Scenario: A former employee repeatedly accessed his previous supervisor’s email account after leaving the financial company, allowing him to email himself company proprietary information and materials. The insider was an employee of a financial services company. After departing the company, the former employee repeatedly accessed his former supervisor’s email account (using credentials provided to him by the former supervisor) on about 100 occasions without authorization. The former employee sent emails from the former supervisor’s email account to his email account and his email account at his new employer's company. One of those emails included an attachment that contained proprietary information, including internal performance metrics. Another email attached is a password-protected spreadsheet with compensation and performance evaluation information for various employees.

Management Of Information Security
6th Edition
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:WHITMAN, Michael.
Chapter2: Compliance: Law And Ethics
Section: Chapter Questions
Problem 1EDM
icon
Related questions
Question
100%

Scenario:

A former employee repeatedly accessed his previous supervisor’s email account after leaving the financial company, allowing him to email himself company proprietary information and materials. The insider was an employee of a financial services company. After departing the company, the former employee repeatedly accessed his former supervisor’s email account (using credentials provided to him by the former supervisor) on about 100 occasions without authorization. The former employee sent emails from the former supervisor’s email account to his email account and his email account at his new employer's company. One of those emails included an attachment that contained proprietary information, including internal performance metrics. Another email attached is a password-protected spreadsheet with compensation and performance evaluation information for various employees.

Q. Concerning the above scenario, What information privacy principles have been breached? What you would do to address the situation?

Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Database Functions
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Management Of Information Security
Management Of Information Security
Computer Science
ISBN:
9781337405713
Author:
WHITMAN, Michael.
Publisher:
Cengage Learning,