Does Outsourcing Pose a Threat to the Security and Confidentiality to the Firm? (2012)
Outsourcing IT Data Security Dissertation – Outsourcing has become a common practice for most of the companies for various reasons. It reduces cost, provides better and timely services and sometimes it is helpful in getting the services of the best talent available in the market. BestBuy is among other many companies who avail outsourcing for the same reasons mentioned above.
But outsourcing has some threats also associated with it and the most important threat for an IT company like BestBuy and others is the loss of control regarding data security. This is a problematic situation since any data or confidential and sensitive information the company client may have provided to the vendor will often be stored on, and accessible from, the vendor’s systems. If this company client confidential and sensitive information is disclosed from the vendor (for example, via a security breach), the company client is generally the one that is going to be responsible for and have to deal with any associated (i) breach of legal requirements, (ii) liability, (iii) loss of reputation, (iv) loss of customers, and (v) related problems.
BestBuy is also supposed to deal with the situation in the same manner if it arises. The aim of the study here to understand the benefits and costs of outsourcing in the context of BestBuy and the security protection of the data at BestBuy. It also deals with the factors and measures that contribute to the security and confidentiality of the data outsource of the IT department at Best Buy.
The discussion further extends to other aspects of outsourcing IT data security process, types of IT security outsourcing, benefits and cost associated with outsourcing, factors or threats that affect the outsourcing IT data security and steps or structure to be considered to protect the security of outsourcing or measures to protect the IT information on outsourcing as well as average of financial cost that the IT outsourcing of Best Buy spend on security.
- 10,000 words – 34 pages in length
- Good use of literature
- Good in depth analysis
- Well written throughout
- Ideal for business students
1 – Introduction
2 – Literature Review
3 – Methodology
Purpose of Research
Research Design
Procedure
Methods
Reliability
Limitation
4 – Results and Finding
Understanding Risks
Managing Security Risks
5 – Discussion and Conclusions
References