Explain the effect that data privacy policies

Assignment Help Computer Engineering
Reference no: EM133257848

In this project, you will demonstrate your mastery of the following competency:

  • Make ethically informed decisions based on awareness of legal and organizational parameters
  • Describe best practices for data management

Scenario

You are a data management professional working for Riddle Security, a third-party vendor that collects and stores data for companies in the United States and Canada. You have been informed that, several months ago, Riddle had a data breach incident that affected stored confidential data from their clients. You will examine the details of the incident in the scenario provided, identify which categories of information were compromised, and determine the possible ramifications for the company.

You've been tasked with addressing the identified issues in a presentation to Riddle Security's leadership. Your presentation will include a synopsis of the situation, as well as considerations of data privacy and the roles of data professionals. Leadership will use this presentation as part of their decision-making process to update company policies.

Directions

Begin by reviewing the scenario in the Supporting Materials section. Use the PowerPoint template located in the Supporting Materials section to create your presentation. You will use the speaker notes for each slide to elaborate on your slide content. Consider each bullet point when creating your speaker notes. In your presentation, you must address the following critical elements:

  • Compare global policies and regulations regarding data privacy.
    • Consider data privacy regulations in the United States versus other countries.
    • Consider whether Riddle Security would need to change its data-gathering practices if the company were to expand internationally (such as within the European Union).
  • Explain factors that impact an organization's policies on data privacy.
    • Explain the effect that data privacy policies can have on a company, including how the issues exposed in Riddle Security's audit may impact the company's reputation.
    • Discuss the ethical considerations that affect privacy policies.
  • Describe the purpose of a compliance audit and its influence on policy decisions in the future.
    • Explain the purpose of compliance audits in organizations.
    • Discuss how compliance with audit requirements could have prevented the issues experienced by Riddle Security.
    • Identify potential consequences for continued non-compliance with audit requirements.
  • Discuss how data privacy laws affect how organizations operate.
    • Indicate how data privacy laws influence decision making in regard to data policy.
    • Give an example of how the passing of a more restrictive data privacy law would affect how Riddle Security operates.
  • Describe the roles and responsibilities of data management professionals who contribute to data security and policy.
    • Give examples of roles that might influence, or be influenced by, data security policies.
    • Describe how customer facing and technical data roles differ in their approaches to data security policies.
  • Discuss how data management professionals apply ethical decision making in their roles.
    • Give an example of where a data policy might have an ethical gap.
    • Explain where you might go for guidance if an industry does not have written ethical guidelines, or their new products have had unforeseen ethical consequences.
      Describe how you would handle a lack of ethical guidelines and how this might relate to the Riddle Security breach.
  • Discuss how technology in data management, security, and privacy has changed over time.
    • Give examples of how changes in technology in the last ten years have impacted data regulations.
    • Discuss how changing technologies could have affected Riddle Security's breach either in a positive or negative way.

Reference no: EM133257848

Questions Cloud

Address the challenges of the internet : The law changes slowly; technology changes quickly. Are new regulations needed to address the challenges of the internet?
Identify the feature that allows files, templates : CTS 2370 Florida State College at Jacksonville Identify the feature that allows files, templates, and vApps to be shared across an entire VCSA implementation.
Explain which model of cloud adoption you would suggest : MST 300 Seneca College Explain which model of cloud adoption you would suggest for each company and explain "Why" you are suggesting this model
What is beer-lambert law : What is Beer-Lambert Law? What does the Law mention about the relationship between absorbance and concentration of a solution
Explain the effect that data privacy policies : DAT 250 Southern New Hampshire University Explain the effect that data privacy policies can have on a company, including how the issues exposed in Riddle
What are the key strengths of the company : MST 300 Seneca College What are the "Key Strengths" of the company you're recommending that would help the company? (ies).
How themes or ideas are conveyed in the text : How themes or ideas are conveyed in the text. You will write a thesis statement to communicate your argument/claim and support your claim with evidence
What does your ideal smart workspace involve : Do you prefer smart workspaces when working with a team? Why or why not? What does your ideal smart workspace involve
Describe virtualization. how it is used in cloud computing : CSE IN211 Yuan Ze University describe virtualization. How it is used in cloud computing and example for Hardware abstraction lavel at virtualization

Reviews

Write a Review

Computer Engineering Questions & Answers

  Define it priorities and governance for it without

using a company of your choice determine the strategic business goals. develop an it strategy that aligns to the

  What are the most effective ways to filter data

what are the others ways to secure data on a wired or wireless network.

  Write a recursive function pattern that accepts one argument

Write a recursive function pattern that accepts one argument, an integer that is a power of 2, and prints the following patterns.

  A brief description of the policy and its content

Create a presentation that can be used to instruct individuals and groups on how to use IT Security Policy Framework to help .

  What is the relationship between technology and society

What is the relationship between technology and society, does technology constitute society or is it the other way around? Elaborate on each of the drivers.

  What is the purpose of the http cookie field

What is the purpose of the HTTP "Cookie" field? Are the values in the HTTP message's cookie field stored at the client or server or both? Explain briefly.

  Compare edi and xml technologies

Explain how electronic data interchange is used to link two companies' business processes together.- Compare EDI and XML technologies.

  Define how the lack of metrics for measuring

define how the lack of metrics for measuring certain software properties affects the software engineering discipline.

  Is the item of an unusual or irregular shape

What is the size of the item? Is the item of an unusual or irregular shape? Is the item loose or is it already packaged inside a container of some type?

  Prepare a detailed system documentation report

Prepare a detailed system documentation report to cover your work done in steps 1 and 2 above, using a standard template.

  What command do you type to see the options

What does ACL stand for and how is it used? If you don't remember the syntax when using icacls.exe, what command do you type to see the options?

  Oe of the needs that your client has is a databaseto

one of the needs that your client has is a database.to design a database a database planner should spend a

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd