8.1.1 Maintaining privacy and confidentiality of an organisation's information and that of stakeholders Flashcards
State:
2 examples of what an organisation may store information about
2 of:
* Employee salaries
* Employee perks
* Client lists
* Trade secrets
* Sales numbers
* Customer information
* News about pending restructuring
FIll The Blank:
Information the company stores such as ……….. ……………. and employee ……………….. must be kept confidential because any ……………. relating to this information can have a serious impact leading to possible loss of ……….. or business. This could lead to a downturn in the ………….. of the organisation which may ultimately lead to failure.
Trade Secrets, Salaries, Breaches, Clients, Health
Explain:
Why it is important that employee salaries and perks are kept confidential
Different employees carrying out same task may not be paid the same because of different experience or other factors
Fill The Blank:
A client list may inlude individuals but also named ………………. of other businesses/organisations and should only be accessed by ………………… if abosolutely necessary
Representatives, Employees
Fill The Blank:
Customer …………………… usually relates to those who buy goods or services and usually includes …………………. details.
Information, Personal
Fill The Blank:
If privacy and confidentiality of client lists and customer ………………….. are not maintained, the organisation could lose clients or …………………. and people should expect that any organisation storing their personal data will keep it ………… and ……………… to limit any breaches.
Information, Customers, Safe, Secure
Fill The Blank:
The breach of personal data can have an impact on the …………………. and the people whose data has been …………………
Organisation, Leaked
Fill The Blank:
Any leak of ……… of a pending restructuring can have an impact on the organisation and its internal and external stakeholders, for example if employees here news that could threaten their job they may ……………
News, Leave
Fill The Blank:
Maximising privacy can be done by using …………… controls, ……………….., authorisation and other security procedures to limit the access to the data and information - important data should also be regularly …………………. up
Access, Priveleges, Backed