Unit 1 LO3
3.1: Explain why security and confidentiality are important in a business environment?
McDonald’s is a famous and common store in the UK. McDonald’s thinks security and privacy are very important in its business environment. Their staffs are very honest (McDonald, 2016). According to (Halpern, 2010), today’s growing controversial and highly competitive workplace privacy and confidentiality are important for many reasons.
The UK boasts more than 1,000 McDonald’s restaurants, with operations split into northern, central and southern regions. There are about 400 restaurants in the southern region, virtually all of them benefiting from CCTV. Images are recorded locally whenever a camera detects movement. Some of the DVRs are also linked to the company network, which allows any incidents to be reviewed. The monitoring station operators can view the cameras. It’s very good for reducing false activations. Remote monitoring requires the CCTV unit to be linked to the company network. It’s essential that the integrity of this network is maintained. Vulnerable DVRs could provide an easy entry point into the company network and introduce exposure to viruses or Trojans. Another aspect that’s checked is the possibility of users getting into the background operating system and downloading material such as films from the Internet.
Other key issues that are important to McDonald’s are reliability, ease of use and flexibility. With the DVRs chosen, Robbie Hawes points out, McDonald’s can put in a standard specification machine and then have it upgraded later with additional hard disk or channel capacity, or extra features such as remote monitoring. Staff safety was a prime reason for having a high-quality CCTV system. “We are open to anyone who walks through the front doors,” pointed out Andy Lane. The investment in high-quality CCTV systems brings further benefits. The restaurants’ prime locations mean that local police often turn to McDonald’s for images of crime or disorder in town centers. The cameras have helped in the enforcement of Anti-Social Behaviour Orders, proving that someone had breached an order to stay out of particular areas. High-quality CCTV images can be supplied to the police in the event of an assault or break-in at a given store. This has enabled the police to make a number of arrests for very serious crimes (IFSEC Global, 2018).
Confidentiality is a very important site for the business sector. Confidentiality, such as a failure, commonly known as a violation, cannot be generally remedied. Once the mystery has been revealed, there is no way to reveal it. If McDonald’s records are posted on a public website, then every competitor will know about its activities. and their information will not be deleted from their mind, documents, computers and other places. Almost all major security events reported on the media today involve major damage to privacy. It is very important for McDonald’s (MDN, 2018).
Our Recommended Resources:
McDonald’s needs permission to access the personal information of its stakeholders mainly customers and employees (I’m loving it, 2017). Then, it needs to collect transaction details when it orders through websites or applications, including the products customers order, customer order’s date and time, and the amount charged (I’m Lovin it, 2017). Next, McDonald’s needs to be careful in using and preference of information of its competitor website. Employee information is also sensitive to McDonald’s. Thus, McDonald’s should maintain the confidentiality of employee information during a job application, information of former employees, information of current employees, and information provided during training and development, recruitment and selection process (I’m loving it, 2017).
3.2: Explain the possible consequences of failing to maintain security and confidentiality in line with requirements.
Failure to maintain security and confidence may cause huge damage and financial losses to McDonald’s. Tough demands are placed on the digital video recorders (DVRs) in McDonald’s restaurants. Recently, one of the Dallmeier units even survived being attacked by a burglar and dumped in a sink full of water. There are also challenges in everyday situations. Thus, if McDonald’s fails to ensure security, it will face these problems more severely in the future. Thus, the machines must be robust enough to operate in a catering environment and flexible enough to allow upgrading if requirements change. They need to be easy to operate and, above all, they must provide evidence-quality recordings – with no risk of anyone changing the settings or jeopardizing network security.
If McDonald’s fails routine security checks with its stakeholders, it can lose access to important technologies that allow it to do business. If McDonald’s takes credit cards, it might be asked to fill out a compliance report each year by your processing company (Gish, 2018). Computer hacking pervades global society in the digital age. The act of breaking into a secure computer network serves many purposes, from corporate espionage to blatant theft and political insubordination. Computer hacking may affect McDonald’s in a variety of ways — some universal, others specific to the nature of the reason for hacking and the business in question.
Failure to properly protect confidential business information may cause business damage seriously. Confidential information may be misused to perform illegal activities (for example, fraud or discrimination), instead of making a costly case for employers. In the UK, there are some workplace privacy protection laws that may affect the employees, employees and the publication of sensitive information, reduce trust, loyalty and loyalty. This will always reduce productivity (Halpern, 2010). If customers, clients, vendors and suppliers can prove that McDonald’s did not take reasonable care with their property or data, or to protect them from harm, McDonald’s can suffer legal damages (Gish, 2018).
According to an article published by the BBC, computer hacking cost companies in the United Kingdom billions of pounds in 2004. In their paper “The Economics of Computer Hacking,” economists Peter Leeson and Christopher Coyne write that computer virus created by hackers cost businesses $55 billion in 2003. In 2011, a single instance of hacking on the Play Station cost Sony more than $170 million, while Google lost $500,000 due to hacking in 2005. According to Richard Power, editorial director of the Computer Security Institute, single instances of hacking may cost as much as $600,000 to $7m a day for online businesses in 2011, depending upon the revenue of the operation (Gish, 2018). In addition, the monetary cost arose from computer hacking, instances of hacking costs organizations considerable amounts of employee time, resulting in the loss of yet more money. While large businesses possess the financial framework to absorb such costs, the loss of revenue and employee time may prove markedly detrimental to small organizations.