Describe how the data will be collected used and stored

Assignment Help Computer Engineering
Reference no: EM133689597

Assignment

A privacy impact assessment (PIA) is a process to help you identify and minimize data privacy risk. Specifically, this type of assessment helps identify the risks to an individual when an organization collects personal information for a business purpose. There are many reasons an organization might collect personal data. For example, all businesses must collect personal information from employees to process payroll taxes. Many businesses collect personal information from customers to ship goods and services or conduct research to create new products.

An organization should complete a PIA any time it intends to collect a new data element from an individual, such as name, date of birth, age, race, sex, address, biometric identifier, or any other element of personal data. Completing a PIA helps an organization think deeply about privacy issues and risks related to collecting specific types of data. To complete a PIA, an organization should:

A. Clearly specify the data that it wishes to collect from a person.
B. Clearly document why it must collect that data.
C. Describe how the data will be collected, used, and stored.
D. Document the risks of collecting, using, and storing, the data.
E. Describe the measures that the organization will take to reduce the risks of collecting, using, and storing the data.

Organizational leaders will use the information provided in a PIA to determine whether the need for collecting the data outweighs the risks to the organization that are posed by collecting it. This is a business decision. Stakeholders such as legal counsel, human resources professionals, and information security and privacy professionals will often help prepare and review the PIA. An organization usually does not need to share its PIA with other entities.

In this lab, you will learn about and prepare a privacy impact assessment for a fictitious organization.

Lab Overview

This lab has three parts, which should be completed in the order specified.

A. In the first part of the lab, you will document the personal information that a company seeks to collect.

B. In the second part of the lab, you will document the risks of data collection.

C. In the third part of the lab, you will explain why (or why not) the company should collect the personal information specified in Part A.

Finally, if assigned by your instructor, you will complete a challenge exercise that allows you to use the skills you learned in the lab to conduct independent, unguided work - similar to what you will encounter in a real-world situation.

Learning Objectives

Upon completing this lab, you will be able to:

A. Identify personal data elements.
B. Describe risks to the collection of personal data.
C. Justify data collection activities.

Reference no: EM133689597

Questions Cloud

Defined political priorities so that nurses across country : It is important for national nursing organizations such as the ANA to have defined political priorities so that nurses across the country
Synthesize the information you have collected : You will need to synthesize the information you have collected and begin analyzing the issue.
Patient appears to be nervous and worried about procedure : A medical assistant was asked by the physician to prepare a patient for an ECG. The patient appears to be nervous and worried about the procedure.
Emergency department in ambulance after tripping at home : A patient was brought into the emergency department in an ambulance after tripping at home and sustaining an injury to the knee and ankle.
Describe how the data will be collected used and stored : Describe how the data will be collected, used, and stored. Describe measures that organization will take to reduce risks of collecting, using and storing data.
Compare the articles and provide examples of application : Develop and assess your knowledge about a key managerial issue - Discuss the relevance of recommendations/limitations of each of the journal article
Visibly frequenting the communal areas : Patient, has been visibly frequenting the communal areas of B-wing. He complied with his wing limitations and was mostly observed watching television
Differentiate prospective and retrospective cohort studies : Differentiate between prospective and retrospective cohort studies. Illustrate when each of these cohort studies should be used in research.
Identify countries that have lowest infant mortality rates : Identify five countries that have the lowest infant mortality rates and five countries that have the highest infant mortality rates.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd