Security Management

Running Head: Management 1
Security Management
Name
Institution of Affiliation
Course
MANAGEMENT 2
Abstract
This paper identifies connections between security management and ethics. It explains how
professional employees can work in collaboration with each other and their supervisors in
ensuring there is less chance of any security breaches. Assessment of the legal implications that
surround security management and how to safeguard data by use of security systems. Measures
put in place to ensure information is only accessed by authorized persons and any unauthorized
individual is locked outside. In case of legal violations what steps a company can take in order to
ensure that suspects are prosecuted within the legal ground. The agencies to consult in case
matter of insecurities arises.
Introduction
Security management is an extensive field which encompasses overseeing organization’s
assets through implementation, documentation, and development of key procedures for the
purpose of assets protection. Companies depend on security management in ensuring their
investments are secured (Yildirim et al; 2011). When it is poorly managed the firms operations
can be paralyzed hence causing jeopardy or financial loss and destruction of the business image
making clients reluctant to engage with the firm in question. Organizations have to address the
issue of security and be able to come up with actions that can assist in its management.
Employees are bound to operate under the relevant laws put in place. Some laws are difficult
and complex to interpret and are applicable to a wider range of circumstances. In these
situations, workers should take a step and consult a department of law in case there is doubt
MANAGEMENT 3
about the course of action. Failure to ask for advice is viewed as a noncompliance excuse.
Workers must operate under legal grounds (Newman, 2010).
Loyalty is essential in a business setting and anything that prevents anyone from operating with
absolute objectivity should be eliminated ie conflict of interest. Employees should perform their
tasks with at most faith to the company. Functions that entail the unauthorized use of equipment,
information or time, which to an extent affect the organization’s interests must be avoided. The
situation of concern is when interests of the business conflicts with personal interests in relation
to competitors, customers, and suppliers (Quigley, 2007).These non-ethical conducts can cause
some security breaches to information or business assets. Employees using their influence for
advantages of others or personal advantage must be prohibited.
Workers should not take part in any activities or discussions with lenders, advisors or
participants of the organization because of security concerns. A firm can be greatly harmed if it
happened that sensitive ideas of the company fall into wrong hands. If the employee wants to
take part in various activities on the behalf of the organization then he should seek advice from
his superiors so as to safeguard the firm’s interests (Jefferies, 2010). Employees are highly
discouraged to deal or purchase with the third party or some of his family members for his own
benefit. It only applies to dealings and purchases and not a gift or inheritance acquisitions.
Managers should ensure their employees are aware of these ethical issues and prohibitions in
order to protect the security of the assets.
Employees of procurement are supposed to acquire services and goods by use of top-notch
ethical principles. Procurement procedures and practices should be applied meticulously,
contractors and suppliers should be treated consistently, fairly and the firm should ensure there
MANAGEMENT 4
are equal opportunities to all who wish to do business with the organization. During bidding
some bidders may try to engage in post-bid interactions which are not under normal clarification
for the bid process, offer the unsolicited reduction of prices or side bid concessions after
submission. Agreement to these unsolicited offers is contrary to procurement ethical guidelines.
The bidding process is highly confidential and any activity that circulates around it should not be
given to the third party. The procurement policy of the company should open up on ethical
practices of the business in order to protect the company from any loss or damage. Staffs and the
management should come up with their own practices that are consistent and in line with the
policies in place. Business policy conduct compliance is the key priority throughout the
organization. Failure to follow the business conduct principles may expose employees and the
company to risks like a criminal prosecution, civil proceedings and administrative sanctions
(Dratwa, 2014).
Violation of business conduct policy results in a violation of the intent and spirit of ethical
behavior. They include Unauthorized disclosure or use of sensitive information which is
classified, acceptance of entertainment or gifts that make us lack the ability to act impartially,
conflicts of interest and manipulation of records. Management can respond to these cases
internally and procedures of discipline will be appropriately applied. In order to overcome all
these the organization should provide mechanisms which will assist in handling judgment
decisions which are difficult, in situations where to distinguish what is wrong or right is very
hard. The management system should ensure that when such issues come up employees should
easily seek counsel from their supervisor. Managers should exercise open-door policy when it
comes to ethical questions. They should be easily available when employees need such questions
MANAGEMENT 5
to be addressed. Ethical behavior or moral standards questions are required to be brought
forward before the fact and not after the fact (Tipton, 2013).
The other action involves various ways which will make policy attention a vital section of
business management. They involve:
The corporate security is supposed to oversight the programs ie follow-through programs.
Secondly, staff group and businesses must ensure that the procedures are reviewed at least after
every financial year. Reviewing ensures that any outdated procedure and practice is discarded,
giving way to the current or most recent ideas (Pieters, 2011). In addition, one individual should
be appointed for the purpose of communicating with employees on issues involving the
application, suspected violation, and interpretation of the various principles. The designee must,
routinely, keep corporate security, the director informed of all tasks concerning the principles
which might come up in the business.
Embezzlement of funds, fraud, company assets diversion, intentional damage to the facilities
and theft are some of the legal violations that can take place as a result of poor security
management. They represent an act of crime against the company. It is within the right of the
firm to assist and seek full prosecution of individuals who have carried out criminal activities to
the organization. (Ryan, 2010). The case particulars are presented to agencies that deal with law
enforcement for pursuing possible prosecution after the determination. All criminal losses are
supposed to be investigated with the help of corporate security and the internal auditor.
Organization information is available in many locations, types, and forms. There should be
applicable security measures in place to safeguard it. Business information is utilized for the
MANAGEMENT 6
purpose of organization development and any unauthorized person is not supposed to access it or
used for making personal gains or private interests. Firm’s information concerning the financial
condition, earnings securities must be protected before it is properly and fully disseminated in
the public domain. Examples of the particular area of sensitivity are possible acquisitions,
explorations, trends, current earnings, new plant, production plans, processes, and products.
Various tools and procedures are used by the company to secure, protect servers and data owned
by the firm. If the information lands to rival businesses they can use it against the organization
hence resulting in major losses and eventually closure of all the operations (Mithas, 2011).
System securities are essential in monitoring security access in systems of various computers
and servers information that are commonly utilized by the business. System security plays a
central role in protecting firm’s data used by authenticated persons (Stallings, 2012). Extended
authentication methods and strong passwords can be generated to secure servers and computers.
Encryption of data is essential to code, scramble and encrypt the information, making it available
to only authorized users. Security management is required to identify the key threats to the
company.
Physical security is a vital part of security management. Competent and trusted people
should be given the mandate to protect storage equipment. Strong padlocks and locks should be
put in place to ensure no intruder has access to the premises. Security professionals who are
tasked to look after equipment in storage must be able to analyze, investigate and identify
problems in the cash register without referrals from store managers. Alarms, CCTV cameras or
even watchdogs should be deployed to ensure security is very tight (Von Solms, 2011).
Conclusion
MANAGEMENT 7
Ensuring that organizations implement and monitor their security management is one of the
best ways to ensuring that unwanted damages and loss of property is avoided. There are ethical
guidelines that need to be followed so that the company can engage in clean purchases or
procurements. These principles ensure that there is no conflict of interest and employees can
execute their duty impartially. In case of legal violations, there are avenues that the firm can seek
without infringing the suspect’s rights. Information is a vital asset for any given company and
security measures should be put in place in ensuring that there are no loopholes for data
leakages. Authorized individuals should be the only ones to access the vital information.
Employees must be aware of who they should engage with and who not to so as to minimize the
possibility of breach of contract which might cost the company.
MANAGEMENT 8
References
Yildirim, E. Y., Akalp, G., Aytac, S., & Bayram, N. (2011). Factors influencing information
security management in small-and medium-sized enterprises: A case study from
Turkey. International Journal of Information Management, 31(4), 360-365.
Stallings, W., Brown, L., Bauer, M. D., & Bhattacharjee, A. K. (2012). Security: principles and
practice (pp. 978-0). Pearson Education.
Pieters, W. (2011). Representing humans in system security models: An actor-network
approach. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable
Applications, 2(1), 75-92.
Newman, E. (2010). Critical business security studies. Review of International Studies, 36(1),
77-94.
Mithas, S., Ramasubbu, N., & Sambamurthy, V. (2011). How information management
capability influences firm performance. MIS quarterly, 237-256.
Tipton, H. F., & Nozaki, M. K. (2013). Information security management handbook. CRC press.
Von Solms, B. (2011). Information securitya multidimensional discipline. Computers &
Security, 20(6), 504-508.
Quigley, M. (Ed.). (2007). Encyclopedia of information ethics and security. IGI Global.
MANAGEMENT 9
Jefferies, P. (2010). Multimedia, cyberspace and ethics. In Information Visualization, 2000.
Proceedings. IEEE International Conference on (pp. 99-104). IEEE.
Dratwa, J. (2014). Ethics of security and surveillance technologies. Brussels: Brussels.
Ryan, G. W., & Bernard, H. R. (2010). Data management, analysis methods and security.

Place new order. It's free, fast and safe

-+
550 words

Our customers say

Customer Avatar
Jeff Curtis
USA, Student

"I'm fully satisfied with the essay I've just received. When I read it, I felt like it was exactly what I wanted to say, but couldn’t find the necessary words. Thank you!"

Customer Avatar
Ian McGregor
UK, Student

"I don’t know what I would do without your assistance! With your help, I met my deadline just in time and the work was very professional. I will be back in several days with another assignment!"

Customer Avatar
Shannon Williams
Canada, Student

"It was the perfect experience! I enjoyed working with my writer, he delivered my work on time and followed all the guidelines about the referencing and contents."

  • 5-paragraph Essay
  • Admission Essay
  • Annotated Bibliography
  • Argumentative Essay
  • Article Review
  • Assignment
  • Biography
  • Book/Movie Review
  • Business Plan
  • Case Study
  • Cause and Effect Essay
  • Classification Essay
  • Comparison Essay
  • Coursework
  • Creative Writing
  • Critical Thinking/Review
  • Deductive Essay
  • Definition Essay
  • Essay (Any Type)
  • Exploratory Essay
  • Expository Essay
  • Informal Essay
  • Literature Essay
  • Multiple Choice Question
  • Narrative Essay
  • Personal Essay
  • Persuasive Essay
  • Powerpoint Presentation
  • Reflective Writing
  • Research Essay
  • Response Essay
  • Scholarship Essay
  • Term Paper
We use cookies to provide you with the best possible experience. By using this website you are accepting the use of cookies mentioned in our Privacy Policy.