Identify and discuss specific types of open data

Assignment Help Computer Engineering
Reference no: EM132378954

Assignment 1: You have been invited to participate in a panel presentation for a conference attended by federal government IT managers and staff. For this activity, you must prepare a 5 to 7 paragraph briefing statement which answers the following questions. Use information from the weekly readings. Go to Content >> Course Resources >> Expanded Explanation for Discussion Question Responses to learn more about the format requirements for a "briefing statement."

Definitions: Privacy Impact Assessment (PIA): A PIA is both a process and a document. It is a process that focuses upon identifying and assessing risks related to privacy of data handled by a specific IT system or database. A PIA is also a document in which the results of the assessment are communicated to stakeholders. Some PIA's are released to the public in full while others are redacted to remove sensitive / non-public information.

1. What is privacy? Is it a right? An expectation? Discuss differing definitions, e.g. "the average person" definition vs. a legal definition, and how these differences impact risk assessments for privacy protections (or the lack thereof).

2. What are some important best practices for protecting privacy for information collected, stored, used, and transferred by the US federal government? Identify and discuss three or more best practice recommendations for reducing risk by improving or ensuring the privacy of information processed by or stored in an organization's IT systems and databases.

3. Explain why federal government agencies and departments required to complete PIA's. Must a PIA be completed for every federal IT system? Why or why not?

4. Name and briefly describe 3 benefits to citizens which result from the use of PIA's. (Considering citizen's needs for privacy and the protection of the privacy of individuals whose information is collected, processed, transmitted, and stored in federal government IT systems and databases.)

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.

To ensure you include all required elements, be sure to use the Discussion Rubric when creating your initial response, critiques, and replies.

Assignment 2: You have been asked to provide a briefing for your state legislature's Joint Committee on Cybersecurity and Information Technology as part of their "Cyber Scholars Day." The members of this committee are elected representatives of your state's government. Since this is a formal setting, your briefing statement must be written and then delivered word-for-word from the prepared statement. (Think "speech" and you'll be on the right path.) Since you are a "scholar" it would be more appropriate for you to stick to the facts and, where opinion is needed, paraphrase from or quote authorities in the field. Inclusion of your own personal opinion is permitted but should be limited.

The topic of your briefing is: Potential Privacy Issues Arising from OPEN Data initiatives for federal and state governments. In your briefing statement you must:

• Identify and discuss 3 or more specific types of OPEN Data

• Identify and discuss 3 or more privacy issues which could arise from the collection and distribution of OPEN data

• Recommend at least 3 safeguards or counter measures which the legislators should consider requiring of state agencies when engaging in OPEN data initiatives.

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your briefing statement.
Post your briefing statement in a reply to this topic. (Do not use attachments.)

You must start a thread before you can read and reply to other threads

Reference no: EM132378954

Questions Cloud

New materialism is the implications for human freedom : One of the major worries raised by the metaphysical position of "new materialism" is the implications for human freedom.
Systematically investigate effectiveness of policy : Policy evaluation uses a range of research methods to systematically investigate the effectiveness of policy.
What kind of user training should be conducted : What kind of user training should be conducted to deal with the issue of noise. How do you strike a balance between being overwhelmed with false positives.
The elementary and secondary education act : The Elementary and Secondary Education Act discusses its attempt to provide federal financial aid to support education to disadvantaged children in poor areas.
Identify and discuss specific types of open data : You have been asked to provide a briefing for your state legislature's Joint Committee on Cybersecurity and Information Technology as part of their.
What lessons about life did douglass learn as slave : What was life like for a slave? What lessons about life did Douglass learn as a slave, and what did he hope for others to learn from his story?
How you do or could use telcom and network security : Prepare and submit a one page, double-spaced, APA style paper explaining how you do or could use telcom and network security in your current or upcoming career.
Compute the lower-of-cost-or-market valuation for company : Compute the lower-of-cost-or-market valuation for company's inventory. Oriole Company accumulates the following cost and market data at December 31.
Determine the accounts and amounts to be debited : Determine the accounts and amounts to be debited and credited for the above transactions for William Clock Repair.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd