Employee fingerprint matching system

Assignment Help Basic Computer Science
Reference no: EM132533298

An organization will be testing a beta upgrade version of its employee's fingerprint matching system. Because it's difficult to mimic human fingerprints the company used real biometric images, data, and templates to test the beta upgrade. The previous and current versions both contain meta data, and demographic data with each fingerprint that includes the owner's name, age, sex, race, and date of birth. After a successful upgrade consider the following:

What data types stored by the system should be considered as PII

Review the NIST Special Publication 800-122 to determine the impact level. What factors did you include to determine the impact level?

What privacy safeguards should be considered to protect the PII in the upgrade test.

Is a Privacy Impact Assessment (PIA) required to complete the upgrade?

What should be done with the test data after the upgrade?

Attachment:- nist special publication.rar

Reference no: EM132533298

Questions Cloud

Software and hardware vulnerabilities : Discuss the differences between software and hardware vulnerabilities. How might these vulnerabilities impact a business?
Emerged repeatedly in evaluating risks : What were some of the risk sources that emerged repeatedly in evaluating the risks? How is this helpful?
Develop work breakdown structure for project : Develop a work breakdown structure for a project identified in any of the other conference threads. Include at least three levels in your diagram.
Shaping music through technology : This project will implement the technology and infrastructure (hardware, software, peripherals...etc.) to connect musicians
Employee fingerprint matching system : An organization will be testing a beta upgrade version of its employee's fingerprint matching system. What should be done with the test data after the upgrade?
Uniform method of citation of that law : Describe your expectations on finding law from anywhere in the world by use of the internet. Why is it important to have uniform method of citation of that law?
International monetary fund : The International Monetary Fund (IMF) provides assistance to countries experiencing economic woes.
Impact of social media platforms : How can a project manager use social media platforms, such as Facebook and LinkedIn, to assist with purchasing and supply chain management decisions?
Currency derivatives are very useful to global financial : Currency derivatives are very useful to global financial managers to hedge FX risk, but they can also be used by speculators.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Trading in the markets on a day-to-day basis

Given that a company receives funds only from transactions in the primary market for common stock, why should financial managers care

  What computing devices are required

How does Office Mix for PowerPoint® allow you to create presentations online? What computing devices are required?

  About the future of collaboration systems

BBA 3551-After reading about the future of collaboration systems, how do you envision collaboration in your industry in the year 2027?

  Display the roman numeral version of that number

Converter Write a program that asks the user to enter a number within the range of 1 through 10. Use a switch statement to display the Roman numeral version of that number. Input Validation: Do not accept a number less than 1 or greater than 10.

  Determining the failed bios update

How can you recover your system from a failed BIOS update?

  Traditional silo risk management model

Enterprise Risk Management approach addresses the known 5 limitations of the traditional Silo Risk Management model.

  What is the role of a dbms

What is the role of a DBMS? What are its advantages?

  Increase retention of employees

If you became the new manager at a restaurant with high employee turnover, what actions would you take to increase retention of employees?

  Find the relative frequency distribution of the decisions

Of the 1755 qualified applicants, 931 were accepted, 298 were wait-listed, and 526 were turned away for lack of space. Find the relative frequency distribution of the decisions made, and write a sentence describing it.

  Whether there are multiple definitions of an environment var

Your version of unsetenv() should check to see whether there are multiple definitions of an environment variable, and remove them all (which is what the glibc version of unsetenv() does).

  Outstanding debt for the firm

Calculate the yield to maturity on similarly outstanding debt for the firm, in terms of maturity.

  Executive summary be a part of the research

A cybersecurity paper, power point slides and an executive summary are needed. It does not clearly state it, but can the executive summary be a part.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd