Please enable JavaScript.
Coggle requires JavaScript to display documents.
1.2 The confidentiality protocols - Coggle Diagram
1.2 The confidentiality protocols
Storage of data and documentation
Electronic – backups, firewalls, SSL, encryption, stored safely, login names and passwords. And at the higher level, biometrics again.
Manual – Storing papers and printouts in a secure locked location, placing it in a safe, key locked room, bars on windows, security guards etc. At a higher level there is biometric access.
Benefits and drawbacks of maintaining confidentiality
Reputation – customers get upset and leave, customers lose faith, customers fear to place their trust in a company again. It all depends on the importance of the information.
If a school loses information, or there is a hack, parents get upset. They may merely voice this upset but keep their child in the school. Whereas if a bank loses account information, money goes missing but gets replaced.
Cost – Protection costs money, hardware needs replacing, security needs updating, Physical security costs as well, guards, bars etc. And these security measures are measured against the risks.
The importance of maintaining confidentiality
To the individual
Private/sensitive information does not become public knowledge.
Prevents identity theft and protects reputation.
To the organisation
To maintain competitive advantage.
To maintain trust and good reputation,
Protects new product ideas.
breaching confidentiality
Implications of breaching confidentiality
Alternatively information about a new product release before release could cost a company millions in development costs, jobs could be lost and the company prosecuted for the breach
The level of breach within an organisation can determine the damage done. One lost school report would mean an inconvenience of rewriting it at the best case and an angry parent at the worst case.
Reasons why confidentiality may need to be breached!
Duty of care- someone or an organisation might suffer if you don’t provide information for example, it may be necessary to provide to senior management the personal details of an employee who is selling confidential information to a competitor.
Evidence of danger or emergency- for example, it may be important to provide the contact details of the person in charge of security in case of a break-in, or personal information to a hospital in case of an emergency.
Embezzlement-theft by an employee of assets that below to the employer, this may include money, stock and stationary.