sliver of fear in me. What if Adrian and I failed? What if the Alchemists listened to Keith and hauled me away? He’d never have to worry about me again in a re-education center. â€Å"This isn’t about me. We were talking about Carly.† Keith rolled his eyes in annoyance. â€Å"I’m done talking about your slutty sister.† That was when my earlier impulse to throw something at him won out. Lucky for him, it was only my coffee and not a chair. Also lucky for him: the coffee had cooled considerably. There was still a lot of it left, and it managed to splash everywhere, drenching his unfortunate choice of a white shirt. He stared at me in astonishment, sputtering to get his words out. â€Å"You bitch!† he said, standing up. As he started moving toward the door, I realized that my temper might have just blown the plan. I hurried over and caught hold of his arm. â€Å"Wait, Keith. I-I’m sorry. Don’t go.† He jerked his arm away and glared at me. â€Å"It’s too late for you. You had your chance and blew it.† I grabbed him again. â€Å"No, no. Wait. There’s still lots we have to talk about.† He opened his mouth with some snippy remark and then promptly shut it. He studied me for several seconds, his face growing serious. â€Å"Are you trying to keep me here? What’s going on?† When I couldn’t muster a response, he pulled away and stormed out the door. I quickly ran back to the table and tossed a twenty on it. I grabbed the pie and told the bewildered waitress to keep the change. The clock in my car told me I had twenty minutes until the Alchemists were supposed to show up at Keith’s. That was also the time it would take to get back there. I drove right behind him, making no effort to hide my presence. It was no secret now that something was going on, something I’d lured him away from home for. I blessed every red light that stopped us, praying he wouldn’t arrive too early. If he did, Adrian and I were going to have to delay him. It wouldn’t be impossible, but it also wasn’t something I wanted to do. We finally made it back. Keith pulled into his building’s tiny lot, and I parked uncaringly in a fire zone out front. I was only steps behind him as he ran to the door, but he hardly seemed to notice. His attention was on the lit-up windows of his building and the dark silhouettes barely discernible beyond the heavy drapes. He burst in through the door, and I followed a moment later, nearly running into him as he came to a complete standstill. I didn’t know the three suited men there with Adrian, but I knew they were Alchemists. They had that cold, polished feel that we all strove for, and their cheeks were emblazoned with gold lilies. One was going through Keith’s kitchen cupboards. Another had a notepad and was talking to Adrian, who was leaning against the wall and smoking. He smiled when he saw me. The third Alchemist was kneeling on the floor in the living room near a small storage cupboard in the wall. A tacky painting of a shirtless woman’s back lay nearby, which apparently had been used to hide the compartment. Its wooden door had clearly been forcibly opened, and various contents were strewn haphazardly around – with a few exceptions. The Alchemist was going to great pains to sort one pile of objects: metal tubes and needles used to drain blood, along with vials of blood and small packets of silvery powder. He looked up at our sudden entrance and fixed Keith with a cool smile. â€Å"Ah, so glad you’re here, Mr. Darnell. We were hoping we could take you with us for some questioning.† Keith’s face fell. How to cite Bloodlines Chapter Twenty-Two, Essay examples

Sunday, December 8, 2019

The Rookie Chief Iso free essay sample

CISOs also frequently own or participate closely in related areas such as business continuity planning, loss prevention and fraud prevention, and privacy. CISO Responsibilities: Lead operational risk management activities to enhance the value of the company and brand. Oversee a network of security directors and vendors who safeguard the companys assets, intellectual property and computer systems, as well as the physical safety of employees and visitors. Identify protection goals, objectives and metrics consistent with corporate strategic plan. Work with other executives to prioritize security initiatives and spending based on appropriate risk management and/or financial methodology. Maintain relationships with local, state and federal law enforcement and other related government agencies. Oversee incident response planning as well as the investigation of security breaches, and assist with disciplinary and legal matters associated with such breaches as necessary. Work with outside consultants as appropriate for independent security audits. The CSO title is also used at some companies to describe the leader of the corporate security function, which includes the physical security and safety of employees, facilities and assets. Members of the Information Security Team assist the CISO with design, evaluation, implementation, and management of security programs for the organization. ii. Within your organizational chart, clearly identify the reporting structure for roles such as IT Security Compliaance Officer, Security Manager, CIO, CISO, IT Security Engineer, Privacy Security Professional, and IT Procurement Specialist. Chief Information Officer The Chief Information Officer (CIO) is accountable for directing the information and data integrity of the enterprise and its groups and for all Information Technology functions of the enterprise. This includes all data centers, technical service centers, production scheduling functions, help desks, communication networks (voice and data), computer program development, and computer systems operations. He or she is responsible for maintaining the integrity of all electronic and optical books and records of the enterprise. The CIO reviews all computerized and manual systems; information processing equipment and software for acquisition, storage and retrieval; and definition of the strategic direction of all information processing and communication systems and operations. He or she provides overall management and definition of all computer and communication activities within the enterprise including responsibility for providing a leadership role in the data to day operations of the Information Technology functions as well as providing direction as the enterprise grows through internal growth and external acquisition. The CIO interacts with the executive management team to monitor and validate the enterprise’s compliance with its security policies, which includes but is not limited to Sarbanes Oxley Section 404. In addition the CIO works closely with the Chief Security Officer of the enterprise Security Manager Under general supervision, directs information technology security program. This includes developing, implementing, and maturing of security on all hospital IT systems in order to centrally manage physical access, access to systems, educate users of individual responsibilities, and minimize the possibility of malicious access. Guidelines include all departmental, hospital, and personnel policies and procedures. The position requires a high level of technical knowledge in the area of network, server and workstation security. Assessment of risks, implementing security and changing the culture of the institution through training and education, coordinating closely with the Health Sciences Center on security issues, compliance and preparing and enforcing policies. The position reports to the CIO, but recognizing the network-wide nature of the responsibility, will frequently be involved with policy development and systems security Information Technology Security Compliance Officer (SCO) Are overall responsibility for a comprehensive security program that includes information security policies, compliance, and management. They also develop long-term security strategies and ensure that the company meets all mandated security standards and client needs. He or she will provide security-related vision, leadership, and strategy required for the company’s continued market place presence and success. They also assist in the responsible of developing and implementing a corporate culture of compliance and information security. They will maintain and reinforce this culture throughout the organization via employee training and motivation, so that the culture underpins all business decisions and choices made on a daily basis. The SCO reports to the Security Manager. Information Security Engineer Information security engineers ensure that an organizations data and sensitive digital information is kept safe from security breaches. Security engineers must always stay one step ahead of potential information security threats by making sure they are consistently informed of new technology and schemes used by hackers, as well as other types of cyber threats. The Information Security Engineer reports to the Security Manager. IT Procurement Administrator Specialist Directs the daily activities of the technology purchasing function. Reviews technology purchasing decisions, orders, and vendor contracts. Oversees the ordering of materials and supplies from vendors. Researches, interviews, and negotiates with suppliers to obtain prices and specifications. Creates purchase orders for the acquisition of materials and performs related administrative tasks.. Typically reports to CISO. iii. List the type of resources required to fulfill each forensic duty of the organization below each of the roles you identified. Management is responsible for supporting forensic capabilities, reviewing and approving forensic policy, and approving certain forensicactions. Legal advisors should carefully review all forensic policy and high-level guidelines and procedures, and they can provide additional guidance when needed to ensure that forensic actions are performed lawfully. The human resources department can provide assistance in dealing with employee relations and the handling of internal incidents. Auditors can help determine the economic impact of an incident, including the cost of forensic activity. Physical security staff can assist in gaining access to and physically securing evidence. Although these teams often do not play a prominent role in the forensic process, the services that these teams provide can be beneficial. iv. Align your organizational chart to reflect the Department of Homeland Security (DHS) EBK three areas of information security: physical security professional, privacy professional, and procurement professional. Provide comments and comparisions on how your organizational chart foster these values. The competencies in the physical security professional role assure the integrity and security of the physical elements of the system. The CISO and the Security Manager are responsible for these duties in the organizational chart I proposed for this assignment. The privacy professional duites are equally shared in my organization by the CISO and the Security Manager. The Information Secuirty Manager also has a part of these duties. All procurements are handled by the Procurement Department, who reports directly to the CISO. No procurements are ordered without going through a through review process. Part 2: Request for Proposal (RFP) Plan 2. Develop a RFP. Request for Proposal General Conditions Daniels Data INC is soliciting bids from qualified vendors for a Closed Circuit Television System for their Cloud Computer Faculty located in the Augusta, Richmond County Technology Park. The following request for proposal (RFP) is being provided to you for your consideration. To be considered, your company must meet the qualifications and satisfy the requirements set forth in this RFP. Bradford Daniels IT Manager Daniels Data Augusta, Ga. 30813 Final proposals must be received at the address noted above by 5:00 PM on Sunday, March 17, 2013. Although cost will be an important factor in awarding the contract, Daniels INC is not obligated by any statute or regulation to award the bid for the Closed Circuit Television Surveillance System on the basis of cost. Accordingly Daniels INC reserves the right to evaluate all proposals objectively and subjectively and to accept or reject any or all proposals or portion thereof. Additionally, Daniels INC reserves the right to negotiate changes in equipment with the company determined to have submitted the proposal that is in the best interest of Daniels INC.. It is to be understood that this RFP constitutes specifications only for the purpose of receiving proposals for services and does not constitute an agreement for those services. Withdrawal of Proposals Proposals shall remain valid for a period of thirty (30) days after submission. Modifications to proposals will not be accepted by the Daniels INC, except as may be mutually agreed upon following the acceptance of the proposal. Timetable RFP released: March 17, 2013 Deadline for receipt of bids: March 30, 2013 Recommendation to Library Board: March 30, 2013 Notification to all vendors as soon as possible after March 17, 2013 Requirements Bid specifications for the Closed Circuit Television System must match specifications on the bid sheet or be of equal specifications to be accepted. Please include all cost factors and a specific delivery time frame. Method of Evaluating Proposals After the bids have been evaluated, cost and other considerations will be evaluated. Once all factors have been evaluated, the Vendor that is the lowest responsive, responsible bidder will be selected for recommendation to the Library Board. Payment Final Payment to the successful bidder will be paid upon completion of delivery, installation of the product, and successful configuration and implementation of the equipment. a. Describe at least 2 perspectives that need to be closely monitored within the contract. Quality of the service rendered, and cost are the most important things that need to be monitored. Every action conducted by a Company has to make money. A substandard product could cause the investment to go over budget, which cost the company money and time. b. Give a perspective on at least 2 methods that can be used to evaluate and developed a qualified trusted supplier list. A qualified supplier will be added to a list of suppliers if they have demonstrated the abiltiy to deliver a product as specified with the minimum amount of potentila risk. A thorough background check on the supplier will also be conducted through research and surrveys with past clients Part 3 : Physical Security Plan 3. Recommend a physical security plan that could be used to protect sensitive areas such as telecom rooms, employee only areas, and manufacturing facilities in which you : a. Include at least three specific methods. This Security Plan constitutes the Standard Operating Procedures relating to physical, cyber, and procedural security for all Daniels Inc. facilities. It contains a comprehensive overview of the (Daniels INC)s security program, and in some sections, makes reference to other relevant plans and procedures. Security personnel, operators, and selected personnel shall be familiar with the information and procedures associated with this Security Plan. The (Daniels INC)s security systems include: 1. Fencing amp; Gates Fencing is the first layer of security at all of our Facilities, Transmission/Distribution points and (Daniels INC. ) facilities. The (Daniels INC) has standardized on 8-foot fencing, using tension wire in lieu of bars, placing fence barbs up, and securing the bottom of the fencing below grade.. All perimeters and access points are monitored 24/7 by CCTV or contracted security guards. 2. Exterior Lighting Exterior lighting has been strategically placed throughout Daniels INC to emphasize and highlight perimeters, gate and Guard Post access points, entry points into buildings, and areas of interest. Lighting can be activated by motion or photo-cell. Exterior lighting serves as a deterrent, as well as to aid in monitoring of the (Utility)s CCTV system. . CCTV Daniels INC has deployed over 100 CCTV cameras throughout the county. These cameras have Pan/Tilt/Zoom (PTZ) capabilities, and are strategically placed throughout the projects. Via our unique Fiber Optic infrastructure, these camera signals are sent back centrally to the (Daniels INC)s headquarters office where they are recorded 24/7. From this central point, Security ha s the ability to monitor and control all cameras. Daniels INC utilizes a comprehensive Electronic Access Control system, which has been installed throughout the projects and facilities. These card access points secure doors to buildings, access gates, and barrier arms. Through this technology, Security is able to effectively track and control access. Each employee and contractor is required to wear an identification/access badge which is individually tailored for specific access. Daniels INC has also installed a CIP-specific Electronic Access Control system which ensures restricted access to Critical Cyber Asset areas. These Electronic Access Control systems are monitored 24/7. 5. Intrusion alarms Intrusion alarms are utilized throughout the (Utility). These alarms serve two important functions: †¢ Provide 24/7 monitoring in remote locations where staff is not always present. †¢ Installed in all CIP-designated spaces. The alarm sensors include door/window contacts, motion detection, and glass break. These Intrusion alarm systems are monitored 24/7. Part 4: Enterprise Information Security Compliance Program 4. Establish an enterprise information security compliance program that addresses the concerns of the board of directors of the organization in which you: a. Describe specific plans and control objectives that could be adopted to address the known issues. There are seven steps chief information security officers can take to launch their organizations in the direction of InfoSec compliance, regardless of their available resources. †¢ Identify current or potential vulnerabilities. The acknowledgement of auditing agency findings and the CISOs own observations and records may be good resources. †¢ Apply objective values to issues requiring attention. Usually objective measurements coincide with cost. †¢ Establish a priority list. The cost of security hardware and software is ever-increasing, and the demands on most budgets are great—so choose carefully. Start complying. Any progress is progress! Without taking that first step, success can never be realized. Just get in the game. †¢ Create a comprehensive security, education and awareness program. This is the first line of defense for information assurance in business, government and military enterprises. Users are often eager to assist and comply when they know the rationale behind such efforts. Make them well aware of the threat. While CISOs may desire to keep successful or attempted attacks confidential, it may be important to share such information with users. Market success. Sell your security and compliance program to upper management by illustrating real dollar savings. Everyone loves a winner! Success will be rewarded with dollars to further enhance compliance. †¢ Always seek to increase budgets. Never miss an opportunity to ask for a budget increase to better safeguard information and enhance the companys bottom line. b. Suggest at least 3 information securities policies that could be developed and practiced within the organization for data security assurance. Gain a detailed understanding of the potential environmental risks (for example, viruses, hackers, and natural disasters). Making a proactive analysis of the consequences of and countermeasures to security breaches in relation to risks. Creating a carefully planned implementation strategy for integrating security measures into all aspects of an enterprise network, based on this understanding and analysis. c. Outline the steps you would take to define the security needs of the organization in duties, staffing, training, and processes. The essence of the process-oriented approach to security compliance is implementation of a comprehensive written security program that includes:  · Asset assessment – identifying the systems and information that need to be protected  · Risk assessment – conducting periodic assessments of the risks faced by the company  · Security measures – developing and implementing security measures designed to manage and control the specific risks identified  · Address third parties – overseeing third party service provider arrangements. Education – implementing security awareness training and education  · Monitoring and testing – to ensure that the program is properly implemented and effective  · Reviewing and adjusting – to revise the program in light of ongoing changes. Part 5: Risk Management Plan 5. Develop a risk management plan in which you: a. Describe at least 3 possible risk management efforts that could be used to assess thre ats and unknown issues. b. Determine why defining priorities is an important part of the process when enumerating and having efficient risk control measures. c. Suggest specific technical and management controls that can be enacted in order to monitor risks accurately. The benefits of risk management in projects are huge. You can gain a lot of money if you deal with uncertain project events in a proactive manner. The result will be that you minimize the impact of project threats and seize the opportunities that occur. This allows you to deliver your project on time, on budget and with the quality results your project sponsor demands. Make Risk Management Part of Your Project The first rule is essential to the success of project risk management. If you dont truly embed risk management in your project, you cannot reap the full benefits of this approach. You can encounter a number of faulty approaches in companies. Some projects use no approach whatsoever to risk management. Identify Risks Early in Your Project The first step in project risk management is to identify the risks that are present in your project. This requires an open mind set that focuses on future scenarios that may occur. Two main sources exist to identify risks, people and paper. People are your team members that each bring along their personal experiences and expertise. Paper is a different story. Projects tend to generate a significant number of (electronic) documents that contain project risks. They may not always have that name, but someone who reads carefully (between the lines) will find them. The project plan, business case and resource planning are good starters. Other categories are old project plans, your company Intranet and specialized websites. Communicate About Risks Failed projects show that project managers in such projects were frequently unaware of the big hammer that was about to hit them. The frightening finding was that frequently someone of the project organization actually did see that hammer, but didnt inform the project manager of its existence. If you dont want this to happen in your project, you better pay attention to risk communication. A good approach is to consistently include risk communication in the tasks you carry out. If you have a team meeting, make project risks part of the default agenda (and not the final item on the list! ). This shows risks are important to the project manager and gives team members a natural moment to discuss them and report new ones. Consider Both Threats and Opportunities Project risks have a negative connotation: they are the bad guys that can harm your project. However modern risk approaches also focus on positive risks, the project opportunities. These are the uncertain events that beneficial to your project and organization. These good guys make your project faster, better and more profitable. Unfortunately, lots of project teams struggle to cross the finish line, being overloaded with work that needs to be done quickly. Make sure you create some time to deal with the opportunities in your project, even if it is only half an hour. Chances are that you see a couple of opportunities with a high pay-off that dont require a big investment in time or resources. Clarify Ownership Issues Some project managers think they are done once they have created a list with risks. However this is only a starting point. The next step is to make clear who is responsible for what risk! Someone has to feel the heat if a risk is not taken care of properly. The trick is simple: assign a risk owner for each risk that you have found. The risk owner is the person in your team that has the responsibility to optimize this risk for the project. The effects are really positive. At first people usually feel uncomfortable that they are actually responsible for certain risks, but as time passes they will act and carry out tasks to decrease threats and enhance opportunities. Priorities Risks Some risks have a higher impact than others. Therefore, you better spend your time on the risks that can cause the biggest losses and gains. Check if you have any showstoppers in your project that could derail your project. If so, these are your number 1 priority. Analyze Risks Understanding the nature of a risk is a precondition for a good response. Therefore take some time to have a closer look at individual risks and dont jump to conclusions without knowing what a risk is about. Risk analysis occurs at different levels. If you want to understand a risk at an individual level it is most fruitful to think about the effects that it has and the causes that can make it happen. The information you gather in a risk analysis will provide valuable insights in your project and the necessary input to find effective responses to optimize the risks. Plan and Implement Risk Responses Implementing a risk response is the activity that actually adds value to your project. You prevent a threat occurring or minimize negative effects. Execution is the key here. The other rules have helped you to map, prioritize and understand risks. This will help you to make a sound risk response plan that focuses on the big wins. If you deal with threats you basically have three options, risk avoidance, risk minimization and risk acceptance. Avoiding risks means you organize your project in such a way that you dont encounter a risk anymore. This could mean changing supplier or adopting a different technology or, if you deal with a fatal risk, terminating a project. Spending more money on a doomed project is a bad investment. The biggest categories of responses are the ones to minimize risks. You can try to prevent a risk occurring by influencing the causes or decreasing the negative effects that could result. If you have carried out (risk analysis) you will have plenty of opportunities to influence it. A final response is to accept a risk. This is a good choice if the effects on the project are minimal or the possibilities to influence it prove to be very difficult, time consuming or relatively expensive. Just make sure that it is a conscious choice to accept a certain risk. Register Project Risks This rule is about bookkeeping (however dont stop reading). Maintaining a risk log enables you to view progress and make sure that you wont forget a risk or two. It is also a perfect communication tool that informs your team members and stakeholders what is going on. Track Risks and Associated Tasks The risk register you have created will help you to track risks and their associated tasks. Tracking tasks is a day-to-day job for each project manager. Integrating risk tasks into that daily routine is the easiest solution. Risk tasks may be carried out to identify or analyses risks or to generate, select and implement responses. Tracking risks differs from tracking tasks. It focuses on the current situation of risks. Which risks are more likely to happen? Has the relative importance of risks changed? Answering these questions will help to pay attention to the risks that matter most for your project value. References Shoemaker. amp; Conklin A. (2012) Cyber security The Essential Body of Knowledge Boston MA Course Technology Press Risk Assessment Risk Management Guide- Computer Security Retrieved from http://www. csrc. nist. gov Request for Proposal (RFP) Information Technology IT Strategic Plan Retrieved from http:// www ebid. board. com