Importance of fabricating information management policies


Ethics are benchmarks and principals that tutorials the people's behavior. Whatever is moral to one might not exactly be ethical to another.

Business dilemma

After reading this letter I'd first of all call miss Fernandez and consult with her about the contents of the letter and take her judgment. I'll try to find out if the letter is actually compiled by her or if it is merely a predicament that the employees are creating and/or looking to affect her reputation. Upon doing that I am going to have a action that may be justified to ensure that both the employees are satisfied. If miss Fernandez has actually written the letter then I will ask her to apologies with the other employees and /or pay a charges thereafter. In order that these kinds of behavior do not arise in future. I'll take action that will sign to employees that these kind of unethical patterns is not accepted and can cost a lot to them if it occurs again in future. If these actions are repeated more tough penalties will be placed.

Making business decision 1

In this situation, I would first check if there is ever any contract made out of customers that their personal information can be utilized for future marketing. I'll require Mr. Brawer, that I will not sell the information to him, but if he agrees to pay me I am going to advise all my customers ( by emails, word of mouth etc)who are enthusiastic about music about his new shop, I'll also give my customers his (Mr Brawner's) contact and everything interested customers can contact him. If Mr Brawner will not agree and still wants the info about the customers then I'll sell the information provided there is no such agreement made out of the clients about selling their personal information.

Making business decision 2

Net neutrality is the guiding rule that preserver the free and open internet. Because of net neutrality internet has driven economic inventions, it defends consumers to use any equipment, request or services without interference from network specialist.


- World wide web neutrality is helpful since it'll give the cafe competitive advantage over other cafes in the market. Competition will ensure better quality products being produced.


- Internet security is the major concern.


Apply your knowledge.

There are wide selection of employees at the Broadway cafe. So it is important to create a good marriage with all employees. There's a need to create a sense of trust among employees. To be able to protect the data '(recipe's), constraints should be located after who accesses what type of data. We have to not allow any worker to access any data they need. Restrictions should be positioned data access. Sensitive data must b be accessed only by preferred employees, who can take the responsibility of data security. All valuable data must be guaranteed in conditions of username and passwords'.


Data is the most effective property of any corporation. Data is employed (altered) to generate information and knowledge. And by using these information and knowledge important business decisions is made. So data is the main asset for just about any decision making. Therefore, Broadway cafe must follow proper data and information management policies to protect this valuable asset. The management plans that are crucial are having backups for everyone data and information, to reduce hazards. Data must be secured to prevent unauthorized use or to prevent misuse of all information.


Information security is a wide term encompassing the protection of information from unintentional or intentional misuse by inside or outside a business.

In order, to comprehend why information security is important it is essential to understand the worthiness of information to a company. Information is the most effective asset in virtually any organization, and it needs to be anchored from theft, fraudulence, misuse and disease, worms etc.


Yes I do agree, it isn't wise to use for the employees to use the business enterprise computer for their personal use, because when they use the business computer to gain access to their e- mails there's a dangers that e-mails may contain pathogen, spam that will infect the business computer where valuable information is stored.

Moreover, it is vital to place limitations on who are able to access the company e- mails, it can become very dangerous if employees misuse the mails, or get access to confidential information. But this limitation may lead employees have a rebellious frame of mind, given that they may feel they are not trusted or they don't have independence and are bounded be limitations.

To some degree, employees should be permitted to use company telephones and e-mails, however they needs some control over it, so that future problems donot arise.


What is id theft?

Identity theft is a criminal activity when someone's personal information is stolen such as PIN quantity, security amount for unlawful activity with no ones concern. Id theft is a growing crime in the current technological world.

The ways to prevent identity fraud

˜ It is very important for us to check on and verify our financial information. Must check for the articles of the our standard bank statements, and reconcile with business financial information. Should check for all the withdrawals (debits) that are made from the account. In this way we will be in a position to tract all the withdraws made even it is important to tract all the lender charges being made. Make sure that you are receiving your credit-based card and bank account statements each month. Carelessness in checking out for these requirements will lead to large and unexpected losses in future.

˜ Be aware of all the unwanted calls and text messages, emails, there can be calls or text messages coming even the email messages providing you an opportunity to win large sums of money, and requires your personal information such as bank-account number, mastercard quantity etc.

˜ It is vital for the business enterprise to be aware of what is personal information theft and how is it carried out, so that we have the ability to protect valuable private information so that this type of crimes are prevented.

˜ Should always have backup programs, on what has to be done when this type of criminal offense is recognized.

Making business decision II

How would a biometric repayment system help protect the cafe and its customers?

Protecting customers personality is an evergrowing matter of the Broadway cafe. Biometric repayment system is going to help the Broadway cafe and its customers by providing enhanced protection against scam and identity fraud. Biometric system such as fingerprints, are better than other means of authentication, including PIN volumes, or signatures. People can forge signatures, passwords and PIN amounts can be easily be found out and used by others. But, fingerprints and other physical means of security are difficult to forge, as it provides the most effective means of cover. The biometric repayment system would protect the cafe by spending charge by those who commit scam and make customers feel that their id and other private information is protected. It creates customers feel safe while in cafe, since their private information is stored in cafe computers not in the notepads that can certainly fall in wrong hands. Generally, Biometric system provides a safe environment for both cafe and customers.

What advantages could the cafe gain by applying a biometric repayment system?

Biometric repayment system provides increased protection against fraudulence. Biometrics for example fingerprints, voice is more secured than other means of protection, since PIN cumbers and signatures can be easily forged.

Biometric repayments system provides both business and customers coverage. Customers wouldn't normally need to transport cash, inspections or credit cards. Customers can make their purchase with the touch of finger, making purchasing convenient.

Biometric repayment system is a faster method of handling then using cash or bank cards. Its faster than traditional means of repayment. it is more timely and convenient.

Biometric payment system has lower purchase processing cost, because credit and debit credit cards processing fees is increasing. This cutting down is passed on to consumers thus customers will choose our cafe.

The quality recipes that are stored in grandfathers storage can be safely stored in computer because the computers are protected and only approved personals can get access to it, and can allow future era to access these meals. All data and information can be supported.

What are the issues and concerns can you have if you opt to deploy the biometric repayments system?

Implementing this advanced technology can be quite risky, and can rise a great deal concerns. In the event the implementation and use of the system is too confusing or frustrating then customers may weary to even signup to work with the program.

Fingerprints have law enforcement issues. Consumers may fear that their finger marks can be made available to police or government businesses.


The Broadway cafe, would carry in a databases with a numerical representation of fingerprint, not actual fingerprints, this will allow us to discard fingerprints minimizing consumer dread. Once customers become more comfortable with this technique of protection it will become valuable for both the cafe and customers.


The advantages of antivirus safeguard.

˜ Setting up antivirus is easy and it prevents virus and other types of malware from harming your personal computer or network.

˜ Prevents downtime that is valuable working time could be wasted if you fail to access your personal computer credited to a pathogen infection.

˜ Protects valuable home elevators PC.

˜ Prevents others from accessing business information, whether its business or personal data.

˜ Prevents time consuming and unnecessary job of cleaning or eliminating virus after damage has been done.

˜ Reduces financial implication, getting the technical support required to achieve removal of computer virus and to reestablish your lost information.

(http://www. ehow. com/facts_5004286_what-benefits-antivirus-protection. html#ixzz1MHSsKY1p)


A firewall is a tool designed to enable or refuse network deals, it helps to protect the networks from unauthorized gain access to or use.

Firewall helps to

˜ Control access to site systems.

˜ It enhances privacy.

˜ Using firewall some sites can be blocked. firewall is less costly for company because most software and other security software can be on the firewall. priti


Business Problem

Yes, I am going to add this sensor technology in the cafe, but before employing any new technology issues and concerns needs to be dealt with. The concerns with the use of senor technology is the level of privacy concern, that is will the sensor reveal the private information about the client, can the sensor uniquely identify or easily track which cup requires a refill, and what can be done to improve the level of privacy issues.

Other sensor devices that can help the cafe

˜ Radio regularity id device (RFID)

RFID is a technology that keep track of and trace application at a low cost, standardized, cordless communication and sensing. RFID can be placed outside the caffeine mug which will detect whether the mug desire a fill up or its full. RFID is a low cost sensing technology.

The concerns of RFID is the privacy issues, is the data gathered from RFID safeguarded, or limited by only certified users. Security is also a crucial matter that is everything accumulated by RFID readers secured.

˜ Fleck detectors which can collect data like location and temperature of the coffee mugs, they form a mesh network, and communicated through radio waves. Again with this product concerns such as privateness issues and security comes in. moreover, the matter of whether the device is environmentally friendly also becomes a problem.

There is not any particular law till now while deploying this cordless technology, but there should be laws mounted on protect customers, employees and cafe. The laws and regulations that can be integrated are privacy laws and regulations, that is not allowing everyone to access whatever data they need about the cafe, its employees or customers. There is a dependence on security law, to safeguard the three bodies (cafe, employees and customers) of the cafe. Moreover there has to be laws applied to ensure that the wireless devices that are installed are environmentally friendly.

3. Business decision 1

1. What makes m- coupons better than traditional papers coupons?

˜ m- Coupons are much better than traditional newspaper coupons since it is designed for customers to utilize. Since m-coupons are stored and carried in cell phones it has higher redemption rates than traditional newspaper coupons, since it's readily available whereby newspaper coupons can be neglected a t home or misplaced but people do always take their mobile phones.

˜ It is faster and cheaper than traditional papers, it promotes impulsive buying will improve the sales of the cafe.

˜ We have to lower and keep paper coupons easily, but m- coupons can simply be stored in devices, and can be erased from mobile after use.

˜ Its green, since no need for papers. It will help create clients and increase success.

˜ Customers are real-time on the phones and will increase customer bottom part.

2. What exactly are risks involved with mobile marketing and m- coupons?

Due to day to day growth in the technology, the security risks are also increasing, through mobile messaging sometime unwanted text messages can be delivered and these emails can contain scams, viruses and worms.

Privacy issues are associated with mobile marketing and m- coupons, if the cafe is having issues of customers privateness and the issue is not dressed up, the growth of mobile marketing will jeopardize the problem and it can result in loss in customer trust.

3. What are the privateness issues involved with mobile marketing and m- coupons?

The personal privacy issues involved with mobile marketing and m-coupons is increased capacity to acquire individualized and personal information, the ability to track visits to wireless websites and the capability to accumulate locational information about consumers (ACC, 2007)

4. How do the cafe reap the benefits of collecting and monitoring response rates of m- coupons by customers?

The cafe can reap the benefits of collecting and monitoring response rate of m- coupons by using this response rate to create evaluation information of the cafe and its customers. The types of analysis can be carried out with using the response rate is firstly statistical analysis which can be used to find the relationships or relationship between your cafe sales and its customers. Second of all, "association detection", connection detection of m-coupons will identify the habits and consumer patterns in consumption that is how quickly they react to advertisements. Lastly, it can help in cluster evaluation which will help to portion customer information really helps to identify customers with similar tendencies, ( Baltzan and Phillips, 2009)

5 How can the cafe benefit from monitoring if an m- coupon is forwarded to another cell phone?

Apply your knowledge

In order to secure the cafes cordless network, is by using firewalls, this technique of security, inhibits unauthorized access or it's a way of guarding a private network from a public network. Firewalls are less expensive than other software's, since firewall is a offer with other software's and security programs all in a single. The firewall will protect the cafes network from public systems.

Ethical issues do occur while employing this security system. While using the firewalls we have been limiting the clients desire to access all the information that they want about the cafe.

Also We Can Offer!

Other services that we offer

If you don’t see the necessary subject, paper type, or topic in our list of available services and examples, don’t worry! We have a number of other academic disciplines to suit the needs of anyone who visits this website looking for help.

How to ...

We made your life easier with putting together a big number of articles and guidelines on how to plan and write different types of assignments (Essay, Research Paper, Dissertation etc)