Write the data security and privacy policy for the case

Assignment Help Case Study
Reference no: EM133723936 , Length: 1500 Words

Assessment: Case Study Report

Introduction
In this individual assessment, you will develop the cybersecurity policy, procedures, or guidelines for an organisation. Your findings should be delivered in a written report. For the given case study (below) write the Data Security and Privacy Policy for the case study presented below. Use an appropriate template to complete the report as shown in the report structure section.
Report Structure
Use an appropriate policy template. For Example:
CONTENTS
PURPOSE
SCOPE
POLICY STATEMENT
<Sub-headings are not numbered>
PROCEDURE
<Sub-headings are not numbered>
RESPONSIBILITIES

Records management
DEFINITIONS
Terms and definitions <delete if not required>
RELATED LEGISLATION AND DOCUMENTS
FEEDBACK
APPROVAL AND REVIEW DETAILS
APPENDIX <or APPENDICES> <delete if not required>

Case Study
Young Minds Secondary College (YMSC) is a private Australian secondary school that has been operating for several years, developing innovative programs for its students. Its staff has grown from 15 to 120 and the school enrols 700 students across level 7 to 12. YMSC has been growing steadily over the past 10 years. They have built strong relationships with the community and parents tend to send all their children to the school as well as recommending it to other parents. The owners anticipate continued growth and are planning to purchase another school to set up another campus.

YMSC is owned and operated by a group of parents who originally wanted to create an alternative education for their children. Their children have since finished school but the school was so successful in growth and is now managed by Joline Schack. The school's IT facilities have grown along with the school, and it now employs 2 full time staff (Tim and Abishek to keep the system running, as along with a program coordinator, Carol, who assists teachers to incorporate computing within their programs).
Joline can foresee a time in the near future where they employ over 300 people across two campuses. Their staff are mostly teachers, though the school does have a Human Resources manager, and Accounts Manager, several administrative assistants (receptionist, office manager, secretary), and grounds staff.

You have very recently been contracted to solve an area of concern to the owners - information security. The school's security measures have been
developed in a largely uncoordinated fashion and it has been suggested by Joline that information security could threaten the survival of the school. You have been given access to all staff for assistance in determining the security needs for YMSC.

In fact, it is Joline that has initiated your hiring. She encountered a little resistance from current ICT staff, arguing that continuing with the current approach is satisfactory. That approach has been one without a formal policy where security has been built in an ad-hoc, piecewise manner.
They would both say that the current policy has worked well enough up to now, thanks to the knowledge and expertise within the team.

Joline would like to have Tim more onside with the structured and formal approach that you will bring. In an attempt to get that support, Joline has asked you to begin your role with YMSC by developing a report that discusses how information security could be better managed by YMSC.
While this report will largely be about general principles, she would also like you to go into detail on one specific issue as a means of further demonstrating the usefulness of your formal approach. She would like you to go into detail about a development that both she and Tim are very concerned about, problems that will be introduced by opening a second campus. You have decided that you will choose one aspect of that development and draw up a Risk Management Plan for it and include a recommendation based on a Cost-Benefit Analysis.

The school currently uses commercial applications products for its processes. This includes a learning management system (Moodle), MSOffice, accounts and finance (Business One), a VOIP telephone system internally and several mobile phones for staff use. The school has a LAN infrastructure and it uses Wi-Fi throughout the campus. All employees that require regular access to school systems are supplied with a desktop laptop - depending on their needs. Students must have their own laptop or notebook and can access the school's network through the Wi-Fi system. Some of the school's systems need to be accessed from off campus. The school does have a print and file servers. All data for school management is backed up to cloud services provided by a local ICT provider. Email has been contracted to Microsoft.

Reference no: EM133723936

Questions Cloud

Analyze project parameters and identify the key processes : Effectively evaluate and utilize various IT project management tools and techniques to skillfully plan and manage projects
Productive cough and shortness of breath : A 74-year-old client presents to the emergency department with recent history of fever, productive cough and shortness of breath.
What ethical challenges are presented for law enforcement : Who are the stakeholders and how can you bring them all to consensus and collaboration? What ethical challenges are presented for law enforcement?
Concerned after doing developmental surveillance : The pediatrician was concerned after doing a developmental surveillance. He scored low in the areas of fine and gross motor skills as well as speech.
Write the data security and privacy policy for the case : Write the Data Security and Privacy Policy for the case study presented below. Use an appropriate template to complete the report as shown in the report
Right sided flank pain which just started two hours prior : A 35 year Caucasian male patient comes to the ER with right sided flank pain which just started two hours prior.
Legislated cyber security regulation, laws and ethics : Assessment: Research Report - Explain the legislated cyber security regulation, laws and ethics. You should provide your opinion on your findings
Medical practices and health care organizations : Why do medical practices and health care organizations need patient financial policies?
Identify a current technology that is impacting business : Identify a current technology that is impacting business. Explain how the supply chain is being affected by this technology. What is currently being affected?

Reviews

Write a Review

Case Study Questions & Answers

  What environmental issues the new belgium company work

HC2121 Comparative Business Ethics and Social Responsibility Assignment - Group Case Study. What environmental issues does the New Belgium Brewing Company work to address? How has NBB taken a strategic approach to addressing these issues? Why do yo..

  How will you use nursing knowledge to champion

Think about your future nursing practice. How will you use nursing knowledge to champion health promotion, disease prevention, and chronic disease management

  Do you agree that downsizing is an ethical issue

Do you agree with the five guidelines for downsizing ethically? Would you add any others - What if you do not agree with the reason for the downsizing

  How can scf and acl develop positive long-range relationship

Should Shell Case Fabrications (SCF)accept or reject Air Connection Links'(ACL)request? How should SCF negotiate with ACL? How can SCF and ACL develop a positive, long-range relationship? Give some specifics.

  Apply the concepts of game theory to ubers market

Analyze the market before Uber's entry. Describe the inefficiency Uber exploited and Explain Uber's surge pricing in the context of shifts in supply and demand

  Ethical analysis of the bp oil spill

Particular case because it has an interesting array of stakeholders, and because corporate culture was such a fundamental part of the problem

  Create a query to shoe each activity cost

Create a query to shoe each activity cost and total cost for each of the four orders. Present the query in screenshots of both design view and table view in MS Access.

  Case study - The Wallace Group

In the basic assignment, you are to pick out what YOU think are the KEY issues and make recommendations, applying class theory on the way

  What can you do get people interested and involved

What difference does this make to you, personally and professionally? Please (specifically) interpret what is now different for you

  Designing a High speed Wireless Data Link

Designing a High speed Wireless Data Link - Line of Sight Link Budget Analysis - calculate the link budget for a LOS Wireless link. Read through

  The basics behind effective police operations

Explain the various lines of communications present within any given local law enforcement agency -

  How would you describe hendrick focus

How would you describe Hendrick's focus? Based on your evaluation, what recommendations would you make to him? What, if anything, is the danger in Hendrick's thinking? Why would some be concerned about his line of thought and the potential outcome..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd