Friday, October 18, 2019

Identity Theft in the Organization Research Paper

Identity Theft in the Organization - Research Paper Example However, in other organizations, this is something that is known. This is especially in hospitals where the patients use their social security numbers and in financial institutions. This paper discusses the issue of identity theft, how major institutions govern the information of clients and additionally, recommendations on how to stop identity theft. To start with, the organization can create the post of an ethics officer. The web surfing history of the employee is something that should be monitored closely if organizations want to be sure of the operations that an employee is carrying out. In addition, this is something that if an organization fails to adhere to, may lead to the loss of not only the data of the clients but the overall bad image of the organization. There are numerous ways and means of monitoring an employee’s web surfing and email history (Henk, Tilborg, & Jajodia, 2011, p. 1248). An ethics officer is someone who is employed by an organization to ensure that employees do not go against the rules and ethics of the workstation. This is a post that is however given to a very trusted employee since he or she is trusted to guide the other employees so as not to steal data from the organization. The workstation is something that is clearly important if the organization is dealing with matters that may lead to i dentity theft and therefore, there should be rules and regulations that govern the way the employees perform and conduct themselves. On the other hand, sometimes the employees fail to adhere to these rules and it is at this point that the ethics officer comes in. One of the major rules in an organization is that the employee should not in any way jeopardize the information of the client maliciously and use it for his or her own benefits. In other words, an employee should not be involved in identity theft. Monitoring the cookies information is also important Henk, Tilburg, & Jajodia, 2011, p. 1249).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.