Regulations affecting financial companies

Assignment Help Basic Computer Science
Reference no: EM133191148 , Length: 2 Pages

You play the role of chief information technology (IT) security officer for the Quality Medical Company (QMC). QMC is a publicly traded company operating in the pharmaceutical industry.

QMC is expanding its arena of work through an increase in the number of clients and products. The senior management of the company is highly concerned about complying with the multitude of legislative and regulatory laws and issues in place. The company has an internal compliance and risk management team to take care of all the compliance-related issues. The company needs to make important decisions about the bulk of resources they will need to meet the voluminous compliance requirements arising from the multidimensional challenge of expansion.

QMC will be required to conform to the following compliance issues:

Public-company regulations, such as the Sarbanes-Oxley (SOX) Act.

Regulations affecting financial companies, companies that make loans and charge interest, such as the U.S. Securities and Exchange Commission (SEC) rules and Gramm-Leach-Bliley Act (GLBA).

Regulations affecting healthcare privacy information, such as Health Insurance Portability and Accountability Act (HIPAA).

Intellectual Property Law that is important for information asset protection particularly for organizations in the pharmaceutical and technology industry.

Regulations affecting the privacy of information, including personal identification information, such as personally identifiable information (PII) regularly collected from employees, customers, and end users.

Corporate governance policies including disclosures to the board of directors and the auditors and the policies related to human resources, governance, harassment, code of conduct, and ethics.

Compliance with regulatory requirements implies encrypting sensitive data at rest (DAR) and allowing access to role-holders in the enterprise who require the access. It also implies that sensitive data in motion (DIM) or data that is being communicated via e-mail, instant message (IM), or even Web e-mail must be suitably protected and sent only to the individuals who have a right to view it. The company is conscious about the loss they may face in terms of penalty and brand damage if they fail to abide by the compliance laws, especially in the online information transfer phase. Therefore, as a dedicated employee, your task is to develop a content monitoring strategy using PKI as a potential solution. You will need to determine a process or method to identify multiple data types, processes, and organizational policies.

Incorporate them into a plan, and select a PKI solution that will effectively address the content management needs of your company.

Reference no: EM133191148

Questions Cloud

Implementing cybersecurity in the energy sector : University of the Cumberlands-Imagine you have been hired as a security consultant for EnergyA which is an electric utility company based in the USA.
Personal tracking devices : Arizona State University-The data interacts with other personal tracking devices as well as web site. Do you own your data?
Create attack tree showing threats : Research solutions you would recommend for this business. Create an attack tree showing threats that may impact the ABC Learning Center.
Hypertext transport protocol secure : University of cumberland-Discuss with your peers which of two remote access solutions, virtual private networks (VPNs) or hypertext transport protocol secure
Regulations affecting financial companies : University of the Cumberlands-Regulations affecting financial companies, companies that make loans and charge interest,
Extent preparing data for statistical modeling is important : Where do the data for business analytics come from? What are the sources and the nature of those incoming data?
Managerial issues of networked organization : Research at least two articles on the topic of managerial issues of a networked organization.
E commerce and mobile technologies : niversity of Nairobi-Your company is experiencing decline in business because of competition. Explain what is E-Commerce and Mobile Technology.
Discuss that organization and share your link : University of dental Missouri-The need for green computing is becoming more obvious considering amount of power needed to drive our computers, servers, routers,

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Potential risks involved with cloud computing

What are some of the potential risks involved with cloud computing?

  Bit-comparator is a combinational circuit

A Bit-Comparator is a combinational circuit with 2 inputs, A and B, and 3 outputs.

  Strategic objective simple and straightforward

In your opinion, what is the best way to keep a strategic objective simple and straightforward?

  Explain what is wrong with the correlated subquery

Explain how the query in your answer to Review Question 8.5 differs from the query in your answer to Review Question 8.7.

  What are the pros and cons of all four issues

What are two privacy issues that face individuals for the current year? What are the pros and cons of all four issues?

  Describe group work in terms of time and place framework

Explain why it is useful to describe group work in terms of the time/place framework. Explain why most groupware is deployed today over the Web.

  How much additional income does nick need

How much additional income does Nick need to receive in order to be as well off as when px = 2?

  Type of tire extensive testing

A tire company has developed a new type of tire Extensive testing indicates that the mean mileage for the tire is 40,000 miles and a standard deviation of 3,500

  Project termination

"What do I feel are the most important aspects of my learning in the chapters this week?"

  Briefly describe each of the planning functions

Describe the four department groups and their purposes. Briefly describe each of the planning functions. Explain importance of information systems management

  Non-homogeneous differential equations

Second Order Linear Homogeneous and Non-homogeneous Differential Equations with Constant Coefficients with Applications

  Implementation of new policies

Do you believe that training is a necessity in the implementation of new policies

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd