Develop pii strategy proposal for the das mylicence portal

Assignment Help Computer Network Security
Reference no: EM132847358

ITC568 Cloud Privacy and Security - Charles Sturt University

Learning outcome 1: be able to examine the legal, business and privacy requirements for a cloud deployment model.
Learning outcome 2: be able to evaluate the risk management requirements for a cloud deployment model.
Learning outcome 3: be able to critically analyse the legal, ethical and business concerns for the security and privacy of data to be deployed to the cloud.
Learning outcome 4: be able to develop and present a series of proposed security controls to manage the security and privacy of data deployed to the cloud.
Learning outcome 5: be able to develop and present a cloud governance framework to underpin the cloud operations for an enterprise.

Assessment item 4 - Privacy & Data Strategy

Scenario
The Department of Administrative Services (DAS) provides a number of services to other departments in an Australian State Government. These services include HR and personnel management, payroll, contract tendering management, contractor management, and procurement. These services have all been provided from the Department's own data centres.
As a result of a change in Government policy, DAS is moving to a "Shared Services" approach. This approach will mean that DAS will centralise a number of services for the whole of

Government (WofG). This means that each Department or Agency that runs one of these services for its own users, will be required to migrate its data to DAS so that it can be consolidated into the DAS centralised database. DAS will then provide these consolidated services to all other Departments and Agencies within the Government.

The Government has now decided that they want to centralise the application and renewal of licences from a number of different agencies into one single portal. The portal will be branded as MyLicence. The Government's strategy is that the process of licence application or renewal for virtually all licences follows an almost identical workflow, even though some of the data may differ for different types of licences. Their aim is to have a single workflow for all licences, with some additional steps in case of special requirements for a particular type of licence.

The Government also sees the opportunity to gain a better view of what licences each citizen holds, and wants to link that data to other data that they hold about each citizen. In order to achieve this, the Government plans to encourage citizens to register on the MyLicence portal and create their own informal digital identity. This will allow all the licences, renewal dates, and other associated information for that digital identity to be available for viewing on a single page. This data, particularly when linked to a citizen's digital identity, can then be used for more effective planning and decision making by Government and other public agencies.

The plan also has the advantage of simplifying the process of acquiring and renewing licences for its citizens so that they only need to go to a single web portal to acquire the licenses that they require.

The Government proposes, in line with its "Cloud First" policy, to use a public cloud provider to host the MyLicence portal, processing and databases. The Government also wants to ensure that all data remains on Australian soil so that it can ensure that data sovereignty does not cause any issues with MyLicence. However the Government is also committed to ensuring that the MyLicence portal makes maximum use of all the possible advantages of the public cloud.

Tasks

After your successful engagement to provide a security and privacy risk assessment for the DAS, you have again been engaged to develop a Personally Identifiable Information (PII) privacy and personal data protection strategy for the MyLicence portal.

You are to write a report that proposes appropriate policies for DAS in the following areas:

1. Develop a PII strategy proposal for the DAS MyLicence portal. The strategy should consider the threats and risks to both Privacy and data protection for the PII data collected in the MyLicence portal as well as possible controls to mitigate the identified risks.

2. Develop a strategy to protect the informal Digital Identity that a user may create in the MyLicence portal. You should consider both the privacy and data protection aspects for a digital identity as well as possible controls to mitigate the identified risks.

3. Develop a strategy to ensure data sovereignty for the MyLicence portal

4. Develop a PowerPoint or Google slides presentation that gives a comprehensive overview of the three (3) tasks in a maximum of 30 slides.

You are to submit the following documents to complete this assessment:

• A PowerPoint or Google slides presentation that gives a comprehensive overview of the three (3) tasks.
The presentation should be a maximum of 30 slides, including introduction, conclusions and recommendations.
Each slide should have speaking notes in the Notes section which expand on the information in the slide.
The slides should give refer to the additional information contained in the appendices.
Images and quotations used in slides must be referenced on that slide. The slide deck does not require a reference list.
• The PII strategy is to be attached in a separate Word document. This document should be fully referenced in APA 7th edition format, and should not exceed 3 pages. This document title is to be: Appendix A: PII Strategy for MyLicence.
• The Digital Identity strategy is to be attached in a separate Word document. This document should be fully referenced in APA 7th edition format, and should not exceed 3 pages. This document title is to be: Appendix A: Digital Identity Strategy for MyLicence.
• The Data Sovereignty strategy is to be attached in a separate Word document. This document should be fully referenced in APA 7th edition format, and should not exceed 3 pages. This document title is to be: Appendix C: Data Sovereignty Strategy for MyLicence.

Attachment:- Cloud Privacy and Security.rar

Reference no: EM132847358

Questions Cloud

Discusses the possible threats and risks to the security : Discusses the possible threats and risks to the security of user data on mobile phones, and in linked Cloud and financial accounts from the use of the CovidSafe
Make program management plan : Describe and explain the steps that an organisation would need to take in order to make program management plan for their employees
Importance of monitoring an organisation program success : Discuss the importance of monitoring an organisation's program success. State challenges related to management programs that promote personal effectiveness for
Determine the deferred tax liability and deferred tax asset : Jaguar Ltd purchased a machine on 1 July 2016 at the cost of $640,000. Determine the deferred tax liability and/or deferred tax asset that will result
Develop pii strategy proposal for the das mylicence portal : Develop a PII strategy proposal for the DAS MyLicence portal. The strategy should consider the threats and risks to both Privacy and data protection for the PII
What is an agency relationship : What is an agency relationship? Give example What is managerial opportunism? Give example
5-forces analysis for the supermarket and grocery industry : Conduct a 5-forces analysis for the supermarket and grocery industry
Bsbhrm506 manage recruitment selection and induction process : Assume you are responsible for forecasting recruitment requirements and filling any vacancies. List some methods you could use to source evidence to ensure the
List the 9 food production requirements : List the 9 food production requirements you need to take into consideration when planning catering menus?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd