Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.
Write 11 pages thesis on the topic business driven information technology. By taking into consideration of these policies, IBM effectively secures its information assets in quite an ethical manner. Th
Write 11 pages thesis on the topic business driven information technology. By taking into consideration of these policies, IBM effectively secures its information assets in quite an ethical manner. The company delivers two types of services one is ‘Managed Security Services (MSS)’ and the other one is “Cloud Security Services (CSS)’. Through MSS, IBM offers ‘single management console’ by which the IT department team frequently monitors its overall information infrastructure. With the help of CSS, the company provides an advanced technological platform called ‘IBM Virtual-Security Operations Centre’ by which it delivers high-value services to its customers which does not require low-cost security devices and maintenance (IBM, 2012).
Apart from these two services, IBM also offers application & data security services, identify and access management services and IT & network infrastructure security services. With the help of these services, the company has been ethically capable to secure its information assets. Since the initiation, IBM has followed certain business conduct guidelines in quite an ethical way by which it has been able to maintain confidentiality among its service software, application and information assets. . The company ensures that every level of personnel should comply with IBM directives, polices and mentioned guidelines. For instance, employee who expertise in specific areas such as procurement, tax, imports and export must also obey certain kinds of guidelines. IBM has extensive precious assets which comprise huge proprietary information such as the company’s intellectual property, confidential information assets, system software, and physical property. The company’s wide variety of services helps to strengthen its abilities in order to ethically manage, digitize and secure its valuable assets (IBM, 2012). . .
Recommendations for Additional Types of Ethical Practices and Security. By taking into concern regarding IBM’s business code of conduct, it has been observed that the company secures its information assets in quite an ethical manner. However, it is necessary for the company to understand employees’ issues and satisfaction levels regarding business policies and working environment. IBM should assess whether or not the employees are comfortable with the specified laws and policies. IBM’s top-level must understand and analyze every employee’s issues, behaviors and attitudes towards the workplace and should justify them in quite an ethical manner. Contextually, the security issue for IBM can be strengthened further with the frequent changes in passwords by the employees related to intellectual assets of the company such as project-related blueprints among others. Upgradation of security software to track malpractices such as hacking of confidential organizational data can be ensured through the use of firewall and augmentation of network security. .  .  . .
Chapter 5. Steps were taken by Popular Technology Manufacturers to Reduce E-Waste. ‘Electronic Waste’ or ‘E-Waste’ is one of the rapidly developing problems all over the world. E-waste primarily consists of a huge amount of various components such as toxic materials and hazardous materials among others which create an undesirable impact upon human health and environment if it is not dealt with adequately. The United Nations, non-governmental organizations and private IT sector companies have agreed to take serious initiatives in order to minimize the human health and environmental impacts that have emerged from electrical and electronic wastes. .