Explain why you selected that violation to discuss

Assignment Help Basic Computer Science
Reference no: EM13992472

The volume of data circulating the Internet is astronomical, and amongst these data are troves of personal information gathered from HTML forms, emails, Google searches and so on. In many cases, the information is relatively ordinary and harmless (e.g. a name or address), but other forms of personal information can be considered ‘sensitive data'. This includes things like ethnic origin, political opinions, medical conditions, financial data and more. In order to protect such data, several countries have enacted ‘Data Protection Acts' to guard against information loss, misuse and/or theft.
Consider for a moment the country within which you reside. What sorts of data protection acts or laws exist there? How effective do you think they are at protecting sensitive information? For this Discussion, research one of these acts along with a type of organisation where data protection is important (e.g. banking, health care, education, etc.). Analyse at least 3-4 potential violations of your selected act within your selected organisation type and recommend countermeasures to mitigate its likeliness to occur.

To complete this Discussion:

Post: Create an initial post in which you analyse an act within your country with the purpose of protecting data. Focus on how your selected act protects data. Analyse a type of organisation of your choosing (e.g. banking, health, etc.) and identify at least 3-4 violations of data protection that could occur (e.g. disclosure of patient data, disclosure of employee information, etc.) and how the violations might occur. Based on your analyses, evaluate the likelihood of at least one of your noted violations occurring and recommend countermeasures to reduce that likelihood. Explain why you selected that violation to discuss.

Reference no: EM13992472

Questions Cloud

Will sheet rust through within in the scratched condition : Under these conditions it is estimated that the current consumed at the tinned surface by the oxygen-reduction reaction is 2 X 18" A m-1. Will the sheet rust through within 5 years in the scratched condition? The density of steel is 7.87Mgm-3. Ass..
Explain the results of the improvements you recommended : Post:Name the product and the associated password management protocol you selected. Analyse the good and bad practices of this protocol.
How does the shape of the foil affect the capacitance : How does the shape of the foil affect the capacitance? Would it still be a capacitor if the foil and mylar took on a different shape; say for example if the top sheet of foil were crumpled into a ball?
Create an intervention for addicts : You have been assigned an internship at a drug rehab center in downtown Baltimore. One of your assignments is to create an intervention for addicts who are between the ages of 18 to 24
Explain why you selected that violation to discuss : Create an initial post in which you analyse an act within your country with the purpose of protecting data. Focus on how your selected act protects data.
Problem regarding the profit-sharing agreement : The sales manager for Off-Road Enterprises is entitled to a bonus equal to 12% of profits. What difficulties may arise in the interpretation of this profit-sharing agreement?
What inequality does the author discuss : What inequality does the author discuss? How does it differ from other types? Does this inequality affect African American political and economic power? Why or why not? Soes this inequality affect whether African Americans receive the same treatment ..
How many meters you traverse to reach vacation destination : You plan a sight-seeing vacation for Canopus and book a flight on the fastest spaceship in the universe, which travels at the speed of light. How many meters will you traverse to reach your vacation destination?
Determine the predetermined factory overhead rate : For Almerinda Company, determine the predetermined factory overhead rate using direct labor hours as the activity base.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd