Unidad 2

domingo, 3 de abril de 2016

ACTIVITY 3

ACTIVITY 3

3.1 Final version of the essay


Group 9

Team Members: Sirley Pérez
Jesus Andrade
Ronny Pérez
Juan Gómez


3.1.2 Introduction
Based on our business idea (developed in the Guide 1 Communication skills and autonomous learning) to establish a translation agency, we focus on "the challenges of translation companies and information security". It is essential to protect the confidentiality of documents handled by the translation agency so that customers feel that they have a reliable partner and unauthorized disclosures cannot occur. 
Companies looking for translation services tend to listen to the recommendations from others. That’s why we must ensure the confidentiality and privacy with all our customers to strengthen business relationships and to build a growing customer base, who will also recommend us for new potential customers.  
We plan not to count only on reliable and highly qualified personnel, but also on technological tools to provide us the required information security protection valued by the customers. 
The information security is an essential element in today's business world as technology advancements facilitate access to contents in networks, where information is not always automatically protected. Companies need to ensure that the information is treated as confidential to prevent unauthorized disclosures by using security tools. 

 3.1.3 Development  
One of the main pillars of a contractual relationship with a client is the protection of confidentiality and intellectual property. In the daily management of translations, you have access to countless documents. You have private information from companies to be translated. 
According to Brown (2016): "The translators should have documented evidence that they can fulfill at least one of the following criteria: experience in the translation of an institution of higher education; recognized in any other field of higher education institution, plus two years of professional full-time experience in translation, five years of full-time professional experience in translation, and a certificate of competency in the translation degree from a corresponding government agency. The last requirement is new and it refers to an important ability to understand and manage content produced in the source language. However, the law fails to require proof of experience in the field. '' 
Based on Brown (2016), many companies do not meet these requirements and this is the picture we got as well. Many companies claim to provide services in several languages and are intermediaries and not simply translators. Others say they are certified by ISO, but it is often not true. Many say they are specialized in translating various languages and specialize in all translations and such claims often seem not be true. Some say they have undergone several quality controls, and this may also be false, as often only big companies have the financial capacity to pay for such quality controls and some others can try to save time by using information technology and translation software CAT (computer-aided translation) and this can be a big problem as words and phrases are translated technically literally, but the message is altered, while the privacy of the document is also uploaded to external databases and their security cannot often be trusted. 
Although the interconnected world poses challenges like these, the following recommendations can be presented to avoid the problems. 
A legal measure that should be taken, before a contractual relationship with a client, is the signing of a confidentiality agreement. Confidentiality agreement is an agreement between two parties, which are committed to keep confidential certain information to be supplied in the course of a business relationship (Blog Global Negotiator, 2014). This contract protects the client legally against any unauthorized use or disclosure of the information and content delivered to the translation agency. 
There are also various methods for encrypting electronic documents to provide additional protection in the transmission of information. You can have a backup of the information for both parties. Responsible use of the Internet and having reliable staff who handle the confidential information with good care are part of the protection of information. 
According to Safar (2016), when Ccnsidering that the information security has not only to do with the confidentiality of information, but also to not change the ideas in clients’ texts, i.e. not alter the information in any way, we can say that to meet all mentioned requirements a company should meet the ISO 17100 standards and preferably to be able to verify it; however, the rule has limitations, since according Brown (2016), ''in general, these qualification requirements are potentially an area of lost opportunity to embrace new trends and developments in the industry. '' 
This leads us to an idea that the field of translations has more challenges to face than security of the information and that our translation company not only has to meet ISO standards, but go a steps ahead in qualifications and diversity to meet all the expectations that today's world puts in the minds of entrepreneurs who want to be at the forefront of development. If we accomplish this, it would be a big step towards success, not only of our company but also that of our clients. 

3.1.4 Conclusion
Our working relationships with customers, mostly companies, will be based on respect of confidential information and protection of all content, which the translation agency has an access to. It is essential to use all legal measures available to ensure such confidentiality. Companies must feel that their information will be treated with the strictest confidence and privacy, since the development of their business activities can depend of it (cf. Schneier, 2016)
The use of technological tools helps us create a secure environment through the use of technological protections for electronic files, which will ensure that information is protected and confidentiality is guaranteed to prevent unauthorized disclosure. 
You have trained staff, who is multiculturally aware of the reality of today's world. Good staff helps us achieve our goals so that in the course of our business relationships with our customers, we can guarantee that their information and documents will not only be protected but also translated according to the highest standards to create confidence in customers and achieve a status, which is communicated around customers by recommendations of our services. 
We must comply with confidentiality laws on electronic media. We will work mostly with electronic documents and it is vital that customer information is handled confidentially. Companies are going to trust sensitive documents and their protection will be quranreed. We must create a safe environment in our computer systems to prevent unauthorized access to our files. In this way, companies and individuals who request our services will have the confidence that their information will be handled with the strictest confidence and they will return to us also with the next translation needs. 

Brown, A. (2016). Beware of Translation Agencies - How to Identify? (With image, tweet) Sheribrown. [Online] Available at: https://storify.com/sheribrown/beware-of-translation-agencies-how-to-identify [Accessed 1 Mar. 2016].
Blog Global Negotiator (2014). What is a confidentiality agreement? - Model. [Online] Available at: http://www.globalnegotiator.com/blog/que-es-un-contrato-de-confidencialidad/ [Accessed 3 Mar. 2016].
Resources, N. and Translation, T. (2016). The Unseen Security and Compliance Risks of free online translation. [Online] TodayTranslations.com. Available in: https://www.todaytranslations.com/news/unseen-security-compliance-risks-of-free-online-translation [Accessed 27 Feb. 2016].
Safar, L. (2016). ISO 17100 10 Questions about the New Translation Services Standard, Answered. [Online] Info.moravia.com. Available in: http://info.moravia.com/blog/bid/353203/ISO-17100-10-Questions-about-the-New-Translation-Services-Standard-Answered [Accessed 1 Mar. 2016].
Schneier.com (2016). Essays: The Eternal Value of Privacy - Schneier on Security. https://www.schneier.com/essays/archives/2006/05/the_eternal_value_of.html [Accessed 27 Feb. 2016].

BIBLIOGRAPHY


Lyberger, J Sterns, P, Fugleberg, N (2016) PLAGIARISM, COPYRIGHT     INFRINGEMENT, AND INTELLECTUAL PROPERTY."Presentation "." N.p., n.d. Web. 23 Mar. 2016.        
 Sciencedirect.com. (2016). Understanding “Internet plagiarism”. [Online] Available    at: http://www.sciencedirect.com/science/article/pii/S8755461506000831 [Accessed 21 Mar. 2016].
IMPLICATION ETICAS DEL PLAGIO ACADEMICO "PAMABRIT N.p., 04 Sept. 2013. Web. 21Mar.2016 https://pamabrit.wordpress.com/2013/09/05/implicaciones-eticas-del-plagio-academico/
Cómo Citar Una Referencia Que Incluye a Otra Cita Dentro Del Texto Con Normas APA?" Normas APA. N.p., 04 Nov. 2014. Web. 22 Mar. 2016.




No hay comentarios.: