Managing Information Resources: Ensuring Data Security
|
|
ICMR HOME | Case Studies Collection
Case Details:
Case Code : ITSY057
Case Length : 13 Pages
Period : 2002-2007
Pub Date : 2007
Teaching Note :Not Available Organization : -
Industry : Miscellaneous
Countries : Global
To download Managing Information Resources: Ensuring Data Security case study
(Case Code: ITSY057) click on the button below, and select the case from the list of available cases:
Price: For delivery in electronic format: Rs. 300;
For delivery through courier (within India): Rs. 300 + Shipping & Handling Charges extra » IT & Systems Case Studies Collection
» IT and Systems Short Case Studies
» View Detailed Pricing Info » How To Order This Case » Business Case Studies » Case Studies by Area
» Case Studies by Industry
» Case Studies by Company
Please note:
This case study was compiled from published sources, and is intended to be used as a basis for class discussion. It is not intended to illustrate either effective or ineffective handling of a management situation. Nor is it a primary information source.
Chat with us
Please leave your feedback
|
<< Previous
Is Your Employee Slurping Data? Contd...
Pod slurping was one of the new ways by which data could be stolen and used for various illegal means. From industrial espionage to corporate thefts and from identity thefts to hacking the data online, information security posed immense challenges even to the law enforcing agencies. For instance, identity theft was considered one of the fastest-growing crimes in the US, with over nine million victims in 2003 and 2004. In addition to malicious intent, employees engaged in pod slurping due to curiosity, or in their effort to be more productive by taking work home. Even under such circumstances, there was the added threat of some viruses or malware getting uploaded in the company’s network without their knowledge.
|
|
The companies, which mainly used perimeter solutions like anti-virus software and firewalls to protect their networks, found it increasingly difficult to deal with this new menace. Organizations were waking up to this new and dangerous threat to their data security. But addressing this threat posed significant challenges to them.
|
Data theft also posed a HR dilemma to the HR managers as it became difficult to prevent employees from bringing these portable devices in to the place of work. For instance, banning popular gadgets such as iPods could alienate the employees, while it was practically impossible to put a blanket ban on portable storage devices as they were useful. Experts felt that the issue had to be handled with kid gloves as too much monitoring or high-handedness on the organization’s part might hurt the morale of the employees, breed disloyalty, and lower productivity. |
Though some experts dismissed the threat posed by pod slurping as mere hype, it did not stop many organizations from initiating steps to mitigate the potential risks. While some companies took drastic steps like banning electronic devices in the workplace, others opted for strong policies regarding the use of such devices in the organization. Still others tried out the various new IT solutions arriving in the market to address the threat posed by portable IT devices to data security. However, experts felt that problems such as these would only become compounded in the future with the further advancements in the portable devices and with these devices getting wireless capabilities. They expected a huge increase in the money spent by organizations in the future to ensure data security, particularly as safeguarding sensitive data had become a legal and ethical responsibility.
Advancement in technology brings with it convenience as well as new challenges. The challenges posed by the technologically advanced portable IT devices led organizations to the realization that they had to do a rethink on their data security system. They began to realize that physical security, too, was important for the safety of the data. Ignoring such threats was clearly not part of the solution, experts said.
Excerpts
>>
|
|