Evaluation of the Business Value of Security and Control

Managing Information System

Evaluation of the Business Value of Security and Control

Security and control are vital aspects to a company in terms of information system investment. Serious implications are likely to arise when computer systems are down for an extended period. With high dependency on the internet and networking facilities, companies are at a high risk to get interruption and destruction. Company systems are used to keep vital data about individual taxes, assets and job performance assessment (Intranet, n.d.). They are composed of data on company transactions, product advancement and marking plans. The absence of security and control may bring about severe legal issues.

Enterprises have to safeguard their data while similarly look out for data related to the staff, clients and business associates. In the United States, policies are put in place so as to safeguard data from misuse, exposure and illegal access. This are composed of;

  • The Health Insurance Portability and Accountability Act (HIPAA) ratified in 1996 a needed the healthcare staff to keep patient details for 6 years and accord privacy to them.
  • There is also the Gramm-Leach-Bliley Act that needs financial firms to make sure that security and privacy of client details is upheld.
  • The Sarbanes-Oxley Act looks to put in place accountabilities to organizations and their management so as to apply internal management methods to protect the precision and reliability of the financial details.

Companies undergo new legal duties for electronic control of the data and document retention in addition to privacy. A lot of the evidence at present that is misused; fraud, internet crime and cash misuse are normally in in digital form. Legal cases presently depend on proof that is brought forth in computer data format which are easy to shift using disks, email and messenger. Email is presently the most used.

An operative electronic document retention policy makes sure that the documents stored in email or disks are arranged properly, easy to access and not kept for a long or done away with too early (Intranet, n.d.). On the other hand, computer forensic is the art of acquiring, assessing, verifying and keeping information or accessing from computer storage facility, it is here that the detail can be used as evidence. The evidence can be kept in the computer and may not be seen by a normal user who may lack the skills needed to access the data stored. Expert users with a wide range of skills and may have authorized access to such information are only permitted to access this data.

Analysis of How the Internet Changes Consumer and Supplier Relationships

The coming into being of the internet has greatly changed the formerly renowned association that existed between the clients and the producer. Of great consideration is the tendency by the middle person to be done away with. The client there initially had no choice to choose from, they had to use the physical store and buy goods that a store had as opposed to going to the supplier that probably has gotten it from another place. This relationship has brought about high cost since every person has to get profit with the client paying the bill.

The internet has offered the client more control where they are able to pick freely and select suppliers as well as easily get review and price evaluation (Ronchi, 2003). This has apparently taken over from spreading information using the word of mouth that initially attracted emerging clients.

The internet has highly grown to be a catalyst for a number of businesses to fast rising from meager origins. The several marketing efforts that have been applied on the internet are able to acquire greater things making it possible for small businesses to acquire goods to be sold in mass market.

A great number of most renowned businesses have acquired the internet and e-commerce tendencies they are able to offer. With a good number of set up stores being noticeable over the internet just as in the streets, they make sure that thy meet the needs of the e-sawy upcoming crop of clients in addition to the more ancient client who still desires the personal aspect and physical being of the shopping.

With a number of options to choose from and more efficient access is acquired from bigger price rivalry and hence the internet has been more useful and vital in the bringing down of prices and hindered any cartel tendency from several retailers (Ronchi, 2003). It is evidently vivid that the middle person has undergone extreme misery with the increase of the internet, while a good section of the commercial firms that vary with time has benefited just like the client with added income and client base e-commerce that is available.

The internet has gone on to improve the business, making work be easier and efficient. With the continued rise in technology in the world, it is foreseeable that it is bound to bring about more success and profit for the commercial hubs. More however needs to be done so as to ensure that this revenue acquired does not hurt the clients or the suppliers as well as the distributors in the several industries.

 

 

 

 

 

Bibliography

Intranet, n.d. Section 8.2: Bullet Text Study Guide. Acquired from             http://intranet.ibat.ie/moodle/course/is_management/mis10e/ch8/chpt8-2bullettext.htm

Ronchi, S. 2003. The Internet and the Customer-Supplier Relationship. Ashgate Publishing, Ltd:      Burlington.

 

Latest Assignments