Information governance and legal functions

Assignment Help Basic Computer Science
Reference no: EM132374213

Chapter A - Information Governance and Legal Functions: According to the authors, Smallwood, Kahn, and Murphy, IG is perhaps one of the functional areas that impact legal functions most. Failure to meet them could be literally put an organization out of business or land executives in prison. Privacy, security, records management, information technology (IT), and business management functions are very important. However, the most significant aspect of all of these functions relates to legality and regulatory compliance from a critical perspective.

Q: When we take a close look at the author's point of view, under the Federal Rules of Civil Procedures (FRCP) amendments dating back to 1938 there has been governance and the discovery of evidence in lawsuits and other civil cases. Please name and briefly discuss the three (3) reasons why corporations must proactively manage the e-discovery process?

Chapter B - Information Governance (IG) and Records and Information Management Functions. From the Chapter, we have learned from that Records Management (RM) is a key impact area of IG - so much that in the RM space, IG is often thought of as synonymous with or a single superset of RM. From that perspective, the International Organization for Standardization (ISO) defined business records as "information created, received, and maintained as evidence and information by an organization or person, in pursuance of legal obligations or in the transaction in the form of records."

Q: To further enhance our knowledge and understanding of RM, ISO provided a more refined definition of RM to a granular level as "[the] field of management responsible for the efficient and systematic control of what...? Identify and complete the missing phrase to directly complete the granular definition?

Reference no: EM132374213

Questions Cloud

Creating strategic plans to mitigate risks and developing : Identifying potential risks to information, weighing those risks, creating strategic plans to mitigate risks and developing those plans into specific policies.
Meaning reverse the first steps in simplified des encrypt : Let temp_block denote Sage variable that contains output of first application of function fK (f_K in the Sage example code) while encrypting with Simplified DES
What do you think were real reasons why vcf system failed : What do you think were the real reasons why the VCF system failed?
Information systems infrastructure cyber security : Do some Internet research on Chevron's use of seismic imaging technology. Explain how it works and how it has helped Chevron discover new oil and gas reservoirs
Information governance and legal functions : Privacy, security, records management, information technology (IT), and business management functions are very important.
How would you convince the students to join the club : What is your club's mission? What kinds of activities/events will you be offering? How would you convince the students to join the club?
Difference cloud computing services : Compare and contrast two difference cloud computing services (Amazon Web Service and Microsoft Azure).
Management step is to develop metrics and measure results : One of the eight Information Risk Planning and Management step is to develop metrics and measure results. Why are metrics required?
Explain impact new cryptographic security architecture : Explain the impact the new cryptographic security architecture will have on the current security features and how this impact will be mitigated.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Managerial economics skills-knowledge prior to taking

Your managerial economics skills/knowledge prior to taking this class. how you would apply your new knowledge in the management of your company or department.

  Compare two fundamental security design principles

Compare and contrast two fundamental security design principles. Analyze how these principles and how they impact an organizations security posture.

  Construct a nondeterministic finite-state machine

Convert the nondeterministic finite-state machine of part (a) to a deterministic finite-state machine by the method of Section 4.2.

  Explain various features associated with different erp

Create a timeline that shows ERP evolution Label important milestones in evolution of ERP systems Explain various features associated with different ERP Explain how the development of earlier ERP systems led to more sophisticated systems

  How many rivets are required for the assembly

What is the part number of the Inner Plate? How many rivets are required for the assembly?

  Explain the soa framework

Explain the SOA framework. Why is it difficult to secure the SOA architecture? What are the recommended principles to secure an SOA? Why?

  What kind of casket they want and where to buy it

Should customers be able to choose what kind of casket they want and where to buy it? And if you believe these laws should apply to caskets

  Determine if a vulnerability is malicious or nonmalicious

In the NRL classification scheme for the "genesis" axis, can the classes "Trojan horse" and "covert channel" overlap? Justify your answer. If your answer is yes, describe a Trojan horse that is also a covert channel or vice versa.

  Understand the organisational systems

You will need to understand the organisational systems and practices that relate to and support sustainability in the organisation for which you work.

  Write a counter-controlled loop to initialize values

In the boy of the loop, I need to multiply the value of the loop control variable by 10 and by 100, then I need to change the value of the loop control variable in the body of the loop.

  Creating a work breakdown structure

In no less than one hundred words What resources might we consider when creating a work breakdown structure (WBS)? Is all about technical issues?

  Can you see a possible conflict here for shuttles

There are also time-related behaviors to take account of: morning arrivals, evening departures, and local peaks of activity around lunchtimes?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd