Tuesday, December 17, 2019

Essay on Outsourcing the Processing of Sensitive Information

Outsourcing the Processing of Sensitive Information A current trend in business in the first-world (United States and Western Europe) is for the service sector to follow the lead of the manufacturing sector in looking to the global marketplace to find the lowest-cost means of production. That is, to lower costs and maximize profits, first-world service providers are increasingly seeking to outsource knowledge worker type tasks to countries with substantially lower labor costs. The type of work being exported includes telephone call-center support, data entry, the design and implementation of sophisticated software systems, tax preparation and financial bookkeeping. Of particular concern to privacy advocates is that exporting the†¦show more content†¦In fact, the European Union’s Data Protection Directive, prohibits sending personal information to countries that do not have an adequate information security infrastructure. India, with its growing outsourcing industry, is hurrying to pass legislation that will qualify it to process data from the E.U. [5], but often the protection of private information is based on little more than the honor system [3]. The time when the legal structure in developing countries can provide for the protection of information equal to that provided in developed countries may remain a decade or more in the future. The Internet is the technology that largely makes outsourcing business processes possible. It also makes the transmittal of personal information overseas particularly problematic. Using the Internet, the potential now exists for the disclosure of sensitive data by almost anyone on a scale previously achievable only through controlled mass media channels. Personal information can now be broadcast world-wide, by practically anyone, from practically anywhere. If an individual in the United States were to disclose privileged information, remedies are available toShow MoreRelatedCmgt 442 Week 4 Individual Assignment Outsourcing Risks Essay examples1253 Words   |  6 PagesOutsourcing Risks Name Course Date Instructor Outsourcing Risks Outsourcing has become an integral part of many organizations today. Outsourcing has its advantages and disadvantages that organizations will have to weigh to decide whether or not outsourcing is the best possible solution to their current problems and business operations. Outsourcing refers to the process of hiring external provider to operate on a business or organization function (Venture Outsource, 2012). In this caseRead MoreRisk Analysis for Outsourcing Decisions1466 Words   |  6 Pagesfollowing outsourcing situations: a) the use of an external service provider for your data storage; b) the use of an enterprise service provider for processing information systems applications such as a payroll, human resources, or sales order taking; c) the use of a vendor to support your desktop computers; and d) the use of a vendor to provide network support. The paper will include a risk mitigation strategy for each situation. Risk Analysis for Outsourcing Decisions Outsourcing, as definedRead MoreContemporary Business Environment613 Words   |  3 Pagesreliable business strategies and to utilize management accounting tools in order to support planning, control and decision-making. It is important that before engaging in any management plans the organization should understand that the accounting information is affected by the modern business environments which are dynamic, turbulent as well as complex. Hence accounting systems must be designed in a way that will enable them to withstand such environmental conditions (Coombs, Hobbs amp; Jenkins 2005Read MoreMeasures Companies Need to Take in Order to Prevent Computer Systems Failure819 Words   |  4 Pagesperforms the outsourcing in information technology. Among them include some scope are: 3.1 Banking Data Loss Prevention (DLP) is a security tool to stop users from sending sensitive or critical information outside the corporate network. By using the DLP, various problems such as data leakage, loss of information and the like can be prevented. Steps that can be taken to overcome this problem are through the protection of data loss. It plays an important role in ensuring that personal information is protectedRead MoreImplementation Of The Planwise Au Information Security Policy824 Words   |  4 Pagesof the Planwise AU Information Security Policy is to ensure we maintain the confidentiality, integrity and availability our information, including customer information. This is because our information that can be accessed by employees, contractors, external parties and customers must be protected from inappropriate use, modification, loss or disclosure. This policy is guided by the ISO/IEC 27002:2013 Information technology - Security techniques -Code of practice for information security controlsRead MoreBusiness Intelligence Plan1587 Words   |  7 PagesThe objective of this Business Intelligence (BI) plan is to encourage outsourcing and offshoring information security (IS) pursuits. The plan provides guidelines for successful implementation of IS systems intended to diminish security risks. The anticipated audiences of this BI plan are chief information officers (CIO) and chief information security officers (CISO). Senior management has an obligation to streamline information technology (IT) budgets, defend spending, and augment service deliveryRead MoreUnit 5 Assignment 11371 Words   |  6 Pagesand practices should reduce the human risk factors in information technology (IT) security and information access controls. Decrease the risk of theft, fraud or misuse of information facilities by employees, contractors and third-pa rty users. Scope †¢ the organization’s human resources policies, taken as a whole, should extend to all the persons within and external to the organization that do (or may) use information or information processing facilities.   This could include: * tailoring requirementsRead MoreFinancial Risks for Banks1881 Words   |  8 Pages 5 Discuss the various kinds of risks involved in outsourcing of financial services which in your opinion, Standard Chartered Bank needs to take note of? Question 3 6 What are the principles and procedures Standard Chartered Bank should put in place before outsourcing their activities? Question 4 Read MorePersonal Health Record ( Phr ) : An Emerging Model Of Patient Centric Health Information Exchange System Essay1360 Words   |  6 Pagesemerging model of patient-centric health information exchange system, which has been often outsourced to be stored at any third party locations, such as cloud service providers. However, there have been wide privacy concerns as the personal health information could be exposed to unauthorized parties and to those third party servers. To assure the patients control over accessing their own Personal Health Records, it is required to encrypt the PHRs before outsourcing. Yet, there are issues such as risksRead MoreBusiness Analysis : Outsourcing Payroll996 Words   |  4 PagesNational Small Business Association tax survey. Outsourcing payroll will help to alleviate some of your burdens as a business owner and leave you with some more time to focus on other aspects of your business. Rhonda Abrams, president of the business service site The Planning Shop, says, â€Å"One of my rules is if you have one employee, get a payroll service. The penalties for screwing up are so much more expensive than the cost of payroll.† Payroll processing includes making tax payments, wage adjustments

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.