Describe document access controls and best practices

Assignment Help Computer Engineering
Reference no: EM132646453

Assignment: You are ready to prepare the final version of the EDMS business requirements document (BRD) incorporating the assignments you completed and faculty feedback provided for Weeks 1-5. You will present your BRD to the Board of Directors for Hollywood Organic Co-op.

Write at least 4 to 6 pages for the final business requirements document for the new EDMS and prepare an 8- to 10-slide media-rich presentation summary of the BRD to the Hollywood Organic Co-op's Board of Directors.

Analyze the critical components of your information security program as it relates to Hollywood Organic Co-op. Justify how the security objectives for the EDMS align with the business objectives.

Identify and describe document access controls and best practices, including:

• Viewing

• Editing

• Copy/paste (including screen capture)

• Printing

• Forwarding e-¬mail containing secured e¬-documents

Identify, define, and describe document access policies and best practices including:

• Text documents

• Spreadsheets

• Financial statements

• E-mail messages

• Policy and procedure manuals

• Research

• Customer and project data

• Personnel files

• Medical records

• Intranet pages

• Other sensitive information

Identify, define, and describe all stages of the document life cycle and best practices including:

• Creation

• Storage

• Categorizing

• Metadata tagging

• Delivery or sharing

• Repurposing

Review and reporting archiving and/or destruction

Format citations according to APA guidelines.

Reference no: EM132646453

Questions Cloud

Identify how changes within an organization affect the om : Identify how changes within an organization affect the OM (operations managementa) Maturing of a product.) strategy for a company. For instance
How is goodwill accounted for at acquisition : Valuation and Impairment Testing of Intangibles (HBSP No.: NTU053). How is goodwill accounted for at acquisition and at subsequent financial statement date?
Evaluate nestle company : Company's Vision, Mission, and Corporate Social Initiatives; overall performance by applying the Management Process. The Report should include the following com
Job satisfaction-does it differ across cultures : Evidence shows that job satisfaction levels in the United States are dropping. The Conference Board, which surveys large numbers of workers every year
Describe document access controls and best practices : Analyze the critical components of your information security program as it relates to Hollywood Organic Co-op. Justify how the security objectives for the EDMS.
Discuss the accounting treatment of goodwill in subsequent : Valuation and Impairment Testing, Discuss whether the accounting treatment of goodwill in subsequent years could be a concern for financial reporting.
How is the hospitality industry coping with the covid 19 : How is the hospitality industry coping with the COVID 19?
Theoretical framework and conceptual framework : What is the difference between theoretical framework and conceptual framework?
Business level strategy and value chain activities : How do disruptive business models alter a value chain? What are the implications for the business and for its competitors?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Determine what is meant by an ids and an ips

In no less than 250 words, explain what is meant by an IDS and an IPS. How are they different? How are they connected to a network? List a few examples of IDS.

  Describe the ethical issue the action researchers faced

Describe the ethical issue the action researchers faced in their study. Define why the study's results created an ethical dilemma for the action research team.

  What use is the information collected from the devices

Since information extracted from router or switch interfaces to not provide specific evidence of a particular crime in most cases, what use is the information.

  How warshalls algorithm compares with the transitive closure

Discuss how Warshall's algorithm compares with the transitive closure algorithm derived by using the depth-first search technique described in the text.

  Assess security-privacy concerns in applications

Do you feel that the STRIDE model, which is discussed extensively in this course, is a good baseline to help assess security/privacy concerns in applications.

  How do you modify hello printer program to greet you instead

What do you do to protect yourself from data loss when you work on programming projects? How do you modify the Hello Printer program to greet you instead?

  Define a byte addressable main memory of 2^16 bytes

Given, a byte addressable main memory of 2^16 bytes and block size of 8 bytes, using direct mapped cache consisting of 32 lines.

  Explain cloud computing in detail

Explain cloud computing and how it is used in current generation in 800 words, double spaced paper, written in APA format, showing sources and a bibliography.

  Convert a complex number in rectangular form

Write and test thoroughly a MATLAB function which converts a complex number in rectangular form.

  Define an n-node complete binary tree t

define an n-node complete binary tree T, where n=2^d - 1 for some d. Each node v of T is labeled with a real number x_v. You may assume that the real numbers labeling the nodes are all distinct.

  How might you use a pq as a fifo queue

Priority queues are very interesting structures. Priority queues can also be used to simulate a FIFO queue. How might you use a PQ as a FIFO queue?

  What are the purposes of the feasibility analysis

What are the purposes of the system request and the feasibility analysis? How are they used in the project selection process?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd