It has been 2 weeks since you conducted your first forensics investigation at Systematix. You feel more confident in your abilities and how you conducted yourself during the investigation. Even though you are a new employee, you are beginning to feel comfortable in your new role. Your manager seems pleased with your performance and openly commended you during last week’s staff meeting.
This morning, your manager calls you into her office and states she received a report from a manager in the contracts group who believes his supervisor (departmental director) provided confidential contract information to a competitor in hopes of being offered a high-level position with the competing company. The Contracts Manager has no concrete evidence of such theft but wants someone to investigate the possible unethical activity.
You set up initial meetings with key personnel in order to gather more information.
As a Forensics Support Analyst, you coordinate to meet with key personnel in order to gather more information. After your meetings are complete, you will summarize your findings by creating a written report.
Back to Top
Race and gender
Script: Text and Audio
The character’s position, viewpoint, opposing view, and so forth is below. This text also will serve as the audio.
Martha Massey, Security and Compliance Manager, Black Female
Internal Staff Meeting, Monday, 11 a.m.
“This is a serious issue. We take this inquiry solemnly and must do our due diligence and investigate this matter as soon as possible. At this point, the director’s subordinate manager is not 100% certain that company policy has been violated but wants us to perform a preliminary investigation. If you observe any red flags at all, let me know first before you share any information with anyone outside of our group. Let’s keep this internal right now. I want to review your findings. Remember, anything that is released from our department must be reviewed, approved, and if need be, edited by me. On a side note, when do you plan to obtain your Encase Certification?”
Arvind Patel, Manager, Indian Male
Office Visit, Wednesday, 1 p.m.
“I’ve been hesitant about reporting this, but my director, Steve Harman, may be providing private confidential information to one of our competitors. Steve used to be a very productive and energetic boss, but during that past 6 months, he’s been behaving strangely. I have been told by anonymous sources that he spends a lot of his time searching online job boards. I’ve also been told that he said he could, “Make a lot of money by doing consultant work for one of our primary competitors.” I just have the feeling that he may be communicating inappropriately with our competition. I think it would be a good idea to monitor his activity. He is my supervisor, so I wish to remain anonymous. I’ve never thought of myself as a whistle-blower but maybe I am. By the way, did I tell you his brother-in-law is a software developer in Nigeria?
Bart Oliver, Company Privacy Officer, White Male
Office Visit, Thursday, 10:20 a.m.
“Hello, I’m so glad to meet you. I understand you are new to our team! Let’s discuss the matter at hand. I’m sure you know my role here at the company so I won’t explain it to you, but please understand that security and privacy work hand-in-hand here. I want you to do what is needed to complete your investigation but also to keep in mind the employee’s right to privacy. After all, this isn’t the federal government, but I want to ensure that our network and information systems are adequately protected.”
Marrisa Rodriguez, Network Security Manager, Hispanic Female
Conference Call, Thursday, 2 p.m.
“I understand that you will need to conduct an investigation on one of our employees. If that is the case, I would be glad to assist you. We work very closely with the Security and Compliance Department and want to support you however we can. I trust no one in the organization, so it is important to protect myself from both superiors and subordinates. I’ve read about the Patriot Act, so I’m sure we can do pretty much whatever we want. These are business systems, and he should not have any expectation of privacy. I recommend that we begin collecting
* all e-mail traffic from his work e-mail account and private e-mail account;
* all websites visited;
* numbers from sent and received phone calls; and
* all voicemail from his personal cell phone.”
Activity or Assignment
Read the You Decide scenario and using the information provided, prepare a two- to three-page report (at least 300 words per page), not including the Title Page, Abstract, or References pages, using the APA format (see the APA template in Doc Sharing). Recalling the information collected during the interviews and information from the text, your report should address the following areas.
The role of the Corporate Privacy Officer and Information Security Officer during whistle-blowing events and measures used to protect Whistle Blowers from retaliation
Relationships between IT workers , UT users, and employers
Malicious insiders and cyber-criminals
Technology certifications and their value
Inappropriate use of computing systems
Note: It is recommended to create six sections within your paper to discuss each of the bullet items.
Submit your assignment to the Dropbox located on the silver tab at the top of the page.
Category Points Description
Demonstrate a strong grasp of the problem at hand
Demonstrate understanding of how the course concepts apply to the problem
Apply original thought to solving the business problem
Apply concepts from the course material correctly toward solving the business problem
Communicate answers clearly and succinctly using strong organization and proper grammar
Adhere to the APA format (title page, abstract, page header, reference page, etc.)
Total 80 A quality paper will meet or exceed all of the above requirements.
Submit your assignment to the Dropbox located on the silver tab at the top of this page. For instructions on how to use the Dropbox ,
Paper#36447 | Written in 27-Jan-2016Price : $20