GOV 608 Public Info Systems Management Scenario Discussion
Scenario 1 Bill’s Vacation (the issue is real, but the story is fiction): Bill, an IT supervisor for five years at Acme Roadrunner Data (ARD) (not a real company), is returning with his work laptop from a month-long vacation with his wife in Asia. The couple visited Thailand, Vietnam, China, and South Korea. To stretch 15 days of accrued vacation into the month that he needed, Bill taking advantage of the time difference and ARD’s telecommuting policies, would log on and do his work remotely, knowing that he could get a full day’s work done in 3-4 hours. He used local hotel and coffee shop Wi-Fi and ARD’s VPN. With work finished, he would join his wife sightseeing. Upon his return to the USA, Bill is stopped in customs. They ask to see his laptop, which Bill hands over reluctantly. Customs and Border Patrol (CBP) turns it on and asks Bill for his password. Bill, because of his supervisor role, has a master password that gives him access to almost all the systems that ARD has. He uses this same password for the laptop, which contains a master copy of the ARD’s proprietary software and the user data encrypted with the same password. Bill believes he will be fired if he gives CBP access to sensitive company information and refuses. Protesting his rights as an American citizen, he asks why they want access to his laptop. CBP says that they are cracking down on the importation of child pornography and searching for people coming from Southeast Asia, where the problem is rampant. They go on to say that unless they are given access, Bill and his wife will be detained in a CBP holding facility. A personal complication for Bill is that fact that he and his wife (a married couple) took some fun risqué photos together with their digital SLR. Having run out of room on their SD card and not trusting such photos to the cloud, Bill stored them temporarily on his laptop until he could get home. Any search for “*.jpg” will find these photos, which though legal would be embarrassing for the couple. Bill uses his one phone call to call the ARD Legal Department. After several days in detention and with an ARD corporate lawyer present, Bill gives up his password to CBP. After thoroughly examining the laptop and its files, including the encrypted ones, CBP returns the laptop to Bill, and he and his wife are released. 1. BEFORE, What should have been the company policy/policies before this situation that would have prevented it? (Think creatively but also practically) 2. DURING, How should ARD, corporate legal, and Bill be handling this situation? 3. AFTER, Now that this has happened, how should ARD handle the situation with Bill? What new policies should be implemented (come back to Q1)? What went right for Bill in this Scenario? How might Bill have better handled the situation? What were Bill’s mistakes? 4. SPIRITUALLY, Imagine that you are Bill’s boss; what would be an ethical and Biblical way for you to deal with Bill’s situation? Discussion Guidelines (Read Before Posting) -Please review the discussion board guidelines outlined below. You must follow these guidelines in order to receive full points. Initial Post: -Your post should be no more than 250 words and posted by Wednesday. -Please post earlier in the week to allow your classmates time to respond. -Use at least one source in each discussion topic, preferably course-assigned texts. -Format your post using APA citation style. Use the following references first: Additionally, AI is strictly prohibited. References: Data and Goliath : the hidden battles to capture your data and control your world , Schneier, Bruce, BookMiller, Dan John,, Prince Frederick, Maryland :, Recorded Books, 2015., Total pages 1 online resource (339 pages) Cybersecurity ethics : an introduction , Manjikian, Mary, BookSecond edition., London, England ; New York, New York :; London, England ; New York, New York :, Routledge, [2023], Total pages 1 online resource (284 pages) Fire doesn’t innovate : the executive’s practical guide to thriving in the face of evolving cyber risks , Boyle, Kip, Book[Austin, Texas?] :, Lioncrest Publishing, [2018], Total pages 263 pages :
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.