In today's digital world, technology makes it extremely easy for identity theft to occur. The Federal Trade Commission estimates that about 9 million Americans are victims of identity theft annually here in the U.S. This is because a thief only needs a few important pieces of one's personal information, and from there, they can easily steal his/her identity. Since identity theft is so rampant these days, we are making sure to protect the privacy of our customers with various company regulations and measures.
Some of the approaches that we are looking to take include educating sales associates about keeping customer information confidential and requiring them to sign a document claiming that private customer information obtained through a transaction must remain confidential at all times. This means that no associate should access personal customer information for anything outside the range of his/her job. We will also be selling our products directly online to consumers and to ensure privacy on the web, we will be utilizing a very secure server with a fire-wall to prevent fraudulent activity. We will be using PayPal to facilitate electronic transactions and make sure that there will be frequent screenings to report any suspicious activity. In addition to our customers, all employee files containing their personal information must also remain confidential. To do this, we will be changing the password to the appropriate file containing this data very frequently.
All files containing personal data will be updated or deleted every 6 months depending on the status of the customer or employee. This will help to ensure that unnecessary information is not out there for hackers to have access to. Also, we will be defragmenting our hard drives once every 2 weeks to keep our files as organized as possible, which is a crucial step in maintaining privacy standards. The implementation of our policy will include disposing of old and unnecessary hard drives in the proper manner. For us, this means purchasing a shredder and shredding our drives once we are done with them. Our company believes in maintaining a high level of consumer confidence and trust in our brand, therefore, we will make sure to do everything we can to carry out that vision.
Nice job incorporating content from lecture. With regards to the use of computer forensics, if is generally used retroactively -- after a crime has been committed. The computer forensics obtained are used to identify how something was done and when.
ReplyDeleteWith regards to your iPod idea, it's not entirely clear as to why computer forensics are such a critical consideration. Perhaps if malware was installed on the iPod forensics work would be needed...