DAT_520_Adriana_Carroll_Milestone_Six

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

210

Subject

Business

Date

Feb 20, 2024

Type

docx

Pages

3

Uploaded by MateGerbil2595

Report
MILESTONE SIX 1 Adriana Carroll DAT-515 Southern New Hampshire University January 28 th , 2024 Milestone Six
2 INTRODUCTION There are several key concerns to focus on when managing any amount of data that involves a customer base and Third Star Financial is no different. The company manages extremely sensitive data, and it is vital that this data is responsibly managed and secure while adhering to government requirements. As a financial company, there are additional restrictions the company faces enforced by the Federal Trade Commission. Knowing what these restrictions and requirements are will enable the company to ensure both compliance and proper security. This paper will discuss the restrictions of these laws and the ethical issues that the company will face when implementing proper data security. RESTRICTIONS First, it is important to discuss several of the federal laws that will restrict the way the company will operate but are vital for both auditing purposes and security purposes. One of these laws, the Financial Modernization Act of 1999, or the Gramm-Leach-Bliley Act, contains the proper procedures for obtaining and revealing any aspects of the buyer’s monetary data. Within this act, the Safeguards Rule states that the company responsible for the consumer’s data is required to mitigate any security risks to this data. One of the methods that Third Star Financial should implement to mitigate security risks is to ensure that only the employees who require access to this monetary information can access it. On the other hand, another control to implement is that the customer can only access their information and no one else's. Auditing both controls will mitigate many security risks such as theft, unauthorized access, and if an employee’s account is accessed by a malicious actor. In doing so, Third Star Financial can start to ensure that they are compliant with laws like the Gramm-Leach-Bliley Act. Following up with these processes, the
3 company should audit regularly to ensure that the company is secure and there are no current vulnerabilities to mitigate. ETHICAL ISSUES When considering ethical issues, it is important to ask the question "what if?" What if customer data is not being properly maintained during the transfer to the new system? What if there are massive amounts of unused data containing sensitive information during the transfer? To properly deal with this ethical issue, the company should properly dispose of and remove any old, unused data to prevent leakage. This can be accomplished through shredding physical copies or electronically erasing data from the old data stores. What if the controls that the company implemented are not properly implemented? Auditing regularly will ensure that the company is effectively managing access to sensitive data and that the accounts are properly maintained for these accesses. If there is a discrepancy between audits, then reviewing the logs to understand how the account was implemented will show any mistakes or oversights experienced by the company. Then, training could be provided to prevent the issue from arising in the future. Other ethical considerations should be targeted at the employees who have these accesses. How does the company prevent or mitigate the risk of insider threats, malicious or non- malicious? The company must have legal documentation pertaining to these accounts and their level of access to outline the restrictions these accounts have and the legal repercussions that the employee could face in the event of misuse. Proper training must be provided to mitigate the risk of accidental misuse and ensure that each employee understands the impact their actions have on their customers and on the company. Finally, the employee should understand that the level of data they are handling is highly sensitive and should be treated as such.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help