IT Security in Google Report

Exclusively available on Available only on IvyPanda® Made by Human No AI

The Google’s New Privacy Policy is just an attempt to ensure high-level security of an individual’s data and improvement in the search field. For instance, the data searches on Google are linked to other websites such as You Tube. This only shows that Google is tracking people’s activities over the internet. At present, people share their contacts across Docs, Gmail, and Calendar. Since the internet has so many players, it requires an all-inclusive approach that will help in maintaining trust from the public. This policy has not violated information sharing to a third party; it simply makes the data available everywhere (Gross & Perez, 2012). In addition, the policy is trying to minimize cyber crime cases by tracking people’s activities over the internet.

Organizations planning to use Google as their communication platform will experience a few challenges, that is, the policy is not meant to share the enterprise’s data with an employee’s data. Markedly, Google cannot detect the connection between a personal account and a user’s work or employment account. These two accounts remain autonomous from each other. On the other hand, organizations that use Google apps should ensure that they renew their contract with Google to avert situations of information leakage to third parties (Gross & Perez, 2012).

Some of the social media services from Google that my employees can use include Google Buzz and Google+. All these products are inbuilt in Gmail. Therefore, they are easily accessible under a single click. The employees must verify their email addresses in order to ensure high-level of privacy. Under Google+, employees will be able to learn how other firms operate in achieving their objectives. The company can opt to block employees’ personal accounts during their working time or within the organization. This policy will enable employees to remain focussed on meeting their goals, as there will be less obstruction at work.

Possible security risks that can emanate when using Google cloud services may prove impossible to control. For instance, the linking of people’s data to all websites will make it easier for cyber criminals or hackers to access these pieces of information at ago. Information storage in the cloud, clearly, allows hackers to delete or alter all information in a person’s accounts. A case example is Mat Honan who hackers got into his email and iCloud account. The hackers erased all back up information in the Cloud, information in his Apple phone, and even deleted his Twitter account (Fogarty, 2012).

The revelation of the illicit affair between former CIA director and Paula Broadwell shows how privacy policy can be used to track down individuals who use the internet to engage wrongful acts. A detailed analysis of this relationship reveals that the two had been using an email with a pseudonym to communicate via drafts, as they could access this email. Broadwell’s attempt to send emails from this Gmail account made the whole affair to become known.

From this point, electronic data can be used as evidence in a court of law even though they are highly prone to distortion (Cyber Forensics, n.d.). Data privacy in this digital era needs info security professionals who ensure that there is no access by third parties. Further, data are always stored in computers as caches or in the internet. Therefore, data exchanges over the internet are easily tracked as history and can be used as evidence against an individual. People should be very cautious with the manner in which they handle their information over the internet.

References

Cyber Forensics. (n.d.). Cyber Forensics. Web.

Fogarty, K. (2012, August 10). The Biggest Cloud Computing Security Risk Is Impossible to Eliminate. Network Computing. Retrieved from

Gross, G., & Perez, J. C. (2012, February 24). Google: New privacy policy to have little impact on enterprise – Computerworld. Computerworld – IT news, features, blogs, tech reviews, career advice. Retrieved from

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2019, June 13). IT Security in Google. https://ivypanda.com/essays/it-security-in-google/

Work Cited

"IT Security in Google." IvyPanda, 13 June 2019, ivypanda.com/essays/it-security-in-google/.

References

IvyPanda. (2019) 'IT Security in Google'. 13 June.

References

IvyPanda. 2019. "IT Security in Google." June 13, 2019. https://ivypanda.com/essays/it-security-in-google/.

1. IvyPanda. "IT Security in Google." June 13, 2019. https://ivypanda.com/essays/it-security-in-google/.


Bibliography


IvyPanda. "IT Security in Google." June 13, 2019. https://ivypanda.com/essays/it-security-in-google/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1