Tuesday, May 5, 2020

Sharing Confidential Information on Social Media

Question: Describe about the Sharing Confidential Information on Social Media. Answer: Introduction In this journal article, the thesis statement mainly describes about the Government laws, rules and regulations regarding the issues of disclosing the confidential information and communications of any organization in social media. Tamsin McMahon is the author of this article. His main purpose about this journal article is to make aware the employees of any company about the power of internet connection through which they can share any confidential data, information and communication of any company (Di Gangi, Johnston, Worrell, Thompson, 2016). According to this article, the Supreme Court of Texas implements a set of the rule related to the remove of a blog post of an organization which declares or claim that an employee makes a plan which is a kickback scheme of that particular company. The lower Court of Texas rejects this activity of removing any posts from the blog because in blog post everybody has the rights to serve their opinion freely. The court always supports the Company' s right about firing their employees those who hampered the reputation of the company and also insult their supervisors, employers, and co-workers through their personal accounts on social media. As the employees of any organization have the power to disclose the confidential information of the organization, the employer increase the use of some technological tools and software which can able to give a hard security to the computers within the organization (Gozman, Currie, Seddon, 2016). According to this thesis article, Tom Keenan is another author who said that the company or organization should install exfiltration software by maintaining a routine. By the help of this software, the corporate heads can monitor or control the entire systems of the corporate device to detect the working module or performance of the employees within the organization. Author Tom Keenan is an expertise in the field of computer security. For this reason, once the CEO of Calgary hire him to install com puter security in their computers secretly (Hall McGraw, 2016). Tom Keenan also write a book named Techno creep which gives a detailed information and knowledge about the possible ways through which the technology has corrode the privacy rights of any organization. Main Context MCMAHON, TAMSIN. "Government Regulation Confidential Communications -- Laws, Regulations And Rules Disclosure Of Information -- Laws, Regulations And Rules Social Media Business Enterprises". Ra.ocls.ca. N.p., 2014. Web. 22 Nov. 2016. According to this article, the information and data which are provided is actually a fact which can be verified by the researchers. The central argument of the author is that in the recent period of time the young workers want to develop or introduce themselves as a personal brand on social media. For this reason, some of the times the difference between the personal information and the organizational information on social media remain indistinct which hamper the privacy of that particular organization (Johnston, 2014). That is why; the social media is completely banned by the companies at the time of doing work. They also banned the discussion about the organizational business on social media legally. According to the researchers, the government laws, rules and regulations are important to stop the hacking and disclosing of confidential information and data of the organization. There are so many numbers of logical reasons, to enact a law regarding this issue of disclosing confidenti al data and information of the organization on social media. Due to the disclosing of many information and videos about the internal works of the organization, hampers the reputation of the company tremendously (Liu, 2013). The business clients also get angry and feel insecure to deal with that particular company. In the recent days, the laws, rules, and regulations related to the disclosing of confidential information can slowly able to catch up the exhaustive and extensive reach of social media within the workplace of any organization. In recent days, due to this reason, Facebook firings are getting increased within Canada. The court always supports and encourage the Company's right about firing their employees those who hampered the reputation of the company and also insult their supervisors, employers, and co-workers through their personal accounts on social media (MCMAHON, 2014). As the employees of any organization have the power to disclose the confidential information of the organization, the employer increase the use of some technological tools and software which can able to give a hard security to the computers within the organization. By the help of these tools and software, the employers can able to detect the posts about the sharing of confidential information of their companies which is shared by their employees on social media. According to the journal article, Tom Keenan once hired by the Chief Executive Officer of Calgary Company because he is an expert in the field of access computer security. For this reason, the CEO of Calgary Company brings him into their company to secure their organizational computers secretly and confidentially (Ng, 2016). They install a keyword logger on the suspected workers computer secretly. By the help of this exfiltration software, the company is able to detect and catch the employee red hand to share the confidential information and data to the competitor organization of that particular company (Reamer, 2012). According to Scott Kaine, president of Cyveillance, some of the companies has already created a team of intelligence whose may work is to surf the web regularly maintaining a time interval and investigate the posts, videos, and articles of the company and the writings about the executive and working procedures of the company. For example, a firm in Virginia offers a se rvice which provides such type of web scanning activities to the other clients or companies who really need this process to detect those employees who illegally post confidential information and data about the company on social media. Generally, the chat rooms within the organizations are main are where the employees steal the confidential information about the organization and disclose it in front of hackers and other competitor companies (Richards, 2015). Most of the time the most unsatisfied employee has the tendency to disclose the confidential information about the company and cause a huge damage to the reputation of the company within the market. However, according to the Scott Kaine, president of Cyveillance, there are also so many numbers of employees on social media who never try to disrespect or disclose any information about their companies on social media (Sarfaty, 2013). Therefore, it can be said that the enactment of law, rules, and regulations can help the company to restrict the share of confidential information and data of the company on social media. However, the employees also have the rights to speech and deliver their opinions freely on social media but not the confidential data of the company. According the researchers the author get biased about the employees and support that they can freely deliver their opinions on social media which hampers the reputation of a company tremendously. Conclusion In this thesis paper, the researchers can state that the disclosing of any type of confidential information of any company on social media is an illegal activity which is performed by that particular employee and for this act he should be punished by the higher authority of the company. Though internet became a great power for the unsatisfied employee to share the confidential information, videos and data about the company on social media and hamper the reputation and goodwill of that particular company within the market but it is an illegal activity according to the law which is enacted by the government to support the companies. The higher authority has the right to punish and fire that particular employee who wants to create such type of blur within the market. For this reason, some of the times the difference between the personal information and the organizational information on social media remain indistinct which can also hamper the privacy of that particular organization. In t he recent days, the companies are utilizing computer software which is able to detect and catch the suspected employee who wants to share the confidential information and data to the competitor organization of that company. This software provides a high-security level to the organizational computers of that company. Hence, it can say that the laws which are enacted by the government to catch those employees who share the company information on social media become very beneficial for the employer of the companies. However, the people have rights to speech freely and can freely share their opinion on social media. References Di Gangi, P., Johnston, A., Worrell, J., Thompson, S. (2016).What could possibly go wrong? A multi-panel Delphi study of organizational social media risk. Retrieved 22 November 2016, from Gozman, D., Currie, W., Seddon, J. (2016).The Role of Big Data in Governance: A Regulatory and Legal Perspective of Analytics in Global Financial Services.Papers.ssrn.com. Retrieved 22 November 2016, from https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2752561 Hall, J. McGraw, D. (2016).For Telehealth To Succeed, Privacy And Security Risks Must Be Identified And Addressed. Retrieved 22 November 2016, from Johnston, J. (2014).Loose tweets sink fleets and other sage advice: social media governance, policies and guidelines. Retrieved 22 November 2016, from Liu, R. (2013).New Results on Multiple-Input Multiple-Output Broadcast Channels With Confidential Messages - IEEE Xplore Document.Ieeexplore.ieee.org. Retrieved 22 November 2016, from https://ieeexplore.ieee.org/document/6408170/ MCMAHON, T. (2014).Government regulation Confidential communications -- Laws, regulations and rules Disclosure of information -- Laws, regulations and rules Social media Business enterprises.Ra.ocls.ca. Retrieved 22 November 2016, from https://ra.ocls.ca/ra/login?url=https://eds.b.ebscohost.com/eds/detail/detail?v%E2%80%A6RzLWxpdmUmc2NvcGU9c2l0ZQ%3d%3d#AN=edsgcl.363972662db=edsgao Ng, C. (2016).Public spaces as workplace for mobile knowledge workers.Emeraldinsight.com. Retrieved 22 November 2016, from https://www.emeraldinsight.com/doi/abs/10.1108/JCRE-10-2015-0030 Reamer, F. (2012).Social Work in a Digital Age: Ethical and Risk Management Challenges. Retrieved 22 November 2016, from Richards, N. (2015).Why Data Privacy Law Is (Mostly) Constitutional The Contemporary First Amendment: Freedom of Speech, Press, and Assembly Symposium 56 William Mary Law Review 2014-2015.Heinonline.org. Retrieved 22 November 2016, from https://heinonline.org/HOL/LandingPage?handle=hein.journals/wmlr56div=40id=page= Sarfaty, G. (2013).Human Rights Meets Securities Regulation.Papers.ssrn.com. Retrieved 22 November 2016, from https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2390192

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.