Scenario: A former employee repeatedly accessed his previous supervisor’s email account after leaving the financial company, allowing him to email himself company proprietary information and materials. The insider was an employee of a financial services company. After departing the company, the former employee repeatedly accessed his former supervisor’s email account (using credentials provided to him by the former supervisor) on about 100 occasions without authorization. The former employee sent emails from the former supervisor’s email account to his email account and his email account at his new employer's company. One of those emails included an attachment that contained proprietary information, including internal performance metrics. Another email attached is a password-protected spreadsheet with compensation and performance evaluation information for various employees.
Scenario:
A former employee repeatedly accessed his previous supervisor’s email account after leaving the financial company, allowing him to email himself company proprietary information and materials. The insider was an employee of a financial services company. After departing the company, the former employee repeatedly accessed his former supervisor’s email account (using credentials provided to him by the former supervisor) on about 100 occasions without authorization. The former employee sent emails from the former supervisor’s email account to his email account and his email account at his new employer's company. One of those emails included an attachment that contained proprietary information, including internal performance metrics. Another email attached is a password-protected spreadsheet with compensation and performance evaluation information for various employees.
Q. Concerning the above scenario, What information privacy principles have been breached? What you would do to address the situation?
Step by step
Solved in 2 steps