Conduct privacy risk assessment

Assignment Help Computer Network Security
Reference no: EM133397579

Question

A US-based company serving primarily US-based customers and students. Assume the Privacy SME, while reviewing assessment responses administered to build your data map, you discover the following:

- The HR team is collecting name, contact information, date of birth, social security number, citizenship status, and resume for job applicants. The HR team is also conducting a demographic survey and collecting race, gender, age, veteran status, religious affiliation, marital status, parental status, sexual orientation, address, and household income. The survey is optional for job applicants but required for employees.

- The online product collects the following from students when they sign up for an account and profile to use Guild's services: name, email address, the highest level of education, gender, race, age, programs of interest, and motivation to seek reskilling or upskilling opportunities.

Conduct a privacy Risk assessment evaluating these activities including an explanation of how you would approach this situation, as well as any questions you would ask to inform your analysis.

Reference no: EM133397579

Questions Cloud

Discuss advanced data security solutions in cloud : Discuss the advanced data security solutions in the cloud. How would you secure your data using data encryption in the cloud?
Device for pairing during bluetooth connection process : What should you do after you have located a device for pairing during the Bluetooth connection process? Which of the following cable types is prone to EMI?
Activity information is important for sequencing activities : Explain what activity information is important for sequencing activities. Briefly explain each diagramming method
How you report technical concerns to non-technical people : Explain how you report technical concerns to non-technical people in your selected audience. Keep in mind that most managerial roles are non-technical in nature
Conduct privacy risk assessment : Conduct a privacy Risk assessment evaluating these activities including an explanation of how you would approach this situation,
Applying encryption and hashing algorithms : Explain the concepts and procedures involved in applying encryption and hashing algorithms.
Log aggregation architecture : What are some specific examples of why Log normalization is useful in a SIEM/log aggregation architecture and explain why they are necessary?
Describe seven-state process model : Using Google (or your favorite search engine), describe a seven-state process model (one that uses a "Suspended" state).
What types of digital content or streaming media : What types of digital content or streaming media culd I use in an e-commerce dog product compnay?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Gives example for feature that demonstrate security problem

Provide one example for each feature that demonstrates a security problem that could occur if a user does not implement that feature.

  Identify the key elements in certificate

Identify the key elements in this certificate, including the owners name and public key, its validity dates, the name of the CA that signed it, and the type and value of signature.

  How is risk defined in the context of information technology

How is risk defined in the context of information technology.

  Implement attacks against wireless networks

Implement attacks against wireless networks in a controlled environment - provide measures or defenses against wireless attacks

  Explain role of access controls in implementing a security

Explain the role of access controls in implementing a security policy.

  Provide quantitative data to measure the threats

You are asked to provide quantitative data to measure the likelihood that any of these threats will actually occur for the information assets of the client.

  What are the security concerns related to email security

What are the security concerns related to email security? First, evaluate the risks and potential consequences associated with an email security breach.

  Design and implement secure enterprise wireless networks

Wireless networks analysis, challenges, techniques and recommendations Assessment - Analyse and compare wireless communication protocols

  List and briefly define categories of security services

What is the OSI security architecture? List and briefly define categories of security services. Explain difference between an attack surface and an attack tree.

  Analyze the network protocols and security mechanisms

Analyze the network protocols and security mechanisms in wireless networks. Evaluate the application of Wireless LANs, MANs, and PANs.

  Describe the steps that can be taken to protect a pc

Describe the steps that can be taken to protect a PC against ransomware and determine if a particular OS is more secure against these types of attacks.

  What is security interrogation and security interview

What is security interrogation and security interview? How are they different and describe key steps in preparing for an interview and an Interrogation process.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd