Understanding of laws-regulations related to privacy issues

Assignment Help Basic Computer Science
Reference no: EM132374187

Purpose

The purpose of the Course Paper is to evince your understanding of the laws and regulations related to privacy issues and challenges found in information technology settings.

Assignment

In this Course Paper your team must draft three workplace policies about privacy for a client company. You have been hired by that company to help it create three new policies that govern privacy in the workplace. The client needs to comply with the applicable privacy laws and regulations that relate to its business, as well as privacy rules that relate to its employees.

The three privacy policies will govern your client and its employees. The policies shall not be targeting the client company's customers or website visitors, for example. Rather, they are meant to be used by your client's employees. Imagine that you are working in your client's place of business and need to understand how to comply with privacy laws and regulations, or to understand your own privacy rights and restrictions in the workplace.

Requirements

Draft your Course Paper according to the Main Requirements, above, and by following these simple. additional rules:

I. Select one of these four industries to represent your client's business: (I) financial institution; (2) education; (3) health care; or (4) government. Tell the reader your client's business name (of your creation) and the industry sector that best describes your client's business. Also, add a few sentences about why it is important in that industry to have privacy policies that comply with laws and regulations.

2. Draft three privacy policies. Number your policy statements and carefully and concisely draft each one in a way that is easy to understand by your client's employees. Generally, the policy statement should be no longer than one or two sentences. Take care to avoid drafting security policies, such as encryption standards, or BYOD limitations; remember, there is a difference between the processes of information security, and privacy, the result of security policies.

3. Next, justify your inclusion of each of the three policy statements in your client's workplace. Here, under each of the three policy statements, you must write a short paragraph or two to explain to your client why you chose to advise them to include the policy. This area will include your discussion about the laws and regulations you learned about in this course.

Generally e., this is not a template-the paper should follow the following structure:

I. Introduction

a. Your name

b. Client company name

c. Client company industry

d. Client company's industry-specific privacy requirements, risks. etc. 2. Policies

a. Policy I

b. Justification I-e.g., laws, regulations. guidelines, etc. You will see in the grading, below, that this is where the most points may be earned. 60% of the paper's score comes from your team showing that you know, not only how to draft a concise. effective policy, but moreover that you know why said policy is important to your client.

c. Policy II

d. Justification II

e. Policy III

f. Justification HI

Reference no: EM132374187

Questions Cloud

Team leadership-discuss your learning outcomes : As a group, present a discussion of your learning outcomes from the article review. Present your learning outcomes using power points.
Phase will involve performing records inventory : This phase will involve performing a records inventory. The organization is far too large to undertake a records inventory for the entire company.
Information technology-governance concepts-strategies : Select a topic of interest within the areas of Information Technology, Governance Concepts, Strategies, or Best Practices.
Key decision criteria for selecting it sourcing option : IT sourcing is a process of choosing or acquiring information technology resources from external sources outside of the organization.
Understanding of laws-regulations related to privacy issues : Course Paper is to evince your understanding of the laws and regulations related to privacy issues and challenges found in information technology settings.
Strategic alignment model-strategic alignment maturity model : IS Strategy Triangle, Strategic Alignment Model, Strategic Alignment Maturity Model, Strategic Grid and Limitations
Different network firewall software applications : Suppose that two different network firewall software applications are being tested by a new small business. Two firewalls were tested, A and B.
Develop records inventory survey : Develop a Records Inventory Survey Form that you are going to use in surveying the departmental unit(s) you have identified above.
Discuss how information is provided in the dashboard : Describe the data in dashboard and discuss how information is provided in the dashboard. Provide link to digital dashboard used for Business Intelligence.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd