Ask Business Law & Ethics Expert

Late one night not long ago, George Corday, SCM's Senior Manager of Information Systems noticed some heavier than usual traffic moving between three operational sites; Tokyo, Milan, and Tampa. As usual Tom was at his desk when the call came in; some people claimed Tom slept and ate there. Tom answered "Hello, CSO Tom Brown speaking." George answered: "Hi Tom, have you got a minute? I noticed something odd with our net traffic and wanted you to look at it." Tom replied with a scripted answer, the first entry in the company incident response plan, "What do you think you saw, where and at what time or times?" George gave Tom the information he had observed. A few hours later Tom called George back to give him the initial report that someone had tapped into their system and was using it to transmit data around the world. The data was embedded in some typical transactions; however, the attacker had placed a worm in the system, which apparently had the potential for causing damage well beyond the company's system. He suggested to George that they could employ a track and trace procedure to attempt to isolate the attacker. Tom said he wanted to isolate those links in the system to prevent the attacker from launching attacks to other sites or hopefully to prevent the attacker from using their system to launch system attacks on the vendor and supply chain. Tom said he was more concerned over the ability of this worm to infiltrate their government contractors linked via VPN, which may have access to sensitive data and sites. The surprising part of the conversation turned out to be that an SCM laptop was being used to access the network. In this phone call to Tom, George OK'd the use of the track and trace system Tom had created to find the attacker and disable their ability to use SCM's network. He wanted the identity of who had use of the laptop, and wanted to know if there was any potential for proprietary data being removed from their network of if the network was just being used as a carrier. George also informed him that he would communicate the illegal use of their network to Takio Sumi, CIO, as soon as Tom had removed the attacker's ability to use their network.

Do you think any laws may have been violated by SCM in this investigation? Perhaps international laws?

Where are any internal procedures violated by Tom and George?

The chain of events and type of attack should have required what type of response from the two employees?

At what point in time should SCM involve their contractors, vendors, and the government agencies? What is the appropriate way to do that?

Business Law & Ethics, Finance

  • Category:- Business Law & Ethics
  • Reference No.:- M91334476
  • Price:- $30

Guranteed 24 Hours Delivery, In Price:- $30

Have any Question?


Related Questions in Business Law & Ethics

Assignment -purpose - this significant task requires

Assignment - Purpose - This significant task requires forward planning and adequate time for research, reading and reflecting. The purpose of the assignment is to enable you to achieve outcomes in knowledge, skill and ap ...

Group report1 this group assignment consists of 2 parts

GROUP REPORT 1. This group assignment consists of 2 parts. Part A is a case study on contract law, and Part B is a question involving Corporations Law. Both questions must be answered. 2. The total word limit for the gro ...

Managing the legal environment assignment - research

MANAGING THE LEGAL ENVIRONMENT ASSIGNMENT - RESEARCH PROJECT Company: Nike (a) Summarise in about 250-500 words the characteristics/features of the organisation (you can choose a statutory/government body or select a bus ...

Corporations law - assignment questions -objectives -

CORPORATIONS LAW - ASSIGNMENT QUESTIONS - Objectives - Answer the following questions with reference to the relevant statute law and general common law principles operating in Australia concerning the consequences of the ...

Business law assignment question -mabo has been said to a

BUSINESS LAW ASSIGNMENT QUESTION - Mabo has been said to a cornerstone of the Australian legal system. Your response must discuss the following: 1. Discussion of the Mabo (No 2) case. 2. Explain the impacts of the case o ...

Assignment - advanced financial accounting1 classification

Assignment - Advanced Financial Accounting 1. 'Classification of liabilities is based on the same principles as the classification of assets.' Do you agree with this? Why or why not? 2. 'Classification of liabilities as ...

Property law for business assignment question -mrs betty

PROPERTY LAW FOR BUSINESS ASSIGNMENT QUESTION - Mrs Betty Joyce lives in an old, war-time vintage army shed in Baldivis. When she started to live in the shed, in the early 1960s, the whole area was a remote backwater. Si ...

Compare and contrast tort law and criminal law explain the

Compare and contrast tort law and criminal law. Explain the purpose of the law of torts in contract to the purposes of criminal law. Why are they different? Support your answer using specific examples from the textbook.

Assessment taskassignment questiondiscussi the main ways

Assessment Task Assignment question: Discuss: i. the main ways that a company may source finance; and ii. the benefits and costs associated with the main sources of corporate finance. Guidance - Students are to read text ...

Australian commercial and corporations law assignment -this

Australian Commercial and Corporations Law Assignment - This assignment deals with critical problem solving skills. This assessment tests course objectives addressing: Knowledge of relevant law, Application of the law to ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As