Privacy and security of data and information policy

Assignment Help Management Information Sys
Reference no: EM133188514 , Length: 3000 words

COIT20263 Information Security Management - Central Queensland University

Objectives

In this assessment task, you will analyse the scenario given on page 3 and develop a report on the guidelines for the specified policy for the organisation given in the scenario.

Assessment Task
You are required to analyse the scenario given on page 3 and develop a report on the guidelines for a ‘Privacy and Security of data and information Policy' for the organisation described in the scenario. You should ensure that you support the guidelines you prepare with references and justify as to why those guidelines are necessary.

Part A: Your report on the guidelines should include:

1. Executive Summary
2. Table of Contents
3. Discussion
a Statement of Purpose (introducing the topics of the policy) b Scope
c Acceptable usage of resources d Prohibited usage of resources e Violations of Policy
f Policy Review and Modification g Limitations of Liability
4. References
Please note that you might need to make some assumptions about the organisation in order to write this report. These assumptions should match the information in the case study and not contradict with the objectives of the report. They should be incorporated in your report. To avoid loss of marks, do not make assumptions that are not relevant or contradictory, or will not be used in your report discussion.

Part B: Your reflection on completing this assessment may include (word limit for part B is 500 words):

• how you attempted the task, method used,
• any hurdle faced and how those were solved
• what you have learnt
• if you are asked to do this again, would you take a different approach? Support your answer with justification.

The Scenario for Information Security Management Assessment Tasks

Elegant and Simple (EnS) is one of the renowned clothing retailers in the world that sells men, women, and kid's products. EnS's products include clothing, footwear, accessories, beauty, and perfumes. EnS's headquarter is in Sydney with offices throughout the world, including London, Paris, New York and Singapore, and the business is ever growing. Currently EnS is considering a confidential business offer.

EnS has around 40,000 employees who work in stores, home offices, distribution centres, and international locations. EnS uses latest software tools and technologies for their product design and development, communications, and day-to day operation. Latest technologies including IoT, machine learning etc. are also used in their store operation and supply chain.

EnS has a large customer base and have both in-store and online shopping facilities for their customers in all countries that they are operating. The in-store outlets are equipped with modern technologies including in-store Wi-Fi facilities for customers.

Recently, EnS has become a victim of ransomware attack where the attacker sent a ransom email from an unknown source saying that they know about the confidential business offer and have personal details of 200,000 customers. A sample of personal details of some of their customers was also attached in the ransom email as "evidence". The attacker threatened that unless the specified amount of ransom was paid, they would leak all the confidential information to EnS's competitors. As per the company's incidence response plan, this incident has immediately been notified to the senior management and the legal department. Senior management also engaged forensic computer specialists to assess and contain the threat.

With this recent ransomware attack incident and the current rise in security attacks all around the world EnS believes that now it is of highest importance for the business to improve the security of its system, network, information, data, and devices.

You have been hired in the information security team that is responsible for all cybersecurity, compliance, information security, governance, and risk management functions. The team is now evaluating the security risks and reviewing their security policies and upgrade their security management practices.

Attachment:- Information Security Management.rar

Reference no: EM133188514

Questions Cloud

Complete the payroll sheet and prepare the necessary entry : The EI rate is 1.66% and the maximum annual deduction per employee is $858.22. Complete the payroll sheet and prepare the necessary entry
Calculate required rate of return for manning enterprises : Calculate the required rate of return for Manning Enterprises assuming that investors expect a 3.5% rate of inflation in the future
What is the total amount of annual scholarships : If Adam could invest the funds at 5% compounded quarterly, what is the total amount of annual scholarships that could be provided at the beginning of each year
Calculate the copy department costs allocated to sales : Assuming 4,650,000 copies were made during the year, 2,450,000 for sales and 2,200,000 for administration, calculate the copy department costs
Privacy and security of data and information policy : Develop a report on the guidelines for a ‘Privacy and Security of data and information Policy' for the organisation described in the scenario
Calculate the profit on this stock transaction : Sam Brown purchased 225 shares of common stock issued by Red Hot Food Processing for $4000. Calculate the profit on this stock transaction
At what amount should equity investment-fvoci be reported : Fair value at Dec. 31, 2021 was P100/ share. At what amount should this equity investment-FVOCI be reported by Beyonce at December 31 2022
Write a report on mercy malaysia : Write a report on Mercy Malaysia that includes: The proposed Balanced Scorecard that include three perspectives: financial, customers
How does panning relate to an entrepreneur : Explain how the plans for Mi Ola evolved over time

Reviews

Write a Review

Management Information Sys Questions & Answers

  Draw a physical erd complete with foreign key attributes

The company would also like to have a list of potential sponsors that includes each sponsor's contact information such as the name, phone number, and address.

  What laws and regulations your organization needs

Your manager has asked you to prepare a report to point out what laws and regulations your organization needs to be compliant with so they can share that information with the Board of Directors, who has asked for this report.

  How does the solution mitigate the problem

Problem / Scenario: A city or township implementing IoT connected parking meters with an accompanying parking mobile app and management platform.Section 1 - Problem Identification.Section 2 - Solution Description/Rationale and High Level Requiremen..

  How did ict help the organisations evolve

How did ICT help the organisations evolve (no technology days to nowadays)? What is the latest technology you intend to employ in your organisation?

  Compare and contrast end point security today

Case study: Wyoming Medical Center, Los Angeles County and Raymond James: End Point Security Gets Complicated, Compare and contrast end point security today with end point security five years ago. Why is it more complicated today

  Explain why is it surprising that money markets exist

Money market environment - Explain Why is it surprising that money markets exist? Why do they exist nonetheless? What factors explain the relative size of money markets in different countries?

  Example of a bad decision that had a good outcome

Give an example of a good decision that you made that resulted in a bad outcome. Also give an example of a bad decision that had a good outcome. Why was each decision good or bad

  What do auditor like about it auditing

Why did he or she get into this field? What do they like about IT auditing? What do they dislike? What do they feel about the future of this field?

  Identify positive and negative implication of the finding

Identify one positive and one negative implication of this finding. What terms do you believe are ethically appropriate for such agreements?

  Why make visualizations

List a few advantages and disadvantages (at least 2 for each) of using visualizations to communicate data.

  Explain system proposal to gain approval to proceed project

The proposed systems design is documented in the form of a Final Systems Report. This report defines objectives and how the proposed system design will satisfy them. The primary purpose of the report is to inform and gain approval to proceed with ..

  Compare each new number to the last one entered

ITCO221:Compare each new number to the last one entered to determine if it is a duplicate. If it is, ask the user for a different number.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd