What obligations does xyzrg have under privacy legislation

Assignment Help Computer Engineering
Reference no: EM133337763

What would be the expected answer for those two questions for this case study please? I have no clear ideal where to go. Thank you advance in suggesting direction:

Case:

XYZ Realty Group (XYZRG) is a prominent high-end real estate agency headquartered in Melbourne. XYZRG offers real estate services to buy, sell, rent, invest, and manage all kinds of real estate properties throughout Australia. XYZRG, which has a large customer base, conducts high-value transactions involving large sums of money on a daily basis. A large quantity of proprietary information is managed and secured at the data centre, which is located at the corporate headquarter.

Each XYZRG real estate agent is given a laptop with a variety of up-to-date advanced security products (e.g., antimalware and firewall) and software applications (e.g., MS Word and Excel) pre-installed. The agents are permitted to use the laptop both inside and outside the office to serve XYZRG clients (e.g., buyers, renters, residents, corporations, and investors). The laptop also comes with virtual desktop software to securely connect to XYZRG and access resources from the data centre.

Carole, a top-performing real estate agent in the Melbourne office, frequently stores data locally on her laptop in plain-text. The laptop was password-protected, but her password is terribly weak. She also uses the laptop, in addition to servicing XYZRG clients within Melbourne, to stay connected with the clients and other agents, market business to clients, share data and information with other XYZRG and other agents, and close deals quickly.

To protect the assets at the data centre, XYZRG deploys access control systems, firewalls, antivirus and anti-malware software, denial of service prevention, an email security system, and so on.

Question;

Carole left her company-issued laptop in a locked car while running an errand. The car was broken into, and the laptop stolen. Analyse and reflect on the laptop incident under appropriate privacy legislation by considering the following questions:

• Why should XYZRG consider the incident may have violated privacy legislation?

• What obligations does XYZRG have under privacy legislation, if any, what those obligations are, and why XYZRG need to comply to those obligations?

Support your analysis with good evidence and examples.

Reference no: EM133337763

Questions Cloud

Types of gantt chart formatting : Summarize why we sort, group and filter data. Which methods have you seen used? Compare and contrast types of Gantt Chart formatting.
Which is in the doctor of computer science-cybersecurity : Please relate it to My concentration which is in the doctor of computer science - cybersecurity and Information Assurance.
What are the limitations on free speech in cyberspace : MIS 600 Metropolitan State University Of Denver Describe the Chain of Custody and how it applies to digital evidence and What are the limitations on free speech
Explain how each are protecting the assets : Identify and list all the different access control systems you can find in your home or office setting. Explain how each are protecting the assets.
What obligations does xyzrg have under privacy legislation : What obligations does XYZRG have under privacy legislation, if any, what those obligations are, and why XYZRG need to comply to those obligations
Regards of network monitoring : In regards of network monitoring: Free and open source serves a purpose for users who cannot afford monitoring
Explain aup is in place to protect the entire organization : The security manager explains to Marvin that the AUP is in place to protect the entire organization.
Data analytics companies : Research 3 different data analytics companies and the tools and services they provide.
Share an example of a cloud computing activity : Share an example of a cloud computing activity you have completed or a cloud computing app you have used or using

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd