Change to operational issues in Tesco

Read Summary
Summary

Tesco, the second largest retailer in the UK, uses several methods to ensure their security. Similarly, Apple has implemented policies to enhance its security. For instance, Apple employees are given a chip card that contains their information and they are required to scan it when logging into the online server. The company also uses smart CCTV facial recognition for verification purposes. Additionally, Apple has strict policies on how information is controlled within the company to reduce fraud. The chip card has information on the employees’ details and job post, which determines their access to specific information. For instance, a financial manager can access financial records, but an unauthorized employee attempting to access the same information will be denied.

Table of Content

Tesco, the second largest retailer in the UK, employs several strategies to ensure security. Like Apple, Tesco has implemented security policies that involve providing employees with a chip card containing necessary login information for the online server. When logging in, employees scan their details and smart CCTV facial recognition confirms their identity. To manage security and verification methods, Tesco utilizes a 24/7 operating CCTV hub. Employees must sign a declaration stating they will not lose or share the card to prevent misuse. Violating this policy can result in legal consequences or termination of employment. Due to its involvement in computers, mobile phones, and tablets, Tesco is experienced in addressing security challenges.

The company employs policies to maintain a low level of fraudulent information within its ranks. These policies ensure that only authorized individuals have access to specific information. To enforce this, the company utilizes chip cards that contain employees’ personal details, such as name, age, and employment start date. Additionally, the chip cards specify the employees’ job positions. When the card is scanned, the computer system identifies the employee and their access rights to information. For instance, a financial manager can access the financial records of the firm. Unauthorized employees attempting to access this information will be denied due to their lack of specified access rights.

Cite this page

Change to operational issues in Tesco. (2016, May 13). Retrieved from

https://graduateway.com/change-to-operational-issues-in-tesco/

Remember! This essay was written by a student

You can get a custom paper by one of our expert writers

Order custom paper Without paying upfront