You are on page 1of 6

Privacy, information that

contained important details


such as
the recipes which was
essential to the business
and should not be allowed
to be
accessed by anyone, only
for those people who are
legitimate and personnel
that
handle the said restaurant.
For storage, use a software
as your backup so that
when hard copies are
stolen, it is ensured that we
have the soft copy as our
resort
as well and this software
must also be accessible
only to the personnel.
Lastly,
security, as stated above,
using safe as storage for the
hard copy of the recipes
must not be reachable to
anyone or place it in a
room wherein only people
who
are given to that access
should only be the one who
can open or enter to that
particular room so that the
information is highly
secured. To sum this all up,
keep
in mind that information
should always be
confidential, verify the
items and be
careful of the important
information that are being
transacted
Case Study

Sue operated a small fully licensed restaurant that was making a reasonable profit from
the food, but she believed that liquor sales should be higher. Ray, her bar manager,
decided that it would be a good time to take a holiday and it was agreed he would take
three weeks off. He returned with ten non-alcoholic recipes purchased overseas. He suggested
that they go partners where he would make the drinks and the establishment would sell them
and buy all ingredients. They would split the revenue 80/20 with the large share going to the
business. All went well for a month until Ray had to leave early and asked Sue to store the
collection of recipe pages in the safe where the evening’s takings would be stored. At the
end of the night all takings had been by credit card so there was no need to open the
safe. When she arrived the next morning the recipes were in a different order and in a
different place. They had been read, possibly copied, and the confidential information was
now known by others. Ray threatened to sue the business.

Work task: As a result of this experience and the resulting costs and embarrassment the
owner of the business has asked you to consider what procedures should be used in the
future to improve the management of information within the business. Write a one page
memo giving your recommendations and your reasons.

A smart business owner always take into consideration on improving the performance
of their company. There are so many different options to improve your business, just like the
help of technologies tools, it can help to improve the business and to run it smoothly,
effectively and efficiently.

Based on the given case, it says that the confidential information about the collection
of secret recipe was being accessed by unknown personnel. In this case, this could be lead to
leakage of important information, it can cause a big impact to your business. Several aspects
are violated such as storage, privacy and security. I would now like to provide some
recommendation for future management of the confidential information about the business.
Information that contained important details such as the recipes which was essential to the
business and should not be allowed to be accessed by anyone, only for those people who are
legitimate and personnel that handle the said restaurant. Use a software as your backup so that
when hard copies are stolen, it is ensured that we have the soft copy as our resort as well and
this software must also be accessible only to the personnel. The goal of these Information
Security Procedures is to limit information access to authorized users, protect information
against unauthorized modification, and ensure that information is accessible when needed,
whether that information is stored or transmitted on printed media, on computers, in network
services, or on computer storage media. Lastly as stated above using safe as a storage for the
hard copy of the recipes must not be reachable to anyone or place it in a room wherein people
who are given to that access should be the one who can open or enter to that particular room
so that the information is highly secured. To sum this all up, keep in mind that the information
should always be confidential, verify the items and be careful of the information that are
being transacted, most importantly always be careful with the people you are trusting.

You might also like