What is one suggestion you have regarding securing data

Assignment Help Computer Engineering
Reference no: EM132297548

Question: Respond to the following in a minimum of 175 words:

Just a few years ago, all IT processing took place in-house. Payroll processing, human resources and benefits management, real estate management, and investor relations were done by employees within the parent organization. Even in the home environment, families kept information activities in-house, including annual tax returns and banking (through the writing of paper checks) and disagreements or issues with vendors was taken care of personally. Now we have online resources that push some of that overhead to external vendors. Examples include organizations that will process payroll and benefits administration, and stock brokerages that address investor traffic. Working with vendors brings up a few concerns.

Discuss?the following:

• Why is due diligence necessary when dealing with external vendors?

• What is one suggestion you have regarding securing data as it is in-transit to and from these vendors?

• What are two security protocols that should be part of the vendor's data operations? For example, if the data includes PII/SPII information, is adherence to external regulations and guidelines the responsibility of the vendor or your organization?

Reference no: EM132297548

Questions Cloud

What are the issues for calfornia businesses breaking : What are the issues for Calfornia businesses breaking into the Japanese marketplace, recommendations and an outlook on the future trade with Japan?
How the hospital can respond to the threat : Based on your chart, provide a final recommendation on how the hospital can respond to the threat. Summarize your chart findings, provide your recommendation.
Pieces of the puzzle that will go into your final decision : You are a decision maker at a large corporation. What are all of the pieces of the puzzle that will go into your final decision?
Undertaking a lengthy and expensive course : If a member of your team had created a learning and development plan for themselves that involved undertaking a lengthy and expensive course
What is one suggestion you have regarding securing data : Just a few years ago, all IT processing took place in-house. Payroll processing, human resources and benefits management, real estate management, and investor.
What are the pros and cons of cloud computing : Your work so far has been well-received and the management team is very interested in quickly bringing the rest of the organization into the process.
What feedback processes could you use to uncover : You are the senior coach of the Windemere Wombats A Grade basketball team. You have been concerned lately that the team, although still winning matches
Charge of responses to customers requests for refunds : As a customer service supervisor for the Deluxe Mobile Phone Company, you are in charge of responses to customers’ requests for refunds.
Make a statement of past or existing fact : Movers, however, alleges that the salesman did not make a statement of past or existing fact. Is Movers correct?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Show that the energy expression for the particle in a box

compare these to the energy levels the molecule would have if both walls of the box were infinite.

  Questionwrite down a c program myls that functions like

questionwrite down a c program myls that functions like unix command ls.purposely myls is a program that displays file

  Express what makes one algorithm better than another

A non-technical friend has asked whether some algorithms are better than others. express what makes one algorithm better than another.

  Script that will repetitively ask user for a binary number

write a script that will repetitively ask the user for a binary number and return its decimal equivalent until an illegal number (one containing digits other than 0 or 1) is entered.

  Software engineering and microprocessor systems

Software is required for a simple house burglar alarm system.

  Login to the system as root

Login to the system as root. Add multiple users named: user1, user2, user3, and user4.

  Build an app that executes a query against the players

Build an app that executes a query against the Players table of the Baseball database included in the Databases folder with this chapter's examples.

  What was the total of all costs expensed

What was the total of all costs expensed on the operating income statements across both years under absorption costing and under variable costing?

  Discuss set of policies that can be used to control security

Discuss a set of policies that can be used to control security provided by outside organizations. Use Ben's graphics business as a focal point.

  How your team has decided to address the issues

Discuss issues encountered in the work and how your team has decided to address the issues. Prepare a functional prototype of your application.

  Design the function definitions of pixel class constructor

Write the function definitions of the Pixel class constructor adn CurrentStatus member functions.

  Summarize two disneys newest strategies being announced

Summarize one or two Disney's newest strategies (strategic moves) being announced and implemented. You do not need to use technical terms to name the strategies you found.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd