• Home
  • Study Resources
    • group1
      • Business
        • Accounting & Finance
        • Business Environment
        • Business Law
        • Business Plan
        • Change Management
        • Economics
        • Human Resource Management
        • Innovation and Entrepreneurship
        • Operation Management
        • Organisational Behavior
        • Project Management
        • Sales & Marketing
        • Strategic Management
        • Business
        • Accounting & Finance
        • Business Environment
        • Business Law
        • Business Plan
        • Change Management
        • Economics
        • Human Resource Management
        • Innovation and Entrepreneurship
        • Leadership & Management
        • Operation Management
        • Organisational Behavior
        • Project Management
        • Sales & Marketing
        • Strategic Management
    • group2
      • Research
        • DBA Thesis
        • Dissertation Undergraduate
        • Dissertation Postgraduate
        • M.Phil / P.H.D Thesis
    • group3
      • Research Proposal
        • DBA Research Proposal
        • Proposal for Undergraduate
        • Proposal for Postgraduate
        • M.Phil / P.H.D Proposal
    • group4
      • Others
        • HND in Business
        • HND in Education
        • HND in health / social care
        • Knowledge Management
  • Blog
  • About Us
  • Contact Us
    • RegisterLogin
    • GET STARTED
Global Coursework
  • Home
  • Study Resources
    • group1
      • Business
        • Accounting & Finance
        • Business Environment
        • Business Law
        • Business Plan
        • Change Management
        • Economics
        • Human Resource Management
        • Innovation and Entrepreneurship
        • Operation Management
        • Organisational Behavior
        • Project Management
        • Sales & Marketing
        • Strategic Management
        • Business
        • Accounting & Finance
        • Business Environment
        • Business Law
        • Business Plan
        • Change Management
        • Economics
        • Human Resource Management
        • Innovation and Entrepreneurship
        • Leadership & Management
        • Operation Management
        • Organisational Behavior
        • Project Management
        • Sales & Marketing
        • Strategic Management
    • group2
      • Research
        • DBA Thesis
        • Dissertation Undergraduate
        • Dissertation Postgraduate
        • M.Phil / P.H.D Thesis
    • group3
      • Research Proposal
        • DBA Research Proposal
        • Proposal for Undergraduate
        • Proposal for Postgraduate
        • M.Phil / P.H.D Proposal
    • group4
      • Others
        • HND in Business
        • HND in Education
        • HND in health / social care
        • Knowledge Management
  • Blog
  • About Us
  • Contact Us
  • RegisterLogin
  • GET STARTED

Business Environment

Global Coursework has huge resources and study materials for students across the world. It has now over 10 millions documents
  • Home
  • Blog
  • Business Environment
  • Unit 1 3.1 Explain why Security and Confidentiality are Important in a Business Environment with McDonald (GC01158)
Unit 1 3.1 Explain why Security and Confidentiality are Important in a Business Environment with McDonald

Unit 1 3.1 Explain why Security and Confidentiality are Important in a Business Environment with McDonald (GC01158)

  • Categories Business Environment
  • Comments 0 comment

Unit 1 LO3

3.1: Explain why security and confidentiality are important in a business environment?

McDonald’s is a famous and common store in the UK. McDonald’s thinks security and privacy are very important in its business environment. Their staffs are very honest (McDonald, 2016). According to (Halpern, 2010), today’s growing controversial and highly competitive workplace privacy and confidentiality are important for many reasons.

The UK boasts more than 1,000 McDonald’s restaurants, with operations split into northern, central and southern regions. There are about 400 restaurants in the southern region, virtually all of them benefiting from CCTV. Images are recorded locally whenever a camera detects movement. Some of the DVRs are also linked to the company network, which allows any incidents to be reviewed. The monitoring station operators can view the cameras. It’s very good for reducing false activations. Remote monitoring requires the CCTV unit to be linked to the company network. It’s essential that the integrity of this network is maintained. Vulnerable DVRs could provide an easy entry point into the company network and introduce exposure to viruses or Trojans. Another aspect that’s checked is the possibility of users getting into the background operating system and downloading material such as films from the Internet.

Other key issues that are important to McDonald’s are reliability, ease of use and flexibility. With the DVRs chosen, Robbie Hawes points out, McDonald’s can put in a standard specification machine and then have it upgraded later with additional hard disk or channel capacity, or extra features such as remote monitoring. Staff safety was a prime reason for having a high-quality CCTV system. “We are open to anyone who walks through the front doors,” pointed out Andy Lane. The investment in high-quality CCTV systems brings further benefits. The restaurants’ prime locations mean that local police often turn to McDonald’s for images of crime or disorder in town centers. The cameras have helped in the enforcement of Anti-Social Behaviour Orders, proving that someone had breached an order to stay out of particular areas. High-quality CCTV images can be supplied to the police in the event of an assault or break-in at a given store. This has enabled the police to make a number of arrests for very serious crimes (IFSEC Global, 2018).

Confidentiality is a very important site for the business sector. Confidentiality, such as a failure, commonly known as a violation, cannot be generally remedied. Once the mystery has been revealed, there is no way to reveal it. If McDonald’s records are posted on a public website, then every competitor will know about its activities. and their information will not be deleted from their mind, documents, computers and other places. Almost all major security events reported on the media today involve major damage to privacy. It is very important for McDonald’s (MDN, 2018).

Our Recommended Resources:

Unit 1 3.1 Explain why Security and Confidentiality are Important in a Business Environment with Morrison

Unit 1 3.1 Explain why Security and Confidentiality are Important in a Business Environment with Pizza Hut

McDonald’s needs permission to access the personal information of its stakeholders mainly customers and employees (I’m loving it, 2017). Then, it needs to collect transaction details when it orders through websites or applications, including the products customers order, customer order’s date and time, and the amount charged (I’m Lovin it, 2017). Next, McDonald’s needs to be careful in using and preference of information of its competitor website. Employee information is also sensitive to McDonald’s. Thus, McDonald’s should maintain the confidentiality of employee information during a job application, information of former employees, information of current employees, and information provided during training and development, recruitment and selection process (I’m loving it, 2017).

3.2: Explain the possible consequences of failing to maintain security and confidentiality in line with requirements.

Failure to maintain security and confidence may cause huge damage and financial losses to McDonald’s. Tough demands are placed on the digital video recorders (DVRs) in McDonald’s restaurants. Recently, one of the Dallmeier units even survived being attacked by a burglar and dumped in a sink full of water. There are also challenges in everyday situations. Thus, if McDonald’s fails to ensure security, it will face these problems more severely in the future. Thus, the machines must be robust enough to operate in a catering environment and flexible enough to allow upgrading if requirements change. They need to be easy to operate and, above all, they must provide evidence-quality recordings – with no risk of anyone changing the settings or jeopardizing network security.

If McDonald’s fails routine security checks with its stakeholders, it can lose access to important technologies that allow it to do business. If McDonald’s takes credit cards, it might be asked to fill out a compliance report each year by your processing company (Gish, 2018). Computer hacking pervades global society in the digital age. The act of breaking into a secure computer network serves many purposes, from corporate espionage to blatant theft and political insubordination. Computer hacking may affect McDonald’s in a variety of ways — some universal, others specific to the nature of the reason for hacking and the business in question.

Failure to properly protect confidential business information may cause business damage seriously. Confidential information may be misused to perform illegal activities (for example, fraud or discrimination), instead of making a costly case for employers. In the UK, there are some workplace privacy protection laws that may affect the employees, employees and the publication of sensitive information, reduce trust, loyalty and loyalty. This will always reduce productivity (Halpern, 2010). If customers, clients, vendors and suppliers can prove that McDonald’s did not take reasonable care with their property or data, or to protect them from harm, McDonald’s can suffer legal damages (Gish, 2018).

According to an article published by the BBC, computer hacking cost companies in the United Kingdom billions of pounds in 2004. In their paper “The Economics of Computer Hacking,” economists Peter Leeson and Christopher Coyne write that computer virus created by hackers cost businesses $55 billion in 2003. In 2011, a single instance of hacking on the Play Station cost Sony more than $170 million, while Google lost $500,000 due to hacking in 2005. According to Richard Power, editorial director of the Computer Security Institute, single instances of hacking may cost as much as $600,000 to $7m a day for online businesses in 2011, depending upon the revenue of the operation (Gish, 2018). In addition, the monetary cost arose from computer hacking, instances of hacking costs organizations considerable amounts of employee time, resulting in the loss of yet more money. While large businesses possess the financial framework to absorb such costs, the loss of revenue and employee time may prove markedly detrimental to small organizations.

 

Full Documents Click Download Button

Free – Download Checkout Added to cart

  • Share:
author avatar
Editorial Team

Previous post

Unit 1 3.1 Explain why Security and Confidentiality are Important in a Business Environment with Hilton (GC01157)

Next post

Unit 1 3.1 Explain why Security and Confidentiality are Important in a Business Environment with Morrison (GC01159)

You may also like

Professional Discussion Individual Presentation Paper
Professional Discussion Individual Presentation Paper (GC01809)
31 October, 2021
BMS412 Business Environment Assignment with Morrisons (GC01808)
31 October, 2021

Executive Summary This paper aims to demonstrate the impacts of the internal and external factors on Morrisons. Morrison is the Yorkshire food store serving customers across the UK in where …

Assignment on The Context of Business_ Starbucks
Assignment on The Context of Business_ Starbucks (GC01807)
31 October, 2021

Leave A Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

    Treading Quarry

    Impact of Information Technology on Employee Performance in Retail Sector (GC02036)
    Impact of Information Technology on Employee Performance in Retail Sector (GC02036)
    11Jan2022
    Unit 16: Managing Communications, Knowledge and Information (GC015)
    Unit 16: Managing Communications, Knowledge and Information (GC015)
    04Feb2020
    Strategic Macro-Environmental Factor Analysis (GC012)
    Strategic Macro-Environmental Factor Analysis (GC012)
    04Feb2020
    Three Types of Economies and Economic Problem of Scarcity (GC011)
    Three Types of Economies and Economic Problem of Scarcity (GC011)
    04Feb2020
    Unit 16: Managing Communications, Knowledge & Information (GC010)
    Unit 16: Managing Communications, Knowledge & Information (GC010)
    04Feb2020
    Managing Communications, Knowledge & Information (GC009)
    Managing Communications, Knowledge & Information (GC009)
    04Feb2020
    The Macro Environment And Business (GC005)
    The Macro Environment And Business (GC005)
    04Feb2020
    Significance of Micro-Environment And the Context of Economics (GC004)
    Significance of Micro-Environment And the Context of Economics (GC004)
    04Feb2020
    Briefly Describe the Term Macro Economics (GC003)
    Briefly Describe the Term Macro Economics (GC003)
    04Feb2020
    HND in Nursing: Group Clinical Supervision (GC002)
    HND in Nursing: Group Clinical Supervision (GC002)
    04Feb2020

    Login with your site account

    Lost your password?

    Not a member yet? Register now

    Sign up for Newsletter

    Become an Instructor

    Join our community of students around the world and sell your courses.

    Learn More

    Our Main Categories

    • Business
    • DBA Research Proposal
    • Research Proposal
    • Research
    • Blog

    Get To Know Us

    • Home
    • Privacy
    • Terms
    • About Us
    • Contact Us

    Contact Us

    • info.globalcoursework@gmail.com
    • +44(0)7805072437
    • 56B Bigland Street, London, E1 2ND UK.
    Facebook-f Twitter Linkedin-in Youtube

    Global Coursework all Copyright Reserved @2020

    • Home
    • Privacy
    • Terms
    • About Us
    • Contact Us
    [miniorange_social_login shape="longbuttonwithtext" theme="default" space="4" width="240" height="40"]

    Login with your site account

    Lost your password?

    Not a member yet? Register now

    Register a new account

    Are you a member? Login now