Develop privacy and personal data protection strategies

Assignment Help Basic Computer Science
Reference no: EM132389950

Scenario

The Department of Administrative Services (DAS) provides a number of services to other departments in an Australian State Government. These services include HR and personnel management, payroll, contract tendering management, contractor management, and procurement. These services have all been provided from the Department's own data centres.

As a result of a change in Government policy, DAS is moving to a "Shared Services" approach. This approach will mean that DAS will centralise a number of services for the whole of Government (WofG). This means that each Department or Agency that runs one of these services for its own users, will be required to migrate its data to DAS so that it can be consolidated into the DAS centralised database. DAS will then provide these consolidated services to all other Departments and Agencies within the Government.

The Government has now decided that they want to centralise the application and renewal of licences from a number of different agencies into one single portal. The portal will be branded as MyLicence. The Government's strategy is that the process of licence application or renewal for virtually all licences follows an almost identical workflow, even though some of the data may differ for different types of licences. Their aim is to have a single workflow for all licences, with some additional steps in case of special requirements for a particular type of licence.

The Government also sees the opportunity to gain a better view of what licences each citizen holds, and wants to link that data to other data that they hold about each citizen. In order to achieve this, the Government plans to encourage citizens to register on the MyLicence portal and create their own informal digital identity. This will allow all the licences, renewal dates, and other associated information for that digital identity to be available for viewing on a single page. This data, particularly when linked to a citizen's digital identity, can then be used for more effective planning and decision making by Government and other public agencies.

The plan also has the advantage of simplifying the process of acquiring and renewing licences for its citizens so that they only need to go to a single web portal to acquire the licenses that they require.

The Government proposes, in line with its "Cloud First" policy, to use a public cloud provider to host the MyLicence portal, processing and databases. The Government also wants to ensure that all data remains on Australian soil so that it can ensure that data sovereignty does not cause any issues with MyLicence.

Tasks

After your successful engagement to develop privacy and personal data protection strategies for DAS, you have again been engaged to develop a Personally Identifiable Information (PII) privacy and personal data protection strategy for the MyLicence portal.

You are to:

Develop a Threat and Risk Assessment (TRA) for PII data for the MyLicence portal. This TRA should consider both the privacy and data protection aspects of PII data in the portal.

Develop a PII strategy proposal for the DAS MyLicence portal. The strategy should consider the threats and risks to both Privacy and data protection for the PII data collected in the MyLicence portal as well as possible controls to mitigate the identified risks.

Develop a strategy to protect the informal Digital Identity that a user may create in the MyLicence portal. You should consider both the privacy and data protection aspects for a digital identity as well as possible controls to mitigate the identified risks.

Presentation

You are to submit the following documents to complete this assessment:

A PowerPoint presentation that gives a comprehensive overview of the three (3) tasks. 

The presentation should be a maximum of 30 slides, including introduction, conclusions and recommendations.

Each slide should have speaking notes in the Notes section which expand on the information in the slide.

The slides should give refer to the additional information contained in the appendices.

Images and quotations used in slides must be referenced on that slide.

The slide deck does require a reference list. References are to be included on a Reference list slide(s), but these are not counted as part of the slide deck limit.

The TRA is to be attached in a separate Word document. The TRA can be presented in tabular format, but must be in Word format. This document title is to be: Appendix A, TRA for MyLicence.

The PII strategy is to be attached in a separate Word document. This document should be fully referenced in APA 6th edition format, and should not exceed 3 pages. This document title is to be: Appendix B: PII Strategy for MyLicence.

The Digital Identity is to be attached in a separate Word document. This document should be fully referenced in APA 6th edition format, and should not exceed 3 pages. This document title is to be: Appendix C: Digital Identity Strategy.

Reference no: EM132389950

Questions Cloud

Evaluate the effect of the types of power : Evaluate the effect of the types of power on the negotiation process, and give an example of how each type of power can affect the process.
Present in either lack of technical controls or processes : Discuss the vulnerabilities that were present in either a lack of technical controls or processes.
Investigate and design Switching Security : Assignment - Switch Engineering. Task 1 - Investigate the LAN Switching. Task 2 - Investigate and design Switching Security
Describe the advantages of a total rewards program : Evaluate the effectiveness of the communication of Geico's total rewards program based upon the Website's descriptions of the benefits. Recommend two (2) areas.
Develop privacy and personal data protection strategies : Your successful engagement to develop privacy and personal data protection strategies for DAS, Develop a PII strategy proposal for the DAS MyLicence portal.
How the selected company can establish hrm strategies : Analyze how the selected company can establish HRM strategies to improve competitive advantages. Propose three (3) ways that the company can increase diversity.
Examine ways that companies recruit qualified job applicants : Examine two ways that companies can recruit qualified job applicants. Determine which method may be most effective and predict how it could benefit the company.
Define approaches to meet the talent management challenges : Create at least two (2) more effective approaches to meet the talent management challenges in the future. Use at least five (5) quality academic resources.
LAN and LAN-to-WAN Domain policies : Discuss what are some of the common LAN and LAN-to-WAN Domain policies and how you would implement them in your organization

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Different ways of characterizing a bus

Question One: What are different ways of characterizing a bus? In other words, what attributes do all buses have?

  Facebook and privacy issues

Smartphones and Teenagers • Facebook and Privacy Issues • Challenges of Sport Organisations in Australia

  Memory or many bits of data transmission speed

In computing literature, the value represented by the prefixes kilo, mega, giga and so on can vary depending on whether they are describing

  Describe a tm that multiplies two 2-bit binary numbers

Given any kTM for any k, there is a TM that acts on all inputs exactly as the kTM does (that means loops, crashes, or leaves a corresponding output).

  Relationship of the corporate strategy to the it alignment

What is the relationship of the corporate strategy to the IT alignment of that strategy? Should the corporate strategy determine the IT alignment, or should the strategy support the IT alignment? Why?

  Calculating maximum frequency

How do you work out the length of the string using python 3, when calculating maximum frequency( of letters in a string ) if:

  Essential feature of new classical economics

1.Which of the following is (are) not an essential feature of new classical economics?

  Difference between value type and reference type

Difference between value type and reference type arguments in c#

  Use the raptor to complete the problem

Use the Raptor to complete the problem, Input names of students from the user, terminated by "ZZZ", 0, 0, 0, and create a data file grades with records of the following form: student (string), test (integer), test 2 (integer), test 3 (integer)

  Discuss four ways in which information

Discuss four ways in which information can be shared among Word, Excel, and Access. Give specific examples on how to share the information.

  Case study-database development

Note: The ACM Digital Library is a Strayer Library database located in iCampus > Campus & Library > Learning Resource Center > Databases.

  Process based standard of security model for many organizati

ISO 17799 is a well-known and accepted process based standard of security model for many organizations. In his ISO 17799 article, Siponen argues that standards need to better focus on the process and the quality of the process. Can the ISO model be i..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd