Privacy and data sovereignty strategy assessment

Assignment Help Computer Engineering
Reference no: EM132599648 , Length: word count:4000

ITC568 Cloud Privacy and Security - Charles Sturt University

Assessment - Security, Privacy and Data Sovereignty strategy

Scenario

The sudden increase in COVID-19 cases worldwide has caused considerable disruption in many countries. However, a number of countries have started to use an individual tracking approach to try and contain the spread of the virus.

A number of countries have developed mobile phone apps that track people and their movements. Some details of these apps are:
• Singapore: Contact tracing app. See:
• South Korea: Tracking mobile phones and cashless transactions:
• Taiwan: Quarantine by mobile:
• Australia: CovidSafe:

Tasks

After your successful engagement to develop privacy and personal data protection strategies for DAS, you have been engaged by the Department of Health (DoH) to advise on the development of privacy and data protection for CovidSafe users. DoH expect up to 16 million Australian mobile users to download and use this app. DoH have announced that they will be using a major U.S. based public cloud provider to host the CovidSafe data, but claim that the data will always be under Australian Government control.
You are to provide a report to DoH that:
1. Discusses the possible threats and risks to the security of user data on mobile phones, and in linked Cloud and financial accounts from the use of the CovidSafe app.
2. Discusses the possible threats to the privacy of a user's data, location and activities from the use of the CovidSafe app.
3. Discusses the issues of data sovereignty that may apply to the storage of CovidSafe data in U.S. based Cloud storage.
4. You are to recommend that DoH adopt:
a. Possible security controls that would prevent the loss or breach of user data, while still enabling effective tracking for COVID-19, and the reasons these controls will be effective.
b. Possible privacy controls to protect user privacy, particularly of data, location and activity, while still enabling effective tracking of COVID-19, and the reasons these controls will be effective.

c. Possible controls to ensure that the CovidSafe data remains under Australian data sovereignty and control, and the reasons these controls will be effective.

Presentation
Your report should use the following heading structure:
• Data and security risks
• Privacy, location and activity issues
• Data sovereignty issues
• Recommendations:
o Security controls
o Privacy controls
o Data sovereignty controls
Your report should be about 3,000 to 4,000 words.
Referencing is required in APA 7th ed. Format.

Attachment:- Privacy and Data Sovereignty strategy.rar

Reference no: EM132599648

Questions Cloud

What is Delaney income tax payable : Delaney also had expenses of $100,000 for both book and tax purposes. If Delaney has a 35% tax rate, what is Delaney's income tax payable for 2008
What are the proceeds from the bond issue : The bonds pay interest semiannually on June 30 and December 31. The bonds are issued to yield 5%. What are the proceeds from the bond issue
Significant threat to us interests in the decade ahead : What is the most significant threat to US interests in the decade ahead? How would you tailor US foreign policy to deal with this issue effectively?
Describe challenges of global virtual projects : Topic : CHALLENGES OF GLOBAL VIRTUAL PROJECTS. It should be at least 10 pages; have at least 5 APA citations and reference; Abstract /introduction.
Privacy and data sovereignty strategy assessment : Security, Privacy and Data Sovereignty strategy Assessment - Discusses the possible threats and risks to the security of user data on mobile phones
Find why do accountants use the accrual-basis method : Find Why do accountants use the accrual-basis method instead of the cash basis method of accounting? What are some of the benefits of using accrual accounting?
Air and space power theorists : To what extent, if at all, can the geopolitical theories of Mahan, Mackinder, and Air and Space power theorists,
Find the slope of the line joining the points : Office equipment was purchased for $20,000 and is assumed to have a scrap value of $2,000 after 10 years. Find the slope of the line joining the points
How effective is the visualization and why : Use the internet to research and find one example of a data visualization each for categorical data, time-series data, and spatial data.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Express how the required task can be achieved

The parameter element is a data item to be added to the array. The parameter position is the array index at which the new element will be inserted. be sure to account for elements that must be moved over to make room for the new element.

  Explain a control object

express Control Object Properties. Why do we use them?

  Create a polyline shape dynamically using mouse clicks

Write a program that creates a polyline shape dynamically using mouse clicks.

  Describe the type of organization or business challenge

An evaluation of key business drivers that motivate organizations to consider implementing Cloud Computing technology. Also include an example of a type.

  Explain tcp protocol is asymmetric over wireless link

The following wireless TCP protocol is asymmetric over wireless link in terms of transmission power and bandwidth

  Optimizing pseudocodesstudy how pseudocodes can be

optimizing pseudocodesstudy how pseudocodes can be optimized to improve their efficiency.in part 1 you will complete

  Discuss the role of vpn to support the security of business

The purpose of this assignment is to review existing literatures on important VPN technologies and issues and write a report.

  Identify the ethical rules that the certified information

Identify the ethical rules that the Certified Information Systems Security Professional (CISSP) certification holders have agreed to follow.

  Create some xhtml notes by listing the tags and attributes

On a separate sheet of paper create some XHTML notes by listing the tags and attributes related to tables found on your sample page.

  Tabulate the slacks of the tasks

Indicate the ES (Earliest Start), EF (Earliest Finish), LS (Latest Start), LF (Latest Finish) times for each of the activities A through H.

  Method of collision resolution

Utilize the linear probing method of the collision resolution. Print out the tables after the data values have been stored. Search for ten several values in each of the three hash tables

  HS2031 Human Computer Interaction Assignment Problem

HS2031 -Human Computer Interaction Assignment Help and Solutions, Holmes Institute- Australia-Perform a task analysis to identify the tasks the potential users.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd