Data Governance, Privacy, and 3D Printing Assignment Solution

Verified

Added on  2022/08/27

|6
|897
|21
Homework Assignment
AI Summary
This document presents a comprehensive solution to a data governance assignment, addressing key aspects of information and data management. The assignment delves into the Notifiable Data Breach scheme under the Australian Privacy Act of 1988, outlining obligations for organizations and emphasizing the importance of trust in handling personal information. It defines information privacy, exploring its various applications like encryption and data masking, and examines the significance of ICT professionals considering internet and financial privacy. The assignment further investigates government and corporate data collection practices, highlighting the impact of technological advancements on data volume and the challenges of developing and maintaining data governance guidelines. Finally, it assesses the impact of 3D printing on intellectual property, focusing on potential infringements and the implications of customer-created replacement parts and infringing files.
Document Page
Running head: INFORMATION AND DATA GOVERNANCE
INFORMATION AND DATA GOVERNANCE
Name of the Student
Name of the University
Author Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1INFORMATION AND DATA GOVERNANCE
Table of Contents
Answer to Question 1:.........................................................................................................2
Answer to Question 2:.........................................................................................................2
Answer to Question 3:.........................................................................................................3
Answer to Question 4:.........................................................................................................3
References............................................................................................................................5
Document Page
2INFORMATION AND DATA GOVERNANCE
Answer to Question 1:
Notifiable data breach scheme is completely for organization which come under the
Australian Privacy Act of 1988. This merely outline the obligation in order to notify individual
who are affected by data breach. This scheme aims to boost the governance of privacy in
Australia. The overall trust of an organization which handle private information or even project
which complete look after personal information is wholly based trust factor (Leonard and
Principal 2018). People who have trust in the privacy needs protection and being confident
where personal information will be completely handle as per expectation. This particular law has
brought Australia in line with the present notification related to data breach in other places like
Europe and US. It is hoped that the given measures will ultimately help in improving privacy
protection of Australian. The point has been noted that this does not places an extra burden on
business. Client can expect that now only it will help in plan and protecting the future culture but
also help in ensuring personal information.
Answer to Question 2:
Information privacy can be defined as privacy of some of the personal, which completely
relates to personal data which has been stored in system. Information privacy can be used in list
of ways like encryption, data masking, and authentication. It merely ensures that all the given
information is completely available to only those who have authorized access (Wang, Ying and
Zhang 2016). All the given measures aim to ensure prevent data mining and any unauthorized
use of some personal details. There are list of information privacy which ICT professional must
consider at the time of implementing system like
Document Page
3INFORMATION AND DATA GOVERNANCE
Internet privacy – All the personal data which is provided over internet, completely
subject to different kind of privacy issues (Wang, Ying and Zhang 2016). Most of the website
aim to publish a policy for privacy which deals with website.
Financial Privacy: Financial information stand out to be very much sensitive as it merely
makes use of commit on fraud on both platform that is online and offline platform.
Answer to Question 3:
Government collects huge amount of data regarding individual and organization makes
use of wide range of purpose like national security, collection of tax, demographics, and strategic
analysis. Corporate need to do this some commercial reasons that are increasing business,
controlling expenditure, increasing profit, and gaining market share. Technological development
due to both hardware and software has completely made changes in scope, which can be amassed
and processed (Tchernykh et al. 2019). Huge amount of data are completely measured in
petabytes that can be easily controlled and stored. Disparate source of data found to be cross-
referenced for glean new meanings where single set of data is viewed from another. In between
the year 1930 and 1940, data volume were completely miniscule by completely comparison and
data processing in manual way. It not possible for most of the companies to develop guidelines
to cover different aspect of information both inside and outside the organization. In addition, it is
also possible to develop some guidelines on continuous to keep pace with changing issues.
Answer to Question 4:
3D printing comprises various kind of additive manufacturing, which help in production
of different physical object without the requirement of any specific tool. 3D printing has
completely changed the way in which organization manufacturer different articles. It merely has
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4INFORMATION AND DATA GOVERNANCE
significant impact on how different organization can protect their intellectual property (Moore,
Glisson and Yampolskiy 2017). One of the zone where 3D printing is thriving, complete
replacement of some parts. Instead of replacement from original manufacturer, some of the
customer go for printing the replacement parts.
Some of the impact that 3D printing on protecting the intellectual property are
Infringement from the competitors end.
Customer making all the required replacement parts
Customer providing infringing files on internet platform
Document Page
5INFORMATION AND DATA GOVERNANCE
References
Leonard, P. and Principal, D.S., 2018. The new Australian Notifiable Data Breach
Scheme. Available at SSRN 3154271.
Moore, S.B., Glisson, W.B. and Yampolskiy, M., 2017. Implications of malicious 3D printer
firmware.
Tchernykh, A., Schwiegelsohn, U., Talbi, E.G. and Babenko, M., 2019. Towards understanding
uncertainty in cloud computing with risks of confidentiality, integrity, and availability. Journal
of Computational Science, 36, p.100581.
Wang, W., Ying, L. and Zhang, J., 2016. On the relation between identifiability, differential
privacy, and mutual-information privacy. IEEE Transactions on Information Theory, 62(9),
pp.5018-5029.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]