Would you like to make this site your homepage? It's fast and easy...
Yes, Please make this my home page!
RESEARCH PAPER - PART III
Siemen's, Inc.
IX. CONCLUSION
From the data gathered from the interview, the researchers have concluded that, yes, their means of securing data and keeping information confidential is effective, and in the future will be even more effective as newer innovations is applied. On the other hand, the instruments for access to the Intranet is literally held by the employees and it is still possible that they share their access to the Intranet to unauthorized users by possibly giving out their user name and password and lending their future Key Cards. Therefore, despite having all the technological innovations to ensure privacy and confidentiality in the information world, the choice to expose valuable data for access to confidential information, at the same time endanger the security of the Intranet, is still in the hands of the beholder, the liable authorized users. In other words, there is still no guarantee that the confidentiality of the Intranet is secured.