2019

SEEN&HEARD

VALUABLE INSIGHT

"Becoming a Master" (April 2018, pp. 38-43) has excellent insight into mastering skills.

Qaiser Iqbal
Lahore, Pakistan


MUCH NEEDED REMODEL

In response to "Career Coach: Remodel Your Résumé" (February 2018, pp. 14-15): Very helpful advice. I have been looking for a way to increase the performance of my résumé, and after a few modifications it looks cleaner.

Scott Snyder
Orlando, FL


A GOOD LAUGH

I loved the April 2018 Mr. Pareto Head (p. 12)! As an auditor preparing for an AS9100 transition audit, I found great humor in this. Thanks for lightening the mood in the office.

Theresa Whitwell
McNab/Braeside, Ontario


The Reaction Gauge

Last month’s question

In light of the highly publicized Facebook data breaches, what steps should organizations be taking to protect their customers’ data? What steps is your organization taking, and is it enough? What does the future of data protection look like?

Al Smith, Richburg, NY, says:

I have often wondered if organizations are performing a cost vs. loss analysis on this issue. I believe that they will accept the risk because the cost of effective assurance is more than the loss of hiring a monitoring organization and the CEO giving the "We are so sorry" speech if a hack happens.

Daniel Zrymiak, Vancouver, British Columbia, writes:

A very good benchmark can be found on the U.S. Health and Human Services site. Recommended practices include:

  • Ensure the confidentiality, integrity and availability of all information created, received, maintained or transmitted.
  • Identify and protect against reasonably anticipated threats to the security or integrity of the information.
  • Protect against reasonably anticipated impermissible uses or disclosures.
  • Ensure compliance by their workforce.

Organizations can apply administrative safeguards for security and information access, physical safeguards for access and control, and technical safeguards for technical, audit and transmission restrictions.

Workforce training and management is critical to be aware of existing policies and procedures, as well as appropriate responses to particular customer data security threats or risks that may be encountered.

Philip Scalise, Utica, NY, says:

I think this a fair-minded and easy question to answer. In fact, the answer is found in the question: The data belong to the customer. Protect their data as if it were your very own. Your business just might depend on it, which Facebook is learning. I like this topic because it calls to mind the question and answer, and reminders go a long way!

This month’s question

Lane departure warning, adaptive cruise control, rear cross-traffic alert, automatic emergency braking—these are just some of the advanced features that come standard in many new vehicles.

  • They’re designed to make driving safer, but does all this technology have the opposite effect?
  • Because more aspects of driving are becoming automated, are drivers paying less attention than they should?
  • Are drivers taking more risks when they’re behind the wheel because they assume the technology will keep them safe?

Send us your take at editor@asq.org. Or join the discussion on LinkedIn at www.linkedin.com/groups/3633.


Average Rating

Rating

Out of 0 Ratings
Rate this article

Add Comments

View comments
Comments FAQ


Featured advertisers