Explain the effect that data privacy policies

Assignment Help Computer Engineering
Reference no: EM133257848

In this project, you will demonstrate your mastery of the following competency:

  • Make ethically informed decisions based on awareness of legal and organizational parameters
  • Describe best practices for data management

Scenario

You are a data management professional working for Riddle Security, a third-party vendor that collects and stores data for companies in the United States and Canada. You have been informed that, several months ago, Riddle had a data breach incident that affected stored confidential data from their clients. You will examine the details of the incident in the scenario provided, identify which categories of information were compromised, and determine the possible ramifications for the company.

You've been tasked with addressing the identified issues in a presentation to Riddle Security's leadership. Your presentation will include a synopsis of the situation, as well as considerations of data privacy and the roles of data professionals. Leadership will use this presentation as part of their decision-making process to update company policies.

Directions

Begin by reviewing the scenario in the Supporting Materials section. Use the PowerPoint template located in the Supporting Materials section to create your presentation. You will use the speaker notes for each slide to elaborate on your slide content. Consider each bullet point when creating your speaker notes. In your presentation, you must address the following critical elements:

  • Compare global policies and regulations regarding data privacy.
    • Consider data privacy regulations in the United States versus other countries.
    • Consider whether Riddle Security would need to change its data-gathering practices if the company were to expand internationally (such as within the European Union).
  • Explain factors that impact an organization's policies on data privacy.
    • Explain the effect that data privacy policies can have on a company, including how the issues exposed in Riddle Security's audit may impact the company's reputation.
    • Discuss the ethical considerations that affect privacy policies.
  • Describe the purpose of a compliance audit and its influence on policy decisions in the future.
    • Explain the purpose of compliance audits in organizations.
    • Discuss how compliance with audit requirements could have prevented the issues experienced by Riddle Security.
    • Identify potential consequences for continued non-compliance with audit requirements.
  • Discuss how data privacy laws affect how organizations operate.
    • Indicate how data privacy laws influence decision making in regard to data policy.
    • Give an example of how the passing of a more restrictive data privacy law would affect how Riddle Security operates.
  • Describe the roles and responsibilities of data management professionals who contribute to data security and policy.
    • Give examples of roles that might influence, or be influenced by, data security policies.
    • Describe how customer facing and technical data roles differ in their approaches to data security policies.
  • Discuss how data management professionals apply ethical decision making in their roles.
    • Give an example of where a data policy might have an ethical gap.
    • Explain where you might go for guidance if an industry does not have written ethical guidelines, or their new products have had unforeseen ethical consequences.
      Describe how you would handle a lack of ethical guidelines and how this might relate to the Riddle Security breach.
  • Discuss how technology in data management, security, and privacy has changed over time.
    • Give examples of how changes in technology in the last ten years have impacted data regulations.
    • Discuss how changing technologies could have affected Riddle Security's breach either in a positive or negative way.

Reference no: EM133257848

Questions Cloud

Address the challenges of the internet : The law changes slowly; technology changes quickly. Are new regulations needed to address the challenges of the internet?
Identify the feature that allows files, templates : CTS 2370 Florida State College at Jacksonville Identify the feature that allows files, templates, and vApps to be shared across an entire VCSA implementation.
Explain which model of cloud adoption you would suggest : MST 300 Seneca College Explain which model of cloud adoption you would suggest for each company and explain "Why" you are suggesting this model
What is beer-lambert law : What is Beer-Lambert Law? What does the Law mention about the relationship between absorbance and concentration of a solution
Explain the effect that data privacy policies : DAT 250 Southern New Hampshire University Explain the effect that data privacy policies can have on a company, including how the issues exposed in Riddle
What are the key strengths of the company : MST 300 Seneca College What are the "Key Strengths" of the company you're recommending that would help the company? (ies).
How themes or ideas are conveyed in the text : How themes or ideas are conveyed in the text. You will write a thesis statement to communicate your argument/claim and support your claim with evidence
What does your ideal smart workspace involve : Do you prefer smart workspaces when working with a team? Why or why not? What does your ideal smart workspace involve
Describe virtualization. how it is used in cloud computing : CSE IN211 Yuan Ze University describe virtualization. How it is used in cloud computing and example for Hardware abstraction lavel at virtualization

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd