Critique Potential Violations Using Information TechnologyWith the rapid advancement and adoption of technology in all areas of business, it is critical for you as a future business leader to understand how unethical actions occur and what you can do to mitigate future risk.
Assume you have been hired as a consultant in the IT Department at Northcentral University. One of the University’s current goals is to minimize security threats and prevent breaches. To accomplish this, you have been asked to research last year’s “major hacks” to understand technology, information security measures, and issues in security management. You must present your findings to the IT supervisor before the supervisor’s meeting with senior leadership. Prepare meeting notes for the IT supervisor that include the following:
- Select one major incident to research regarding technological breaches. Identify the company that was affected and then describe this incident and why you selected it.
- Explain the implications associated with this breach, specifically in terms of privacy laws and violations of the law.
- Analyze the impact that these technological breaches have on consumer safety and well-being.
- Recommend further actions to protect the privacy of clients.