logo

Corporate Governance and Ethics: Cybersecurity Policy of the Company

   

Added on  2023-04-23

14 Pages2981 Words443 Views
Running Head: Business Law 0
Corporate Governance and Ethics
1/22/2019
Student’s Name

Corporate Governance and Ethics
1
Contents
Report..............................................................................................................................................2
Cyber Security.................................................................................................................................3
Background 3
The requirement of Cyber Security 3
Cyber Resilience..............................................................................................................................4
Responsibility of Management........................................................................................................4
Methods of cybersecurity................................................................................................................5
Recommendations............................................................................................................................7
Conclusion.......................................................................................................................................9
References......................................................................................................................................11

Corporate Governance and Ethics
2
Report
To
Chairperson
Board of Directors
From: Jane White, Corporate Governance Consultant
Date: 22 January 2019
Subject: Cybersecurity policy of the company
In the world full of technology, every organization is diverting it is focused on the use of
technology. The reason behind the same is the infinite advantages that technology adds to the
overall value of the company. The use of the internet and other technological innovations makes
the working of the companies easy and smooth (Kumar, 2017). These techniques are more often
cost-effective and allow an organization to make an uninterrupted inflow and outflow of the
organizational information. Now, these days, for a business it is very easy and comfortable to
access the market. Almost every area of functioning such as sale, purchase, accounting, logistics
management demand specific attention of the management and in such a situation it is the
technology only which reduces the burden of the management. Nevertheless, another side of the
coin is also necessary to review. These technologies prove a danger for the business sometimes
when someone not uses the same effectively. Along with the advantages of the use of such
technologies and networks, certain liability also comes across. In such a situation, it becomes the

Corporate Governance and Ethics
3
responsibility of the managers to use such advancements in a logical way keeping the
confidentiality and integrity (Snedaker, 2007). The report presented hereby is focused on the
significance of the security feature with respect to the use of the network, internet, and other
technologies in the organization. Further, in conjunction to this, the best practices and methods
of data and cybersecurity will also be featured in the subjective report and at last the set of
recommendations will be provided to the board of directors of the company in order to develop
cybersecurity in the organization.
Cyber Security
Background
Cybersecurity can be understood as the protection of data, networks and computer system from
digital attacks (Cisco.com, 2018). In order to avoid the unauthorized access of terrorist,
cybercriminals, or any other outsider, cybersecurity protects the data and digital equipment. The
concept of cybersecurity is not just significant and crucial from the perspectives of individuals
but the same is crucial for business entities as well. Many harms are identified that can be there
at a place in the absence of proper cybersecurity. These harms and dangers include financial
frauds, production of child pornography, manipulation of data, taking over the control of the
system and so on (De Bruijn and Janssen, 2017).
The requirement of Cyber Security
In today’s time, organizations are used to manage almost every task with the help of machines
and technology such as the internet, networks, and computers. Failure in any one or more than
one can lead to great issues. All the business data can be stolen by just one click and businesses

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Corporate Governance and Cyber Resilience: Recommendations for Board of Directors
|14
|3086
|120

Best Practices for Cyber Resilience in Corporate Governance
|15
|3336
|471

Cyber Security and Cyber Resilience: A Board of Directors' Guide
|9
|2583
|350

Cyber Security Solved Assignment
|9
|2400
|110

Cyber Security in Corporate Governance: Ways to Improve Cyber Resilience and Integration with Cyber Security
|12
|3215
|375

Legal and Ethical Issues in Cybersecurity
|18
|4538
|174