Professional Documents
Culture Documents
Instructions:
Question 1 [2.5
Attempt all questions
marks]
The major task of any project manager is to ensure that a project finishes within the original budget,
with the required scope of work and within the required timescales, and to ensure that throughout this
process all the stakeholders, especially the client, are satisfied with the project results. A professional
organization usually collects different types of data from their customers which contain sensitive
information about them. (Smith and Denis) are doing a project together with number of people
involved in it. Denis is the most punctual, hardworking employee and does the entire project work on
time. Upon submitting the document to their manager Denis finds out that Smith has already
submitted the same document before him with a different name and claims that he himself has made
it. After investigation, by Denis he comes up to the point that Smith is stealing the code and uses it for
their own purposes without proper tagging the original developer.
Following must be in your own words and reflecting your learning:
A description of system from the above case study. Assume you are the Project Manager in company;
apply some Managerial roles, Mintzberg’s managerial roles and basic OB Model.
i. How should an organization protect the privacy and security of their customer Information?
Answer i:
As a manager I would apply the following steps for the privacy and security of our customer Information:
Data privacy audit must be conducted: The first step is to figure out what data your company needs,
what data it collects, and how data is processed. If you handle medical, financial, or minors' data, bear
in mind your legal responsibilities.
Collection & retention of data must be minimized: Privacy advocates advice businesses to gather and
retain only the information necessary to offer their product or service. Businesses may also collect
additional data if they believe they will need it in the future. However, doing so increases the risk.
Securing the data: Even if you don't collect credit card numbers, other personal information you hold
might be useful to identity thieves. Notifying consumers that their personal information has been
Page 1 of 4
compromised in a hack is humiliating, not to mention expensive and harmful. And in many cases, such
disclosure is mandated by law. As a result, make sure your network, databases, and website are safe.
Privacy policy: The posting of a privacy policy on a commercial website is mandated by law. If your app
transmits data, most app platforms would need one as well. Cutting and pasting a boilerplate policy
isn't enough. Privacy policies are regarded by regulators as legally binding arrangements between you
and your customers.
Communicate: Customers expect clear descriptions of company data practices at key moments, such
as when they're asked to provide data. Most consumers will happily supply personal data necessary for
a service they want. Privacy advocates recommend direct and upfront communication with customers
about data you collect and your plans for using it.
Giving Choice: Customers want settings and features that allow them to choose whether or not to
share data, not sweet words about your respect for their privacy. They're looking for signs that
companies are "serving" them rather than "selling" them.
Provide a way for people to voice their concerns: Offer consumers an online form or an email address
to use to communicate their privacy issues or problems. Also, don't forget to respond to their
messages. Such two-way contact will aid in the development of trust and loyalty, as well as the
avoidance of possible privacy issues.
Input:
Process:
Make sure that the steps mentioned above are applied to protect and secure the customer’s data
Output:
Conclusion:
Rather than being a one-time operation, protecting sensitive information assets in an organization is a
journey. It requires a methodical approach to identifying sensitive data, comprehending current business
processes, crafting acceptable access, use, and distribution policies, and tracking incoming and outgoing
communications. Finally, it's crucial to comprehend the possible costs and implications of failing to create a
mechanism to protect nonpublic information from the inside out.
ii. What kind of violation do you think will occur in this kind of situation?
Answer ii:
In this case Data Protection Act is violated
According to this question I, as a manager will serve the following roles:
Disseminator:
Provides information about the violation to Smith and what actions should he take next.
Negotiator:
I will serve the role of negotiator between the two employees
Leader:
I will serve the role of a leader to lead and coordinate the activities of my subordinates because I am
responsible for the activities of my subordinates and I must motivate them to perform better.
Input:
The Data Protection Act is violated by Smith because he stole the work of Denis and Copyright
Infringement is done by him.
Page 2 of 4
Process:
By serving the role of leader, negotiator and disseminator I handled this issue by communication to smith
and Denis on this issue.
Output:
Smith has done Copyright Infringement of Denis work so he will be punished for violating data protection
act.
iii. How the copyright of the intellectual property of that software developer will be ensured? Which
Answer iii:
I will tell Smith to follow the formal process of stopping them starts with contacting Denis to ask that he cease
the use of Smith’s copyright. This is done through a cease and desist letter. If Denis refuses to do so, Smith can
escalate the matter by suing Denis for infringement. This can be a lengthy process and requires a large amount
of evidence from Smith.
In following ways the copyright of the intellectual property of that software developer will be ensured:
Page 3 of 4
APPLYING BASIC OB MODEL:
Input:
The issue occurred within my team about Copyright Infringement of Smith which destroys the image of our
team, and organization
Process:
I as a manager took the above mentioned ways to ensure the copyright of the intellectual property of that
software developer (Denis)
Output:
iv. Which type of fraud does Smith has to face from Denis in this regard which is the most
Answer iv:
According to me, Smith has to face Copyright Infringement Fraud from Denis. Copyright
infringement (colloquially referred to as piracy) is the unlawful use of works protected by copyright law without
permission for a usage where such permission is required, thereby infringing certain exclusive rights granted to
the copyright holder, such as the right to reproduce, distribute, display or perform the protected work, or to
make derivative works and Smith is stealing the code and uses it for his own purposes without proper tagging
the original developer.
Input:
The Data Protection Act is violated by Smith because he stole the work of Denis and Copyright
Infringement is done by him.
Process:
By serving the role of leader, negotiator and disseminator I handled this issue by communication to smith
and Denis on this issue.
Output:
Smith has done Copyright Infringement of Denis work so he will be punished for violating data protection
act.
Page 4 of 4