logo

Entity Management Service for Internet of Things-Based

   

Added on  2022-09-05

8 Pages2105 Words22 Views
Running Head: DATA POLICY
Data Integrity Policy
Name of the Student
Name of the University
Author Note
Entity Management Service for Internet of Things-Based_1
DATA POLICY
1
Table of Contents
Brief Overview................................................................................................................................2
Policy Purpose and Rationale..........................................................................................................2
Policy Scope....................................................................................................................................3
Roles and Responsibilities...............................................................................................................4
Mandatory Requirements.................................................................................................................5
Exemptions......................................................................................................................................5
Glossary...........................................................................................................................................5
Reference.........................................................................................................................................7
Entity Management Service for Internet of Things-Based_2
DATA POLICY
2
Brief Overview
The Regional Gardens Company is an enterprise in gardening, they own a nursery and
provides supplies to the people nearby. A consultancy company named as Regional Garden
Planner on gardening advice is associated with this company. They manage a small data centre
that handles all the data generated in both the places. The main server of the company is situated
in the data centre only along with the overall storage system. The company’s web page is quite
active too but not operated well in terms of security. The overall staffing of both the company is
about 65.
The computer systems used the Regional Garden Planner are mostly old, the operating
system of those systems are Windows 7, the number of MacBooks present is 3 with OS X.
Hence, the chance of getting affected by viruses will be easier. The company must undertake a
set of policy to be aware of the security risks and data loss threats so that proper risk mitigation
techniques can be done accordingly [1]. The open-access of the internet that is available to all the
employees are accessible from any device and any network. This increases the company’s
vulnerability toward risks.
Policy Purpose and Rationale
The intent of the data policy is to provide a strong structured set of rules for maintaining
the computer system, its access permissions, proper software updates, limiting the access of
internet through the systems, updated operating systems, patch installing on fixed intervals [2].
The address of the server of the company must be private. The proper data back-up, latest
technologies for data retention, cloud storage of the data, monitoring of the activities in the
company server, technologies for data security, network security and server security [3]. The
updated firewalls and anti-viruses for the computer systems, proper protection to the emails,
installing the server away from the networking system, individual password of the employees,
locking of the computers by individual id and password of each employee.
The purpose of the data policy is presented below:
To maintain the authenticity of the server and the network of the company.
The computer systems with an updated operating system will perform better in managing
the tasks that are carried out through the online servers.
Entity Management Service for Internet of Things-Based_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Risk Management - Regional Gardens | Study
|10
|3058
|15

Assignment | Cyber Security
|23
|2174
|14

Performance Verification Challenge
|13
|1930
|17

CSS 111 - IT Risk Management - Report
|7
|757
|50

Fundamental of Projects Management
|10
|1007
|19

Methods to Secure a Network and Control Fraud in Online Transactions
|21
|5218
|63