Question

In: Accounting

Personal information about customers is collected, used, disclosed, and maintained only in compliance with internal policies...

Personal information about customers is collected, used, disclosed, and maintained only in compliance with internal policies and external regulatory requirements and is protected from unauthorized disclosure. With reference to Privacy Concern how would you deal with SPAM and Identify Theft problem of your business organization?

Solutions

Expert Solution

In today's world everything is going online whether it is education, business, trade etc. But while doing online transactions there is threat of scam, fraud or misuse of information. In a business concern or in a organisation a lot of information is collected and stored of persons connected with that organisation. There is need to secure the information of customers and maintain privacy.

TYPES OF SPAM

These are various kind of spams through which personal information of customers are collected and misused by unauthorized persons.

1. Comment spam
2. E-Mail spam
3. Credit card fraud
4. Phishing attacks
5. Money thefts
6. Hacking
7. Botnets
8. Trojans
9. Malware
10. Cloud Vulnerability
11. Skimming
12. Wi-fi hacking

To avoid spam and identity theft following measures can be used to deal with privacy problem of business organisation.

1.

Safe Computer Systems

2. Updated Security and Windows Software
3. Unique Passwords
4. Use Multi stage authentication
5. Encryption Technologies
6. Use Secure and Reputed Websites
7. Avoid Phishing emails
8. Avoid public wi-fi
9. Monitor bank statements regularly
10. Spot scams and spams

1.) SAFE COMPUTER SYSTEMS;- The computer systems should be safe enough so that there is no breach of data to cyber attack. There must be firewall and anti-virus software in computer systems. Data must be backup regularly so that in case any lose of data it can be retrieved.

2.) UPDATED SECURITY AND WINDOWS SOFTWARE:- To avoid any kind of breaches to your computer systems there is need to have anti-virus softwares. These softwares and windows should be updated regularly at the end of either month or quarter. It will ensure that there is no unauthorzied access to your customers information.

3.) UNIQUE PASSWORDS:- This is the most important factor through which there is possibility of hacking. If the passwords of files are strong enough hackers can get easily access to organisation's data. So the passwords must be unique and strong which are not easily cracked. The passwords must be change at regular intervals.

4.) USE MULTI STAGE AUTHENTICATION:- For all the applications use multi step authorizations which will prevent the unauthorized access to your data.

5.) ENCRYPTION TECHNOLOGIES:- Encryption is the way through which the data can be encrypted to coded language and only the receiver knows how to decrypt it. There must be encryption technologies adopted by the organisations.

6.) USE SECURE AND REPUTED WEBSITES:- Whenever doing work online never click on unanonymous link which is not from secure websites. There is a chance of cyber attacks. Always use recognised websites.

7.) AVOID PHISHING E-MAILS:- This is one of the most common method of hackers to steal the personal information. These mails are designed in such a way which require you to put your personal details with a link provided in mail. Phishing mails can be identified like misspelt words, poorly written.

8.) AVOID PUBLIC WI-FI:- Many persons use public wi-fi which is convenient and free but it invites hackers to get access to their personal information. So it is advised not to use public wi-fi.

9.) MONITOR BANK STATEMENTS REGULARLY:- One should always keep an eye on their bank accounts and statements so that there is no unusual activity. If there is any it should be reported to bank immediately and accounts should be freeze.

10.) SPOT SCAMS AND SPAMS:- There are a lot of ways through which hackers hack the systems. So we need to be careful while doing online work. One should never click on any random link which is from unrecognised site.  

Today is the world of global competition. All the things are globalised and online. It is not possible to avoid online transactions but it can be secured by using some preventive measures.


Related Solutions

3. Personal information about customers is collected, used, disclosed, and maintained only in compliance with internal...
3. Personal information about customers is collected, used, disclosed, and maintained only in compliance with internal policies and external regulatory requirements and is protected from unauthorized disclosure. With reference to Privacy Concern how would you deal with SPAM and Identify Theft problem of your business organization?
Which two Acts set legislative guidelines about how information should be collected, disclosed, used and stored...
Which two Acts set legislative guidelines about how information should be collected, disclosed, used and stored and what do these Acts cover?
Explain how policies and procedures are used to manage compliance and ethical practice in internal work...
Explain how policies and procedures are used to manage compliance and ethical practice in internal work practices.
Define a "major customer" of a company. What information must be disclosed about the major customers?...
Define a "major customer" of a company. What information must be disclosed about the major customers? Why is the disclosure of this information important? Are the names disclosed? Should they be?
AIS: In the U.S., organizations are allowed to collect personal information about customers unless the customer...
AIS: In the U.S., organizations are allowed to collect personal information about customers unless the customer explicitly objects (called opt-out). In contrast, the default policy in EU is opt-in, meaning that organizations cannot collect personally identifying information unless customers explicitly give them permission to do so. What are the advantages and disadvantages to the opt-in versus the opt-out approaches?
learn about the concept of Internal Control. This is the policies, procedures and practices that a...
learn about the concept of Internal Control. This is the policies, procedures and practices that a company puts in place to make sure that company assets are protected and that the company's accounting records are true and accurate. The material in the chapter that discusses the Sarbanes-Oxley Act emphasizes how important Internal Controls are and the penalties that can be imposed on a company for not following good internal control practices. Please answer the following questions regarding Internal Controls. Questions...
Information security policies are the core internal guidance for an organization and must be enacted prior...
Information security policies are the core internal guidance for an organization and must be enacted prior to the purchase of information security controls. There is a bit of a "chicken and egg" dispute in the information security community as to whether it is appropriate to first engage in risk assessment with policies created to address those findings or whether it is appropriate to first create policies against which a risk assessment can be performed. On a more granular level, security...
INFORMED CONSENT It has been maintained that patients have a right to complete information about their...
INFORMED CONSENT It has been maintained that patients have a right to complete information about their conditions. But... What happens when the diagnosis reveals a genetic disorder that can have known harmful effects on their children? Should the spouse automatically be told about this result? Should the children be told? Do other relatives have the right to know this information? Who is the "patient" in these situations? Is it the one who has been tested? Is it the one who...
How do you go about evaluating the company's disclosed information? What information would you use? Offer...
How do you go about evaluating the company's disclosed information? What information would you use? Offer two examples of data you will gather.
Sarbanes–Oxley Act Compliance As a Certified Public Accountant (CPA), Certified Internal Auditor (CIA), and Certified Information...
Sarbanes–Oxley Act Compliance As a Certified Public Accountant (CPA), Certified Internal Auditor (CIA), and Certified Information Systems Auditor (CISA) you have been asked to perform an audit of company records in support of the Attest function to verify the annual statements. The inventory balances from the computerized system are reported to be $121 million, but reports from field auditors show that balances are severely overstated. In discussions with employees and managers, you find some overlap in functions with certain personnel...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT