Unit 1 LO3
3.1: Explain why security and confidentiality are important in a business environment?
Greggs is a famous and common store in the UK. Griggs believes that security and confidentiality in the business environment are very important. Their staffs are very honest (Greggs, 2018). According to (Halpern, 2010) Today’s growing controversial and highly competitive workplace security and confidentiality are important for many reasons:
Why security is important in a business environment
iFacility ‘s solution for Greggs proposed a number of IP cameras, for each branch, a comprehensive recording and information portal with a full support and maintenance program based on an assessment of individual shop and wider group requirements. The Retail Loss Prevention Manager for Greggs explains. iFacility was the only company to put an IP proposal together initially and we immediately saw that it was the more flexible, future-proofed system as they clearly understood our requirements and the demands of the system. Not only did it offer better picture quality and remote access, but also an improved payback through several other potential operational benefits (facility, 2018).
Gregg’s security system quickly reassures its IT department that the IP solution integrated seamlessly with existing infrastructure, with straightforward installation and acceptable IT security controls. We were also impressed by their ability to coordinate an efficient supply chain, including an experienced hardware supplier, distributor, and installation team.” The benefits of a standardized centrally controlled CCTV system were considered. The Retail Loss Prevention Manager explains. A unified system is a key to deterring potential criminals, providing Police with valuable post-incident evidence, and incentivizing good internal controls and best practices. With this in mind, Greggs contacted a number of suppliers, asking them to put together a proposal.
Our Recommended Resources:
Security and Loss Prevention
IP technology delivers excellent picture quality, allowing quick and accurate identification of people as well as close-up footage of events, high frame rates, and intelligent recording.
Health and Safety Benefits
Cameras are also located back of the house, i.e. around the food preparation area in each shop, helping to reassure staff and incentivize good practice and diligence.
“The ability of the technology to be stretched to different uses is impressive; for example; we have the ability to use the system to monitor customer and stock levels in real-time. It may also be used to identify customer hotspots to help us decide where to place the point of sale most effectively and also to perform analysis for marketing purposes.”
The ability of managers to view footage remotely, either online or via a mobile device such as Blackberry or iPhone is a key benefit allowing regional managers to log in to their own shops’ systems, i.e. to view life and recorded footage of as and when required to quickly identify and resolve issues.
IP technology is totally future-proofed, i.e. the system’s flexibility and functionality ensure maximum return on the original investment without the need for unnecessary cost. For example, additional cameras and sensors can easily be connected to existing store infrastructure and the CCTV is able to be integrated with other systems, such as access control and EPOS.
Why confidentiality is important in a business environment
Maintaining confidentiality is important for varied reasons. All the business stakeholders are responsible to treat all the information in the workplace with care and caution. An employee should be prudent enough not to disclose any information that the organization considers sensitive and confidential, to a third party, until and unless the employee has consulted and taken permission from his supervisor regarding the same. Also, one should refrain from sharing any personal details with fellow colleagues at work. This will reduce staff conflict, and improve professionalism in the workplace.
An employee should know what files or materials he is permitted to access in the office and he should adhere to that. Under no circumstances should these files be shared or given to unauthorized people. This is because if it reaches the wrong hands, it can be considered as a breach of confidentiality and the employee may even be dismissed for it. Also, employees should not discuss any business dealings with clients, outside work. As far as the employer is concerned, any personal or professional details of employees should be handled with prudence. Data related to the personal details of an employee, application forms, references, health data, salary structure should be kept well under wraps because if they are misused, it can lead to discrimination in the workplace. Only staff members of the HR department who require the data for certain purposes should be given access to the personal files of employees.
3.2: Explain the possible consequences of failing to maintain security and confidentiality in line with requirements.
Failure to maintain security and confidentiality may bring negative consequences in different ways. The most immediate consequence of security failure is the loss of money. Even if employers are without fault, their cases can take months or years to be resolve by arbitrators and courts. Workers without adequately secured environments are particularly vulnerable and have little short-term recourse (Rimm, 2018). Employees victimized by poor security may find their reputations sullied, particularly if they occur more than once. If breaches are caused by employees, then they have no one to blame but themselves. If employers are at fault, employees can have a difficult time trying to counter the negative reputations that may result (FOWLER, 2018).
To protect themselves, Greggs must ensure security at the workplace. While stealing Gregg’s identity and money can be incredibly bad, stealing Gregg’s intellectual property can be just as damaging to a business. If a hacker gets in and steals ideas, plans, or blueprints, Greggs could miss out on being able to fully implement new products or designs – which could keep Greggs’s business from expanding. When it comes to Gregg’s business’ security, Gregg’s will definitely get what it pays for, and it will be a business expense it won’t regret spending. Hackers are always going to keep pushing the envelope to access data that they have no business getting, but by keeping its security systems as up-to-date as possible it will have a greater chance at longevity and success without being hacked (Best Techie, 2018).
Confidentiality in employment is important regardless of whether you have signed a written confidentiality agreement. If Gregg’s employment exposes confidential information owned, it should not publicize that confidential information. If an employee breaches confidentiality, he/she is at risk of legal trouble because he/she breaches employee confidentiality. The first and most obvious result of a breach of confidentiality by employees is termination. Even if you have an employment contract, it is likely that a breach of confidentiality also constitutes a breach of your employment contract (Fowler, 2018). In almost all circumstances, an employer will be well within his legal rights to fire you if you breach the employer’s confidentiality.
An employer can also sue an employee for breach of confidentiality, and if successful at trial, the employer can obtain monetary damages from the employee. This means the employee will have to pay money to the employer, especially if the employee’s breach caused identifiable monetary damage to the employer (Rimm, 2018). For example, if the employee shares confidential information with a competitor, the employer may be able to prove loss of market share and revenue, which the employee would then have to pay as damages to the employer. In some cases, an employer may even be able to obtain punitive damages against the employee. A fixed-term employment contract is a legal agreement that an employer signs with what is known as a contract employee. It outlines specific duties, payment terms, and the ending date, after which the employee leaves the company unless he is retained under a new contract. A breach occurs when either party breaks the terms, which can include a lack of promised wages or substandard work. Ask an attorney to review such contracts before signing (BestTechie, 2018).