Computer Data Security: A Case Study of Amazon's Policies

Verified

Added on  2022/09/18

|5
|836
|18
Report
AI Summary
This report provides an overview of Amazon's computer data security practices, focusing on policies related to business use, content ownership, and privacy. It examines how Amazon handles collected information to enhance customer experience, manage orders, and maintain account details. The report outlines Amazon's restrictions on employee computer use, emphasizing the private nature of stored data and the importance of content ownership to prevent trademark violations. It further discusses Amazon's acceptable use policy, which sets guidelines for technology use, including email and internet access, to maintain productivity and efficiency. The report also details the security policies regarding email use for business purposes only, confidentiality of information, and the prohibition of personal business conducted on the organization's systems. Violations of these policies can result in disciplinary actions, including termination. References from various sources are included to support the analysis.
Document Page
Running head: COMPUTER DATA SECURITY
COMPUTER DATA SECURITY
Name of the Student
Name of the University
Author Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1COMPUTER DATA SECURITY
Table of Contents
Business use only.............................................................................................................................2
Content Ownership..........................................................................................................................2
Privacy.............................................................................................................................................2
Reasonable Private Use...................................................................................................................3
Security Policy.................................................................................................................................3
References........................................................................................................................................4
Document Page
2COMPUTER DATA SECURITY
Amazon is known to care for all the information which is shared and used. The
organization even appreciates the trust in doing so carefully and sensibly (Kristensen et al.,
2017). At the time of visiting the website, an individual accepts all the practices in the notice.
Business use only
The information collected by Amazon help in personalizing and continuous
improvement of shopping experience. The data is merely used for assisting the seller in handling
orders and providing the required product and services. It helps in updated all the required
records and maintains account details (Althafairi et al., 2019). In Amazon, the policy prohibits
the employee from creating anything on the computer. All the data stored in the system is
completely private in nature, and these data merely belongs to the organization only.
Content Ownership
Amazon is focused on providing its customers with a range of goods which builds up the
amazing customer experience. Amazon instructs the seller to mark the content of their selling
goods on the list (King et al., 2018). This will help in preventing any violation of trademark.
Seller will not end up in selling privileges and even face some legal effects.
Privacy
Amazon comes up with an acceptable use policy which has been written in a document
which sets up practices and restriction regarding the use of organization technology. This merely
describes what employee can do and cannot do at the time of using the corporate system, website
and networks (Van Deursen & Helsper, 2018). Email and internet use can keep Amazon much
productive and efficient. There is a wide variety of reasons, behind the implementation of this
Document Page
3COMPUTER DATA SECURITY
kind of policy in Amazon. It provides the organization recourse in the event when the employee
violates the policy. It ultimately has a negative impact on productivity.
Reasonable Private Use
Effective internet and email policy which helps the organization what can be expected
from them. It merely focuses on device use for work and what may be expected for employers
and employees (Kristensen et al., 2017). Software or website on the existing network, it merely
focuses on consultation with IT department for explaining what returns are expected to be
received from the product.
All the reasonable request are not considered to be a part of network risk. The main
focus of this policy is not restricting the access of employees to products. Instead, this will make
an individual much more productive (Althafairi et al., 2019). The mere focus is all about
reducing various kind of risk with the organization.
Security Policy
In Amazon, email is to be used for business use only. Confidentiality of information in
Amazon should not be shared out the organization without any kind of authorization. Employees
are not allowed to conduct any kind of personal business by making use of organization system
or email (King et al., 2018). The point should be noted forwarding any non-business email to
friends, family and associates result in a waste of organization time and attention.
Any content which discriminates against the earlier mentioned classification is wholly
prohibited. Any employee of Amazon sending an email by violating the policy will be dealt with
by harassment policy (Van Deursen & Helsper, 2018). It can even lead to termination of the
employee.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4COMPUTER DATA SECURITY
References
Althafairi, B., Alhoumaida, N., Saxena, M., & Almsri, Z. (2019). Case study-
AMAZON. Journal of the community development in Asia, 2(2).
King, D. L., Delfabbro, P. H., Doh, Y. Y., Wu, A. M., Kuss, D. J., Pallesen, S., ... & Sakuma, H.
(2018). Policy and prevention approach for disordered and hazardous gaming and
Internet use: An international perspective. Prevention Science, 19(2), 233-249.
Kristensen, M., Penner, J., Nguyen, A., Moy, J., & Lam, S. (2017). Company Synopsis for:
Amazon. com, Inc.
Van Deursen, A. J., & Helsper, E. J. (2018). Collateral benefits of Internet use: Explaining the
diverse outcomes of engaging with the Internet. new media & society, 20(7), 2333-2351.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]