Do you have the ability to manage that data being collected

Assignment Help Management Information Sys
Reference no: EM132062505

Review the privacy policy for your favorite social media site (Facebook, twitter, etc). Answer the following questions in a narrative format:

1. What information is being collected about you?

2. How is that data being used?

3. Who is the data being shared with?

4. Do you have the ability to manage that data being collected?

After answering these question please describe your reactions. Were there any surprises that you didn't expect?

Do you have any legal recourse to protect your privacy in the event of a breach? Does your research make you want to reconsider using that social network?

Your submission should follow APA formatting and be at least 4 pages in length. Title and references extra.

Reference no: EM132062505

Questions Cloud

Write a research paper about the digital technology trends : Write a research paper about the Digital Technology Trends Transforming How Business Is Done.
What must the tension ft in the rope be : If the box accelerates up the ramp at a rate of 2.09 m/s2, what must the tension FT in the rope be? Use g = 9.81 m/s2 for the acceleration due to gravity
Results from the first data table : Using the results from the first data table, could all of the resistors have been sold commercially? Are there any exceptions?
Illustrate how analytics could align with the company : Activity Outputs created Create a workflow diagram to illustrate how analytics could align with the company's business processes. (3 slides with notes)
Do you have the ability to manage that data being collected : Do you have any legal recourse to protect your privacy in the event of a breach? Does your research make you want to reconsider using that social network?
What are the advantages of using erp : As an IT manager, discuss how your company will use Enterprise Resource Planning (ERP) to integrate the various functions of an entity.
What is the magnitude of the resultant vector : What is the magnitude of the resultant vector kF~ k, where F~ = F~ 1 + F~ 2 + F~ 3 ? Answer in units of N.
Electrical repulsion between two protons : a) Calculate the electrical repulsion between two protons in a nucleus if they are 1.35×10-15 m apart
What is the net force exerted by two charges : What is the net force exerted by these two charges on a third charge q3 = 52.0 nC placed between q1 and q2 at x3 = -1.120 m?

Reviews

Write a Review

Management Information Sys Questions & Answers

  How many accounts are of type cheque

How many accounts are of type 'cheque'?List the account numbers of accounts registered with the branch identified by the BSB number 713694 in Mooroolbark.

  Formulate a linear programming problem

Formulate as a linear programming problem by defining the decision variables, stating the objective function and stating the constraints.

  What procedures should be implemented for handling of data

Include risks and threats of company data. What policies/procedures should be implemented for handling of data ensure data protection and business continuity?

  Evaluate the training you can provide to your staff

In fact, it serves as a model for other institutions in the area; however, printouts discarded in the restricted-access information systems department are not shredded. On numerous occasions, personnel working late have observed the cleaning staff..

  Discuss the importance of security in the design of system

CS661,CS653:Prior to developing an information security plan, it is important to understand and evaluate potential security risks before formulating prevention strategies. For this assignment, you will continue the planning process by adding the R..

  Discuss some of ethical and social issues facing business

Social & Ethical: Discuss some of the current social and ethical issues in today's world. Discuss some of ethical and social issues facing business and users

  Discuss country work councils and the role they play

Describe Safe Harbor and how it dictates how an organization must establish policies and procedures. Discuss Country Work Councils and the role they play.

  Discuss about the fundamentals of secure network

Security plan for the network . You may find Mariusz Stawowski's article The Principles of Network Security Design helpful as you design your SOHO.

  Evaluate the four risk-mitigation options and strategies

Explain how ITPM best practices can facilitate process change within an organization. Determine if ITPM would be used differently depending upon the industry in which it was used. Explain your answer.Evaluate the four risk-mitigation options and st..

  Analyze and describe the key controls

Analyze the identity and access management approach that organizations need to implement to effectively control access to their systems.

  Provide a summary of your analysis findings to it leadership

Your Mobile Ordering Project team needs to provide a summary of your analysis findings to IT leadership and other department stakeholders.

  Planning an it infrastructure audit for compliance

Term Paper: Planning an IT Infrastructure Audit for Compliance. Identify the critical requirements of the audit for your chosen organization and explain why you consider them to be critical requirements

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd