Week 2 Bsa/310

Submitted by: Submitted by

Views: 279

Words: 768

Pages: 4

Category: Science and Technology

Date Submitted: 08/03/2013 07:11 AM

Report This Essay

Service Request SR-kf-013

K. and C. Consulting has reviewed the new frequent shopper program that is being considered for use within Kudler Fine Foods. As the consulting firm, we would like to focus on our concerns about the project in hand. The new frequent shopper program may have ethical issues, information security concerns, and potential legal concerns for Kudler Fine Foods. K. and C. Consulting will give an analysis of the new program as well as what to focus on before you implement the frequent shopper program at Kudler Fine Foods.

One ethical concern with the new frequent shopper program is regarding how customer information is collected, used, and stored. Attention to ethical issues must be standard for the program to protect the customer, company, and protect against questionable outcomes or fraud (Brooks, 2010). The project must establish protocol for the information that is collected from customers that will ensure it is protected from theft. Additionally, if information will be sold to other organizations, careful consideration must be made as to who, how much will be provided, and whether adjustments need to be made to the existing privacy policy.

Another security concern is related to collecting the name, phone number, address, and home income of a customer for the frequent shopper program and how it is safeguarded throughout the Kudler Fine Foods computer system. IT security should have the system safely guarded with antivirus software, firewalls, login names, and passwords; making it difficult for malice attacks by a social engineering organization or an employee wanting to exploit the company (Laudon and Laudon, 2010). The security division of IT should look over the servers and networks of the company and designate one area where information will be input into the frequent shopper software. By doing this it will help prevent a breech in the system and ensure the data of customers is not stolen by a social engineering organization....