Explain why you selected that violation to discuss

Assignment Help Basic Computer Science
Reference no: EM13992472

The volume of data circulating the Internet is astronomical, and amongst these data are troves of personal information gathered from HTML forms, emails, Google searches and so on. In many cases, the information is relatively ordinary and harmless (e.g. a name or address), but other forms of personal information can be considered ‘sensitive data'. This includes things like ethnic origin, political opinions, medical conditions, financial data and more. In order to protect such data, several countries have enacted ‘Data Protection Acts' to guard against information loss, misuse and/or theft.
Consider for a moment the country within which you reside. What sorts of data protection acts or laws exist there? How effective do you think they are at protecting sensitive information? For this Discussion, research one of these acts along with a type of organisation where data protection is important (e.g. banking, health care, education, etc.). Analyse at least 3-4 potential violations of your selected act within your selected organisation type and recommend countermeasures to mitigate its likeliness to occur.

To complete this Discussion:

Post: Create an initial post in which you analyse an act within your country with the purpose of protecting data. Focus on how your selected act protects data. Analyse a type of organisation of your choosing (e.g. banking, health, etc.) and identify at least 3-4 violations of data protection that could occur (e.g. disclosure of patient data, disclosure of employee information, etc.) and how the violations might occur. Based on your analyses, evaluate the likelihood of at least one of your noted violations occurring and recommend countermeasures to reduce that likelihood. Explain why you selected that violation to discuss.

Reference no: EM13992472

Questions Cloud

Will sheet rust through within in the scratched condition : Under these conditions it is estimated that the current consumed at the tinned surface by the oxygen-reduction reaction is 2 X 18" A m-1. Will the sheet rust through within 5 years in the scratched condition? The density of steel is 7.87Mgm-3. Ass..
Explain the results of the improvements you recommended : Post:Name the product and the associated password management protocol you selected. Analyse the good and bad practices of this protocol.
How does the shape of the foil affect the capacitance : How does the shape of the foil affect the capacitance? Would it still be a capacitor if the foil and mylar took on a different shape; say for example if the top sheet of foil were crumpled into a ball?
Create an intervention for addicts : You have been assigned an internship at a drug rehab center in downtown Baltimore. One of your assignments is to create an intervention for addicts who are between the ages of 18 to 24
Explain why you selected that violation to discuss : Create an initial post in which you analyse an act within your country with the purpose of protecting data. Focus on how your selected act protects data.
Problem regarding the profit-sharing agreement : The sales manager for Off-Road Enterprises is entitled to a bonus equal to 12% of profits. What difficulties may arise in the interpretation of this profit-sharing agreement?
What inequality does the author discuss : What inequality does the author discuss? How does it differ from other types? Does this inequality affect African American political and economic power? Why or why not? Soes this inequality affect whether African Americans receive the same treatment ..
How many meters you traverse to reach vacation destination : You plan a sight-seeing vacation for Canopus and book a flight on the fastest spaceship in the universe, which travels at the speed of light. How many meters will you traverse to reach your vacation destination?
Determine the predetermined factory overhead rate : For Almerinda Company, determine the predetermined factory overhead rate using direct labor hours as the activity base.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Compute average probability of symbol error of signalling

Consists of additive noise w(t) as the sample function of a gaussian process with zero mean and power spectral density No/2. Calculate the average probability of symbol error for this method of signalling

  What values are assigned to x when k has values

What values are assigned to x when k has values of 1,2,3,4, and 10?

  How much more secure is this double encryption

Now consider a double-encryption method that adds i to each plaintext character and then adds j to the resulting ciphertext character to get another ciphertext character. Again, all calculations are modulo 256.

  Find out product stream temperature and volume

Find out the product stream temperature and volume required to carry out reaction in a CSTR at 50 % conversion in adiabatic mode of operation.

  How many ways are there to pick a collection of 13 coin

How many ways are there to pick a collection of 13 coins from piles of pennies, nickels, dimes, quarters, and half-dollars? Base on the following condition: a) Assuming that each pile has at least 13 or more coins. b) Assuming that each pile has at l..

  Determine how to diagnose and reseat the ram

A user complains that her computer is responding very slowly. She also says that when booting the PC, it reports a lower value for memory than she assumed is available. You investigate and consider the idea that one of the RAM sticks in her PC may..

  Compute millions of instructions per second of program

Compute the MIPS (Millions of Instructions Per Second) rating for each processor during execution of this particular program

  Two vulnerability analysis tools used in research

two Vulnerability Analysis tools used in research and/or commercially available and describe their main features and functionality. Compare and contrast their relative strengths and weaknesses

  The basic interactivity practice assignment

Overview: The Basic Interactivity practice assignment asks students to make some simple changes to the JavaScript file supplied in the Practice Assignment JavaScript Review ZIP file. This assignment provides students with an opportunity to further..

  Monte carlo estimation of areas

Programming Project - Monte Carlo estimation of areas It is a programming project using the BlueJ ( Java language) .

  Ssl web security and system architecture

Discuss the task and write a report. Introduction,SSL Web Security,Background of topic and solutions,Project Requirement,System Architecture,System Design,Client Side implementation.

  Advancements in technology have certainly made

Advancements in technology have certainly made our lives easier over the last twenty years. They've also changed the nature of how many of us do our jobs. A great example is right here in this course...professors can teach from home!

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd