1INFORMATION SECURITY MANAGEMENT Table of Contents Introduction......................................................................................................................................2 Discussion........................................................................................................................................2 Legal Issues with respect to mishandling of Information by Data Analyst of OZ Dispatch.......2 Ethics in InfoSec which is followed by delivery Staff of OZ dispatch.......................................3 Measures that should be taken for unethical handling of information........................................3 Components of InfoSec program of OZ dispatch........................................................................3 Aspects of InfoSec Standard that needs to be followed by sub-contractor of OZ dispatch........4 Conclusion.......................................................................................................................................4 References........................................................................................................................................6
2INFORMATION SECURITY MANAGEMENT Introduction OZ dispatch, is a well-known home delivery plan of service that operates its business from NSW (New South Wales), Australia. The main focus of this particular organisation is all about design and development of networks in OZ dispatch. In the Parramatta office branch of OZ dispatch, a range of higher authorities will be present like managing director, data analyst, sales and marketing and lastly accountant. It is the duty of data analyst to deal with huge volume of data of range of person like customer and information of products. In the coming pages of the report, a list of legal issues has been discussed with respect to any kind of mishandling of information by data analyst by OZ dispatch. An analysis has been done with respect to ethics in InfoSec due to delivery staff of OZ dispatch. Discussion Legal Issues with respect to mishandling of Information by Data Analyst of OZ Dispatch The biggest ethical issues in OZ dispatch is due to data and information protection. OZ dispatch aim to sell items by the help of web that mainly collects data of the customer like credit card information or bank account details (Safa, Von Solms and Furnell 2016). There are large number of issues encountered by Data Analyst of OZ dispatch like Ownership of Data. Open Data and Public Domain Licensing database Copyright Infringement Breach of Security
3INFORMATION SECURITY MANAGEMENT Ethics in InfoSec which is followed by delivery Staff of OZ dispatch Ethic can be stated as a branch of philosophy that requires defining and recommendation of right components and any wrong conduct (Peltier 2016). Ethical concern in the domain of computing is widely known. Information Security profession are looking for taking into account oftheirownethicalconsideration(Bansal,HodorffandMarshall2016).Communityof information security has come up with best practices which is needed for tackling any kind of vulnerabilities. The main focus of weaponized vulnerabilities of attack is all about making suggestion of increase in overall adaptation for end to end encryption (Soomro, Shah and Ahmed 2016). It is mainly needed by wide range of messaging application that requires to be successful. Measures that should be taken for unethical handling of information Unethical use of information can damage the whole working environment of OZ dispatch (Flowerday and Tuyikeze 2016). For tackling the issue, a list of step should be taken like Creation of code of conduct. Leading by example. Reinforce the consequences by taking account the ethical behaviour. Appreciation of employees. Creation of check and balance Hiring for Values. Components of InfoSec program of OZ dispatch For achieving strategical and operation goal, a large number of keys components are taking into consideration like Emphasizing the information security program as a whole.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4INFORMATION SECURITY MANAGEMENT Alignment of security program with mission and objectives of OZ dispatch. Implementing meaningful and suitable security policies and procedure. Development of a security management program. Focusing on in-depth measures Establishment of culture for the security. Analysingtheinformationsecurityprogramwhichisdevelopedbythehelpof meaningful metrics (Safa et al. 2015). Developing incident response plan. Aspects of InfoSec Standard that needs to be followed by sub-contractor of OZ dispatch The sub-contractor at OZ dispatch need to focus on various aspects of InfoSec for variety of reason like Establishing a general approach which is needed for information security. For detection and forestall of any kind of compromising with respect to information security like misuse of data and computers. This particular policy focus on protecting the overall reputation with respect to legal responsibilities (Bansal, Hodorff and Marshall 2016). Focusing on the rights of the customer. Conclusion From the above pages it can be concluded that this report is all about OZ dispatch, a home delivery service plan that operates in NSW, Australia. In the report, a suitable information security management plan has been discussed for OZ dispatch. In this organization, the data analysts need to deal with huge volume of data of customer and product. Delivery Staff of OZ
5INFORMATION SECURITY MANAGEMENT dispatch mainly focus on collecting order item for the suppliers and will bring 20 collection and distribution centres. As soon as the order of the customer is prepared, a delivery staff near to CDC will be prompted by the system. It is the sole responsibility of delivery staff members to look for item of customer from suppliers and bring them to various distribution centre in NWS.
6INFORMATION SECURITY MANAGEMENT References Bansal, G., Hodorff, K. and Marshall, K., 2016. Moral beliefs and organizational information security policy compliance: The role of gender.Proceedings of the Eleventh Midwest United States Association for Information Systems, pp.1-6. Flowerday,S.V.andTuyikeze,T.,2016.Informationsecuritypolicydevelopmentand implementation: The what, how and who.computers & security,61, pp.169-183. Peltier, T.R., 2016.Information Security Policies, Procedures, and Standards: guidelines for effective information security management. Auerbach Publications. Safa, N.S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N.A. and Herawan, T., 2015. Informationsecurityconsciouscarebehaviourformationinorganizations.Computers& Security,53, pp.65-78. Safa, N.S., Von Solms, R. and Furnell, S., 2016. Information security policy compliance model in organizations.Computers & Security,56, pp.70-82. Soomro, Z.A., Shah, M.H. and Ahmed, J., 2016. Information security management needs more holistic approach: A literature review.International Journal of Information Management,36(2), pp.215-225.