Coordinate all areas of the business

Assignment Help Basic Computer Science
Reference no: EM132630260

You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department.

The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business or customer. The company also desires to leverage the marketing power of social media, but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective.

The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company.

Abstract and Introduction, which includes industry discussion

Introduction Section - describing the industry chosen and potential resources to be used

Reference no: EM132630260

Questions Cloud

Business intillegance course : Conduct research on how Artificial Intelligence and Statistical Modeling can be used to support a business. Include a Case study as well
Describe three approaches to detecting errors : Describe three approaches to detecting errors, including how they work, the probability of detecting an error, and any other benefits or limitations.
Hearsay rule in legal proceedings : Do a bit of research on the hearsay rule in legal proceedings. In your own words, explain the hearsay rule a
Describe the OSI Model and the TCP-IP Model : Define and Describe the OSI Model and the TCP/IP Model. Define, describe and draw a simple diagram of the common network protocols.
Coordinate all areas of the business : This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business
Risk and costs of compromised data integrity breaches : Discuss the risk and costs of compromised data integrity breaches. Focus on integrity not confidentiality. Look at military,
Types of logical access controls : Which types of logical access controls should be used in each scenario? Identify the data that would need to be protected.
Implement and maintain the new webstore system : Pine Valley Furniture's board of directors is ready to review how to implement and maintain the new webstore system.
Different uses of these tools besides cryptography : Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What does the batch file command goto do

What does the batch file command GOTO do? What would an example it being used look like?

  What considerations must you include in your risk analysis

Discuss how you would set up control measures in your organization or even your home? What considerations must you include in your risk analysis?

  Mobile devices organizational security policies

The employee devices need strong policies that govern their use to ensure that they do not lead to any security issues.

  The dissertation process by developing plan

The purpose of this assignment is to prepare you for the dissertation process by developing a plan to collect data for your research paper.

  What is the probability of choosing a red ball

A basket contains six red balls and four yellow balls. What is the probability of choosing a red ball?

  Hardware and network plan

Hardware and Network Plan

  How insider threat contributes to organizational compromise

How insider threat contributes to organizational compromise. The basic methods and tools used to defend against networks security risks

  Impact of cloud computing to data storage

Write a report on the impact of cloud computing to data storage highlighting its advantages and disadvantages. The report should be APA style and should not exceed 2000 words

  College class-discrete structures

Question: Determine the truth value of ∀x(x>0 → x^2 ≤ x^3). The domain of discourse is R. Justify your answer.

  Five cultural dimensions exhibited in it organizations

Problem: Explain the five cultural dimensions exhibited in IT organizations?

  Manias-panics and crashes

In his book Manias, Panics and Crashes (see the Introduction and Chapters posted on the class website under Cases - Kindleberger pdf #1 & 2) Charles Kindleberger explains the three stages of how a financial crisis develops and evolves over time.

  Write the statement that includes a friend function

Write the statement that includes a friend function named before in the class dateType that takes as parameters two objects of type dateType and returns true if the date represented by the first object comes before the date represented by the second ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd