Thursday, June 6, 2019
Pfizer Essay Example for Free
Pfizer EssayPfizer has new technology that helps to access the system of rules easily. They have a talented badger consisting of proximity device so that as a person walks near a computer, there is a signal emitted by smart card which verifies you. There is theatrical role of pin number so that no one can use another persons card and pin number is used in other parts of the company such as making charges at cafeteria and accessing the building physically. When Pfizer is deploying data system, they take their time to cooperate with people who do trade in order to know the stakes involved in storing and transferring information. They do not under shelter information or over defend it. Business can be impeded by overprotecting information which can make security be thrown out. They partner with information technology and business in order to protect business, offer quality products and services and make profit. (Betancourt, 2002 pp19-21). Describing policies and measures use d by Pfizer to ensure confidentiality, availability and reliability of data and information Confidentiality of data is ensured through a system that employs cryptography such as public key and symmetric key in order to encrypt and decrypt information and data.There is an entity that reads sensitive information and data and the key represents a secret property. To ensure availability of data and information Pfizer has prescription coverage to ensure access to its medicines that are new and astray prescribed. Through number 866 706 2400, there are live operators to guide patients according to their needs and the programs for public assistance according to medical needs and income. The reported termination of patients measures determines how treatment of a disease affects patients.To ensure there are results that are useful clinically data gathered must use reliable cognitive psychology, clinician and patient input. This is done by determining the purpose of patient reported outcome in order to demonstrate its reliability. (Nurss, 1998 pp11-12). How Pfizer organization protect loss of data In order to avoid loss of data, Pfizer protects retirement of information collected from external organizations through online opportunity process of submission which supplements privacy policy of Pfizer which can also apply to personal data and identifiable information.For Pfizer to ensure personal data is secure, it uses data customary that protects electronic and manual processing. security system technology in online opportunity ensures securities that avoid loss of data, misuse of data, unauthorized disclosure, destruction and alteration of data. Steps taken to ensure data remain come-at-able in event of catastrophic event such as fire and other natural disaster Actions are taken to lower exposure to risk arising from hazard to safeguard arrestment efforts. Developing systems for early warning helps in reducing risks and having capabilities to respond to catastrophic events.Disaster recovery is used in find information in event of catastrophe. Disaster recovery planning is devoted to prepare for action to respond to catastrophic event. Assessment in disaster recovery is simulating catastrophic event and planning for disaster recovery in order to have recovery need that are specified. Plan for disaster recovery state of matter duration the recovery should take and the state of data expected by the users and management need to be informed all the time of these specifications which are incarnate by recovery assessment.Things I think Pfizer could do to further enhance information securityThere should be enough circulating space inner the organization so that staff can move around freely without use of lifts. Employees should avoid calling their colleagues using phones but instead use breast to face communication about information concerning the organization and cellular office space should help to make communication easy. Government should ta ke action to develop mechanisms for sharing information with private sector by engaging private sector actively in determining requirement of information and having a confederation that is based on trust. ( Parker, 1996 pp21-23).
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.