preview

The Effects Of Wages On Employee Turnover And Quality Of Care

Decent Essays

On August 1st, 2004 a computer system at UC Berkeley being used by a visiting economics professor, Candace Howes, was hacked through known security vulnerability (Poulsen, 2004). A database on the comprised system contained names, phone numbers, addresses and social security numbers of everyone that provides or received care through the California 's In-Home Supportive Services program, around 1.4 million records (Poulsen, 2004). Howes received the database from California 's Department of Health and Human Services to study the effects of wages on employee turnover and quality of care (Sullivan, 2004). This case is a prime example how Universities need to establish a governing body whose primary mission is to develop security policies and to enforce those policies to all colleges, departments and research groups. But the security policies must strike a balance in securing data and computer systems while at the same time not become a barrier or impede on students and faculty access to the systems and data.
Name Policies and Procedures to Limit Vulnerability While Still being Accessible In shaping a new security policies, it is essential to have a full understanding of all aspects of the internal network and services to be protected from both internal and outside threats. An article by Solms & Solms (2004) outlines several criteria in developing information security. First, a governing body must be formed to ensure all sensitive data is secured and provide due

Get Access