logo

Assignment of Cloud Privacy and Security

13 Pages3394 Words89 Views
   

Added on  2020-03-16

Assignment of Cloud Privacy and Security

   Added on 2020-03-16

ShareRelated Documents
Running head: CLOUD PRIVACY AND SECURITYCLOUD PRIVACY AND SECURITYName of the StudentName of the UniversityAuthor’s Note:
Assignment of Cloud Privacy and Security_1
CLOUD PRIVACY AND SECURITY1Table of ContentsIntroduction..........................................................................................................................2Privacy and Data protection.................................................................................................3Protection of Informal Digital identity................................................................................3Outline plan.........................................................................................................................41.Personal data and PII data for DAS users..............................................................52.PII data and Private data of the user in the HR Personnel Management suite.......63.Governance plan for personal and PII data for DAS of the contractors................74.PII data and financial data for users and DAS staff in the COTS payroll suite.....7Conclusion...........................................................................................................................8References............................................................................................................................9
Assignment of Cloud Privacy and Security_2
CLOUD PRIVACY AND SECURITY2IntroductionThe report discusses about the “personal identification information” or PII and theprotection of the personal data by “Department of Administrative service” or DAS that aims atproviding different types of services to the state government of Australia (Al-Fedaghi & Al-Azmi, 2012). PII or personally identified information are the data that are used for identifying aspecific individual potentially. Any type of information’s that are used for distinguishingsomeone from the other person can be considered as an PII. There are two types of PII sensitiveand non-sensitive. Sensitive PII includes the data which when exposed can cause seriousmassacre and can harm an individual.so the sensitive data should be encrypted so as to protectthe data. Non-sensitive data are those which can be easily gathered and does not harm anyone.Digital identity refers to the information of an entity used the computer system to represent it tothe external agent. Digital identities help in accessing the computer or the service in anautomated way. This report is going to discuss about the governing plans required for the PII anddigital identity that is to be adopted by Department of Administrative Services (DAS). This typeof services are mainly aiming at putting emphasis on the certain sections of the organization.With respect to the changes in the government policies, the main of DAS is to put emphasis onthe use of “shared services” (Chakravorty, Wlodarczyk & Rong, 2013). Which in terms highlightthe facts of DAS that id focusing on the process of creating a centralized service system whichcan help the government. Collection of the data by the various service providers need to be donefrom the centralized data of DAS (Theoharidou, Mylonas & Gitzalis, 2012). This is related to theapplication of “SaaS HR”, “personnel management suite”, “SaaS contractor management suite”,“Cots payroll solution” in the “AWS cloud”.
Assignment of Cloud Privacy and Security_3
CLOUD PRIVACY AND SECURITY3Government has taken the decision of using the MyLicense portal for the purpose ofrenewing the licenses. It helps the government to retain a track of the different kind of licensesindividual citizen is having (Bryant, 2013). Certain plans have been introduced by thegovernment for the purpose registering on My license portal and for the purpose of creating theirown informal digital identity (Cavoukian & Jonas, 2012). The use of data stored in database forthe purpose of making better plans and taking decisions by the different government bodies andpublic agencies (Venkatanathan et al., 2013). The different important topics like the assessment of the threats and risk related to“personally identifiable information data” on the MyLicense portal considering the privacy anddata protection with the solutions like control of the risk, adopting different Plans for controllingthe “informal digital identity”, “privacy” and “data protection” that are part of the digital identitythat has been discussed (Barocas & Nissenbaum, 2014). Privacy and Data protection Protection of Informal Digital identity Three components are included in the informal digital identity and they are“identification or registration”, “authentication” and “authorization” (Chen & Zhao, 2012). Theprocess which helps to get a digital identity is known as “Identification or registration”.“Authentication process” is the process of verification of different aspects related to someone’sidentity (Barocas & Nissenbaum, 2014). “Authorization” allows a user to make use of the digitalidentity for the purpose of identification in different “electronic transaction” and “online form fillup in the license website. “Identification” also includes four different parts and they are “self-asserted”, “direct”, “third party” and “detailed direct” (Chen & Zhao, 2012). “Self-asserted” is
Assignment of Cloud Privacy and Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud Privacy and Security : Assignment
|18
|4804
|105

Department of Administrative Services
|4
|574
|52

Threat and Risk Assessment for MyLicense Portal - Desklib
|11
|2635
|488

Cloud Privacy and Security
|18
|3664
|384

Personal Identifiable Information Assignment
|26
|5634
|103

Threat and Risk Assessment for PII ( Personal Identifiable Information )
|20
|6165
|318