ITM 102 Chapter Notes - Chapter 8: Computer Virus, Digital Data, Records Management

67 views8 pages

Document Summary

Opening case: canadian law firm wins the case for e-mail security. The problems created by email and email vendors for watson goepel maledy illustrates some of the reasons why businesses need to pay special attention to information system security. The potential for violating canadian privacy legislation and having client information accessible by american authorities meant the firm had to change its email vendor. In doing so, the firm increased its email security and reduced the volume of spam e-mail it received. Security refers to the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft or physical damage to information systems. Controls are methods, policies, and organizational procedures that ensure the safety of the organization"s assets, the accuracy and reliability of its records and operational adherence to management standards. When large amounts of data are stored in electronic form, they are vulnerable to many more kinds of threats than when they existed in manual form.