Class Notes (808,385)
Canada (493,173)
Marketing (154)
MKT 2210 (46)

Chapter 18.docx

4 Pages
Unlock Document

University of Manitoba
MKT 2210
Subbu Sivaramakrishnan

Chapter 18:Security in the workplace Security is important to protect the employees,to protect the assets,to prevent unauthorised access and to protect confidential and sensitive information. Security risks can be identified as vulnerable items and people(items that are valuable and movable,valuable information in portable form,security devices,staff in front line,staff with custody of assets,VIP) together with vulnerable points in premises(public areas,point of entry and exit,unattended areas,ill-lit areas which mean dark areas,areas where at-risk items and data are concentrated,points of items exchange). In the principles of security,effective security is a combination of delay,checking and alarm.Delay is the lines of defence before vulnerable areas and items can be reached(eg.outer doors to the main building,reception area,guarded offices,lockable filing cabinets and safes).Checking is the procedures for authorised access to vulnerable areas or items(eg.identification of authorised staff,checking/signing in/escorting visitors,challenging authorised individuals,personal passwords,checking authorisation before access to files allowed).Alarm is the procedures for alerting those responsible for responding to security breaches(eg.electronic security alarms,individual alertness and response,computerised warning of file access attempts). Procedures or devices of controlling access include lock the doors and windows;swipe cards may allow only for authorised individuals to trigger the opening of doors;combination locks may be used to control the opening of the door;video and entry phone systems may be used so that entrants can be identified by those inside;using locks for cabinets,cupboards and drawers;some items should be kept in a strongbox or safe;computers and computer files can be protected using electronic password and access codes. In a company,the security procedures manual may include procedures for:identifying regular staff(eg.requirement to wear an identity badge),vetting non-staff members(deal with people who visit the company),non-business visitors(eg.requirement to ensure that these visitors are escorted at all times),protecting the building(eg.ensure certain doors and access points are kept locked at particular time),protecting the organisation's assets(eg.lock away calculators and laptop computers in secure drawers),protecting documents and information(eg.locking away files and ledgers),protecting the procedures( not discuss the oganisation's security procedures to others),explaining what to do in the event of security breach(eg.instructions about how to deal with intruders). Information is an item at risk of security breach.People may seek to sabotage or steal information from organisation for sale value,competitive advantage and pure nuisance value(steal for no reason).Certain types of data may be particularly at risk:information integral to business's standing and competitive advantage,personal and private information relating to employee and customers,information related to security of the organisation,information integral to the outcome of dealings which would be affected by public knowledge(eg.exam questions). Legal issues in security focus on employee privacy and data protection.Data Protection Act 1998 protects:individuals(not corporate bodies),in regard to the gathering,storage and use of personal data(information about a living individual,including facts and expression of opinion). Risks to data and ways to minimised it include:Human Error(individuals loss,damage or incorrectly input or sto
More Less

Related notes for MKT 2210

Log In


Don't have an account?

Join OneClass

Access over 10 million pages of study
documents for 1.3 million courses.

Sign up

Join to view


By registering, I agree to the Terms and Privacy Policies
Already have an account?
Just a few more details

So we can recommend you notes for your school.

Reset Password

Please enter below the email address you registered with and we will send you a link to reset your password.

Add your courses

Get notes from the top students in your class.