Report to Supervisor Revised
pdf
keyboard_arrow_up
School
Thomas Nelson Community College *
*We aren’t endorsed by this school
Course
261
Subject
Information Systems
Date
Dec 6, 2023
Type
Pages
9
Uploaded by AgentWolf262
Date:
21
November
2023
To:
Maria
Carman
From:
Lily
Calfee
Subject:
Suggestions
for
All
Washed
Up
It
has
been
a
pleasure
to
work
as
Assistant
Manager
for
All
Washed
Up
these
past
few
weeks.
1
admire
how
hard
the
staff
works,
how
their
customer
service
has
expanded
the
customer
base
and
the
different
opportunities
this
company
offers
its
employees.
I
am
submitting
this
report
to
you
to
outline
a
few
improvements
that
could
take
All
Washed
Up
to
the
next
level.
Some
of
my
observations
show
potentially
concerning
activities
pertaining
to
job
functions
and
security.
I
will
outline
the
details
of
my
observation
throughout
the
report.
Overall,
this
is
an
amazing
company
to
work
for.
The
growth
he
company
has
shown
over
the
past
few
years
is
tremendous
and
commendable.
It
shows
that
All
Washed
Up
has
an
unleashed
potential.
The
issues
I
will
mention
in
this
report
show
how
All
Washed
Up
can
improve
and
go
to
the
next
level
with
a
few
minor
adjustments
to
the
job
functions
and
security.
Executive
Summary
All
Washed
Up
has
been
growing
since
its
beginning
in
2012.
It
has
grown
both
its
customer
base
as
well
as
its
number
of
staff.
Starting
off
as
a
do
it
yourself
car
wash
bay,
it
has
expanded
it
to
a
full
service
car
wash.
This
expansion
aided
in
growing
the
customer
base
by:
Allowing
for
people
with
disabilities
and
young
children
to
get
their
car
washed
Adding
interior
cleaning,
which
automated
car
washes
do
not
offer
Allowing
for
a
deep
and
thorough
clean,
which
automated
car
washes
do
not offer
Expanding
the
car
washing
market
and
enhancing
the
customer
experience.
However,
there
are
a
few
potential
problems
that
exist
with
the
current
business
model.
These
include
the
following:
e
Improper
credit
card
handling
o
Customer
hands
their
credit
card/ debit
card
to
an
attendant
who
then
take
it
over
to
the
counter
and
place
it
on
the
counter
to
be
run
As
many
as
three
cards
can
be
on
the
counter
at
once
As
many
as
10
customers
and
even
more
employees
are
able
to
see
the
credit
card
information
when
it
is
laying
around
on
the
counter
e
Cybersecurity
threats
o
There
is
one
shared
password
for
the
computer
system
o
The
password
has
not
been
updated
in
over
6
months
e
Misuse
of
Social
Media
o
Employees
are
taking
pictures
on
their
personal
phones
of
themselves
next
to
expensive
cars,
they
are
then
posting
it
to
their
personal
social
media
and
not
covering
the
license
plate
o
You
are
taking
pictures
of
customer’s
cars
and
posting
it
to
your
social
media
account
without
covering
up
the
license
plates
Solutions
to
these
problems
include
the
following:
e
Implementing
new
policies
for
check
out
of
customers
e
Creating
individual
accounts
and
passwords
for
the
computers
and
having
one
master
password
that
has
access
to
all
accounts
e
[Establishing
a
company
social
media
page
e
Implementing
new
policies
for
taking
photos
of
work
content
and
posting
it
on
personal
social
media
accounts
If
these
solutions
are
implemented,
All
Washed
Up
will
be
able
to
go
to
the
next
level,
be
more
secure
and
have
a
solid
foundation
for
continued
growth.
The
Problem
The
current
business
model
with
the
mis-handling
of
credit/
debit
cards,
the
cybersecurity
threat
and
the
misuse
of
social
media
leaves
All
Washed
Up
in
a
vulnerable
situation.
The
reasons
for
this
vulnerability
are
the
following:
Customer
Personal
Payment
Information
Vulnerability
via
the
Mis-Handling
of
Credit/
Debit
Cards
e
When
customers
enter
the car
wash,
they
are
greeted
by
a
car
wash
attendant.
From
there,
the
credit/
debit
card
is
taken
over
to
the
checkout
counter
where
it
is
left
in
plain
sight.
There
can
be
up
to
three
credit/
debit
cards
left
on
the
counter
at
one
time.
Anyone
can
just
walk
up
to
the
counter
and
view
the
credit/
debit
card
numbers.
At
any
one
time
there
can
be
as
many
as
10
customers
in
the
area
plus
employees.
This
issue
leaves
the
customers
credit/
debit
card
information
open
to
be
stolen.
e
From
there,
the
credit/
debit
card
is
then
picked
up
by
a
car
wash
attendant
and
taken
back
to
the
customer.
At
this
point,
the
credit
card
has
been
passed
between
at
minimum
2
people
and
at
maximum
3+
depending
on
how
many
people
are
working
the
counter.
This
leaves
room
for
the
credit/
debit
card
to
be
stolen,
copied
or
lost.
The
current
process
for
collecting
payment
is
illustrated
in
Figure
1.
Figure
1
Current
Process
for
Collecting
Payment
Customer
hands
credit/debit
Attendant
takes
the
card
to
attendant
credit/debit
card
over
to
the
check
out
counter
The
check
out
Attendant
brings
attendant
back
to
customer
processes
payment
The
problem
depicted
here
is
the
number
of
steps
it
takes
for
the
payment
to
be
taken,
leading
to
the
mishandling
of
credit/debit
cards.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Cybersecurity
Risks
e
When
it
comes
to
the
computer
system
there
is
only
one
password.
This
issue
can
lead
to
cyberhacking
and
information
being
stolen
or
leaked.
When
there
is
only
one
password
that
many
people
share
this
means
that
all
employees
have
access
to
all
company
data.
All
employees
having
access
to
all
company
data
is
a
major
security
risk.
®
The
password
has
not
been
changed
in
over
six
months.
Your
password
should
be
reset
frequently
to
avoid
cyberhacking.
When
you
keep
the
same
password
for
an
extended
period
of
time,
this
allows
hackers
enough
time
to
figure
out
your
password
and
then,
they
can
steal/
leak
important
information.
e
Both
of
these
options
listed
above
leave
the
company
open
to
many
abuse
of
data
issues.
If
an
employee
gets
fired
or
leaves
the
company
on
bad
terms,
they
can
share
the
only
password
that the
company
has
which
leaves
the
company
vulnerable.
It is
shown
that
“Recent
statistics
show
that
only
less
than
half
the
companies
in
the
USA
are
fully
prepared
to
deal
with
cyberattacks”
(Chansukree,
Sagarik,
&
Cho.
2022)
so
by
reevaluating
the
areas
above
I
believe
All
Washed
Up
can
advance
to
the
next
level.
The
Misuse
of
Social
Media
®
You
post
business
posts
on
your
personal
social
media
accounts.
While
getting
publicity
out
there,
there
are
a
few
issues
with
this.
The
first
is
that
unless
people
know
you
they
cannot
attach
a
business
to
the
work.
The
second
is
that
business
social
media
accounts
have
many
different
features
to
help
you
promote
your
business
and
they
should
be
used.
e
When
you
or
the
employees
post
photos
of
client’s
cars
you
do
not
cover
the
license
plate
up,
which
is
considered
personal
information
for
the
customer
and
should
be
treated
as
such.
Having
clients
license
plates
open
on
social
media
leaves
them
open
to
a
host
of
issues
such
as
safety,
personal
security
breach,
etc.
While
there
is
no
reason
to
assume
that
any
of
these
issues
will
cause
something
negative
to
happen
at
All
Washed
Up,
there
is
still
a
need
to
improve
these
areas
to
not
leave
us
vulnerable.
Suggested
Solutions
1.
Implement
new
policies
for
the
checking
out
process
as
well
as
credit
card
handling
a.
The
first
thing
that
should
be
implemented
is
that
only
one
person
should
be
collecting
payments. One
person
should
take
the
card
from
the
customer,
check
them
out
and
then
bring
the
credit/
debit
card
back
to
the
customer.
b.
Credit
cards
should
not
be
left
in
the
plain
view
of
any
customer
ever.
Credit/
debit
cards
should
never
be
set
down
where anyone
can
see
it.
Having
the
attendant
hold
the
form
of
payment
until
they
process
the
payment
will
be
the
easiest
thing
to
do.
c.
You
should
also
keep
the
credit/debit
card
in
view
of
the
customer
at
all
times,
this
will
reduce
the
risk
that
there
will
be
any
fraud
allegations
from
the
customer,
Jefferson
County
explains,
“If
handling
the
credit
card
is
required
3
due
to
the
location
of
the
credit
card
device
or
other
factors,
keep
the
credit
card
in
view
of
the
customer
at
all
times.”
(Jefferson.
2023)
d.
I
would
also
consider
having
the
customer
complete
the
transaction
themselves.
After
they
get
out
of
the
car
and
before
they
go
into the
waiting
area,
the
customer
should
go
up
to
the
counter
and
complete
payment.
2.
Having
individual
passwords
for
each
employee,
with
this
limiting
access
to
the
companies’
information
on
a
need
to
know
basis
a.
Zviran
and
Haga
say
that
“despite
the
widespread
use
of
passwords,
little
attention
has
been
given
to
the
characteristics
of
their
actual
use.”
(Zviran,
Haga.
1999).
Hence,
each
employee
should
have
their
own
personal
username
and
password
to
be
able
to
access
the
company's
computer
system.
This
change
will
allow
the
company’s
servers
to
remain
secure.
This
change
also
protects
the
company
from
a
security
breach
if
someone
leaves
the
company
on
bad
terms.
If
someone
leaves
on
bad
terms,
their
password
can
be
revoked
so
they
are
no
longer
allowed
access.
b.
There
should
be
requirements
for
each
employee's
password
that
enhances
security
and
decreases
the
likelihood
of
someone
being
hacked.
IBM
says
that
“You
can
specify
the
following
standards
and
other
rules
for
passwords:
Minimum
and
maximum
length,
Character
restrictions,
Frequency
of
password
reuse,
Disallowed
user
names
or
user
IDs
and
Specify
a
minimum
password
age”
(IBM.
2023).
c.
Each
employee
should
be
allowed
a
certain
amount
of
access
to
the
company's
computer
system
so
that
they
only
have
access
to
exactly
what
they
need
to
do
their
job,
this
can
be
granted
by
requiring
them
to
input
their
password
to
be
able
to
access
certain
parts
of
the
system.
This
change
allows
for
more
security
in
the
company
and
if
someone
leaves
the
company
on
bad
terms
they
do
not
have
access
to
the
entire
company.
3.
Establishing
a
Company
Social
Media
Page
a.
All
Washed
Up
should
have
their
own
social
media
platforms,
whether
that
is
on
Facebook,
Instagram,
Snapchat,
TikTok,
etc.
This
idea
separates
the
company
from
its
employees.
It
also
allows
for
the
use
of
specific
tools
designed
only
for
businesses
that
were
created
by
the
social
media
platforms
to
advertise
their
business.
b.
There
should
be
certain
people
assigned
to
manage
whatever
accounts
are
created.
You
or
I
should
have
the
password
for
monitoring.
We
should
promote
an
attendant
to
social
media
manager
so
their
main
job
and
sole
focus
will
be
on
promoting
the
company
on
social
media.
This
addition
will
increase
our
business
and
outreach
to
different
communities.
4.
Implementing
new
policies
on
taking
photos
of
work
content
and
posting
it
on
personal
social
media
accounts
a.
With
the
creation
of
the
company's
own
social
media
page
there
should
be
policies
around
what
can
and
cannot
be
posted
on
social
media which
includes
employees
personal
accounts.
b.
The
first
thing
to
address
is
that
any
customer's
personal
information,
such
as
license
plates,
credit/debit
cards
should
never
be
posted
on
either
company
or
personal
social
media
pages.
A
standard
of
practice
is
to
blur
or
crop
out
that
information.
c.
Also,
there
should
be
policies
on
what
can
and
cannot
be
posted
on
employees’
personal
social
media
pages.
Forbes
states,
“Personal
content
is
just
that—it’s
clearly
personal.
But
once
the
individual
posts
content
that
mentions
the
employer,
it
may
be
company
affiliated
and
is
potentially
subject
to
assessment
and
action
by
the
employer.”
(Forbes.
2023).
So,
while
their
personal
accounts
are
their
own
if
they
are
going
to
post
any
content
that
was
obtained
at
work
there
should
be
the
following
guidelines:
i.
Respect
the
law
ii.
Respect
company
privacy
iii.
Have
a
disclaimer
on
posts
that
you’re
views
do
not
represent
company
views
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Conclusion
All
Washed
Up
is
a
groundbreaking
company
in
the
car
washing
business.
There
has
been
substantial
growth
since
it
opened
in
2012.
As
the
owner
of
All
Washed
Up,
you
have
built
this
company
from
the
ground
up
and
have
done
an
amazing
job.
Although
the
growth
of
All
Washed
Up
is
amazing,
it
has
come
with
strains
on
the
job
functionality
and
company
security.
One
of
those
strains
is
only
having
one
password
for
the
entire
company
system,
which
also
has
not
been
changed
in
over
a
month,
leading
to
major
security
risks
for
the
company.
The
others
are
improper
card
handling
and
social
media
abuse.
All
three
of
these
issues
lead
to
poor
job
functionality
and
security
risks
for
All
Washed
Up.
Implementing
new
policies
regarding
check
out
of
customers,
creating
individual
accounts
and
passwords
for
the
computers
and
having
one
master
password
that
has
access
to
all
accounts,
establishing
a
company
social
media
page
and
implementing
new
policies
regarding
taking
photos
of
work
content
and
posting
it
on
personal
social
media
accounts
will
strengthen
All
Washed
Ups
job
functionality
and
job
security.
References
Ameen,
N.,
Tarhini,
A.,
Hussain
Shah,
M.,
Madichie,
N.,
Paul,
J.,
&
Choudrie,
J.
(2020,
August
26).
Keeping
customers’
data
secure:
A
cross-cultural
study
of
cybersecurity
compliance
among
the
Gen-Mobile
Workforce.
ScienceDirect.
https://www.sciencedirect.com/science/article/pii/S0747563220302831
Chansukree,
P.,
Sagarik,
D.,
&
Cho,
W.
(2022).
Public
employee
use
of
social
media
at
work:
Competency
...
-
sage
journals.
Sage
Journals.
https://journals.sagepub.com/doi/10.1177/00910260221098737
IBM.
(2021,
March
4).
Password
policies.
IBM
Spectrum
Discover.
https://www.ibm.com/docs/en/spectrum-discover/2.0.2?topic=access-password-policies
Jefferson
County.
(2020,
January
1).
Credit
card
payments
procedure
handling
and
security.
Jefferson
County,
Colorado.
https://www.jeffco.us/DocumentCenter/View/288/Credit-Card-Payments-Procedure-Han
dling-and-Security-PDF
Kenan,
J.
(2023,
November
1).
Social
Media
Policy:
A
guide
for
your
organization. Sprout
Social.
https://sproutsocial.com/insights/social-media-policy/
Lewis,
S.,
&
Hall,
R.
(2022).
(PDF)
managing
workplace
bullying
and
social
media
policy:
Implications
...
Research
Gate.
https://www.researchgate.net/publication/312769225
Managing
workplace
bullying
an
d
social
media
policy
Implications
for
employee
engagement
Martinez,
A.
(2020,
February
6).
What
employers
should
consider
when
drafting
a
social
media
policy.
Forbes.
https://www.forbes.com/sites/alonzomartinez/2020/02/06/what-employers-should-consid
er-when-drafting-a-social-media-policy/?sh=36f7a4121d6e
Michigan
Tech.
(2016,
September
20).
Credit
card
acceptance
and
processing
procedures:
Information Technology:
Michigan
Tech.
Michigan
Technological
University.
https://www.mtu.edu/it/security/policies-procedures-guidelines/pci-dss-guidelines-proced
ures/credit-card-acceptance-processing-procedures/
Netsurion.
(2023,
April
3).
6
simple
rules
for
safe
credit
card
handling.
https://www.netsurion.com/articles/six-simple-rules-for-safe-credit-card-handling
Zviran,
M.,
&
Haga,
W.
(1999).
Password
security:
An
empirical
study
-
JSTOR.
JSTOR.
https://www.jstor.org/stable/40398409
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help