ACTIVITY 3
3.1 Final
version of the essay
Group 9
Team Members: Sirley Pérez
Jesus Andrade
Ronny Pérez
Juan Gómez
3.1.2 Introduction
Based on our
business idea (developed in the Guide 1 Communication skills and autonomous
learning) to establish a translation agency, we focus on "the challenges
of translation companies and information security". It is essential to
protect the confidentiality of documents handled by the translation agency so
that customers feel that they have a reliable partner and unauthorized
disclosures cannot occur.
Companies
looking for translation services tend to listen to the recommendations from
others. That’s why we must ensure the confidentiality and privacy with all our
customers to strengthen business relationships and to build a growing customer
base, who will also recommend us for new potential customers.
We plan not
to count only on reliable and highly qualified personnel, but also on
technological tools to provide us the required information security protection
valued by the customers.
The
information security is an essential element in today's business world as
technology advancements facilitate access to contents in networks, where
information is not always automatically protected. Companies need to ensure
that the information is treated as confidential to prevent unauthorized
disclosures by using security tools.
3.1.3 Development
One of the
main pillars of a contractual relationship with a client is the protection of
confidentiality and intellectual property. In the daily management of
translations, you have access to countless documents. You have private information
from companies to be translated.
According to
Brown (2016): "The translators should have documented evidence that they
can fulfill at least one of the following criteria: experience in the
translation of an institution of higher education; recognized in any other
field of higher education institution, plus two years of professional full-time
experience in translation, five years of full-time professional experience in
translation, and a certificate of competency in the translation degree from a
corresponding government agency. The last requirement is new and it refers to
an important ability to understand and manage content produced in the source
language. However, the law fails to require proof of experience in the field.
''
Based on
Brown (2016), many companies do not meet these requirements and this is the
picture we got as well. Many companies claim to provide services in several
languages and are intermediaries and not simply translators. Others say they
are certified by ISO, but it is often not true. Many say they are specialized
in translating various languages and specialize in all translations and such
claims often seem not be true. Some say they have undergone several quality
controls, and this may also be false, as often only big companies have the
financial capacity to pay for such quality controls and some others can try to
save time by using information technology and translation software CAT
(computer-aided translation) and this can be a big problem as words and phrases
are translated technically literally, but the message is altered, while the
privacy of the document is also uploaded to external databases and their
security cannot often be trusted.
Although the
interconnected world poses challenges like these, the following recommendations
can be presented to avoid the problems.
A legal
measure that should be taken, before a contractual relationship with a client,
is the signing of a confidentiality agreement. Confidentiality agreement is an
agreement between two parties, which are committed to keep confidential certain
information to be supplied in the course of a business relationship (Blog Global Negotiator, 2014). This
contract protects the client legally against any unauthorized use or disclosure
of the information and content delivered to the translation agency.
There are
also various methods for encrypting electronic documents to provide additional
protection in the transmission of information. You can have a backup of the
information for both parties. Responsible use of the Internet and having
reliable staff who handle the confidential information with good care are part
of the protection of information.
According to
Safar (2016), when Ccnsidering
that the information security has not only to do with the confidentiality of information,
but also to not change the ideas in clients’ texts, i.e. not alter the
information in any way, we can say that to meet all mentioned requirements a
company should meet the ISO 17100 standards and preferably to be able to verify
it; however, the rule has limitations, since according Brown (2016), ''in
general, these qualification requirements are potentially an area of lost
opportunity to embrace new trends and developments in the industry. ''
This leads
us to an idea that the field of translations has more challenges to face than
security of the information and that our translation company not only has to
meet ISO standards, but go a steps ahead in qualifications and diversity to
meet all the expectations that today's world puts in the minds of entrepreneurs
who want to be at the forefront of development. If we accomplish this, it would
be a big step towards success, not only of our company but also that of our
clients.
3.1.4
Conclusion
Our working
relationships with customers, mostly companies, will be based on respect of
confidential information and protection of all content, which the translation
agency has an access to. It is essential to use all legal measures available to
ensure such confidentiality. Companies must feel that their information will be
treated with the strictest confidence and privacy, since the development of
their business activities can depend of it (cf. Schneier, 2016)
The use of
technological tools helps us create a secure environment through the use of
technological protections for electronic files, which will ensure that
information is protected and confidentiality is guaranteed to prevent
unauthorized disclosure.
You have
trained staff, who is multiculturally aware of the reality of today's world.
Good staff helps us achieve our goals so that in the course of our business
relationships with our customers, we can guarantee that their information and
documents will not only be protected but also translated according to the
highest standards to create confidence in customers and achieve a status, which
is communicated around customers by recommendations of our services.
We must
comply with confidentiality laws on electronic media. We will work mostly with
electronic documents and it is vital that customer information is handled
confidentially. Companies are going to trust sensitive documents and their
protection will be quranreed. We must create a safe environment in our computer
systems to prevent unauthorized access to our files. In this way, companies and
individuals who request our services will have the confidence that their
information will be handled with the strictest confidence and they will return
to us also with the next translation needs.
Brown, A. (2016). Beware of Translation Agencies - How
to Identify? (With image, tweet) Sheribrown. [Online] Available at:
https://storify.com/sheribrown/beware-of-translation-agencies-how-to-identify
[Accessed 1 Mar. 2016].
Blog Global Negotiator (2014). What is a
confidentiality agreement? - Model. [Online] Available at:
http://www.globalnegotiator.com/blog/que-es-un-contrato-de-confidencialidad/
[Accessed 3 Mar. 2016].
Resources, N. and Translation, T. (2016). The Unseen
Security and Compliance Risks of free online translation. [Online]
TodayTranslations.com. Available in:
https://www.todaytranslations.com/news/unseen-security-compliance-risks-of-free-online-translation
[Accessed 27 Feb. 2016].
Safar, L. (2016). ISO 17100 10 Questions about the New
Translation Services Standard, Answered. [Online] Info.moravia.com. Available
in:
http://info.moravia.com/blog/bid/353203/ISO-17100-10-Questions-about-the-New-Translation-Services-Standard-Answered
[Accessed 1 Mar. 2016].
Schneier.com (2016). Essays: The Eternal Value of
Privacy - Schneier on Security.
https://www.schneier.com/essays/archives/2006/05/the_eternal_value_of.html
[Accessed 27 Feb. 2016].
BIBLIOGRAPHY
Lyberger, J Sterns, P, Fugleberg, N
(2016) PLAGIARISM, COPYRIGHT INFRINGEMENT,
AND INTELLECTUAL PROPERTY."⚡Presentation "." N.p.,
n.d. Web. 23 Mar. 2016.
Sciencedirect.com.
(2016). Understanding “Internet plagiarism”. [Online] Available at:
http://www.sciencedirect.com/science/article/pii/S8755461506000831 [Accessed 21
Mar. 2016].
IMPLICATION ETICAS DEL
PLAGIO ACADEMICO "PAMABRIT N.p.,
04 Sept. 2013. Web. 21Mar.2016 https://pamabrit.wordpress.com/2013/09/05/implicaciones-eticas-del-plagio-academico/
Cómo
Citar Una Referencia Que Incluye a Otra Cita Dentro Del Texto Con Normas
APA?" Normas APA.
N.p., 04 Nov. 2014. Web. 22 Mar. 2016.