Ask a question from expert

Ask now

Privacy Strategy Security of Personal | Assignment

11 Pages1941 Words94 Views
   

Added on  2020-03-28

Privacy Strategy Security of Personal | Assignment

   Added on 2020-03-28

BookmarkShareRelated Documents
Cloud ComputingStudent’s NameUniversity’s Name
Privacy Strategy Security of Personal | Assignment_1
Personal Data Privacy Strategy 1.Security of personal informationa.Data analytics has changed drastically and it is quite challenging to use data in a systematic and right manner so that the data is not misused. Along with enormous social and economic benefits, it accumulates threats and challenges. The data which is given by a person or an individual which might be any opinion that has been provided should not be disclosed because of its sensitivity and also trust that has been put on the organization[CITATION Off16 \l 16393 ].b.To get or access personal information of an individual who has an identity, they first need the permission to retain the information of the particular individual. And also, after retaining the sensible data, organization should take enough steps to protect the sensible data to not fall in the hands of misuse or allow any authorized access to the data which can be exposed.c.Guidance should be properly given under any circumstance such as:i.Misuse – This is done for the usage of direct marketing and also usedin government related identifiers [CITATION Off15 \l 16393 ].ii.Interference – Expose of personal information but the data cannot be overwritten.iii.Loss – loss of personal information is addressed in this section. Failure of keeping adequate backups will result in system failure.iv.Unauthorized access – Access of personal information who should not be available for accessing.
Privacy Strategy Security of Personal | Assignment_2
v.Unauthorized modification - Occurs when the entity is not allowed by someone who is not authorized to access or retain the information.vi.Destroying personal information – when the organization founds thatthe related data stored is not up-to-date, personal data present in the database should also be deleted. This will also help in freeing the memory and increasing the speed of processing [CITATION Off15 \l16393 ].2.Access to personal informationa.Suppose say that the organization you work in has a process of receiving and responding to the privacy enquires, requests and also complaints that areraised by the individuals for accessing to their personal information. Now, does the organization has a procedure of capturing these service? If yes then the data should be very carefully handled as the data is more sensible[CITATION Pri17 \l 16393 ].b.With the type of request and information that has been provided by the consumer, the complaints will first get register and will be assigned or will be directed to the appropriate staff for completion of the request[CITATION Off14 \l 16393 ].c.Along with the request or complaint, to access the information for the organization, the organization needs minimum requirements to access the personal data which comes with a security constraint that is, the data will be available for only certain time period of time and also this comes with certain benefits to the personal because one has the right to explain why the refusal for not providing whole information and written notice will act as
Privacy Strategy Security of Personal | Assignment_3
invoice which is also a right way to be known that the organization has utilized the individual personal data at certain time to certain complaints to be resolved.Privacy Controls RecommendationsS. No.“Privacy ControlsRisks(Personal data)”“Mitigation Plans”“ImplementationStudent1StudentID1.Malicious activity risk of personal data[CITATION Aus13 \l 16393 ]1. Communication strategy – the scope of contexts is huge here. This requires knowledge on digital literacy with which they can handle privacy issues.1. Consumers must be having knowledge about the service that theorganization provides to secure their information and along with that, organization should educate their consumer to its 100 percent usage.
Privacy Strategy Security of Personal | Assignment_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Legal & professional issues in nursing
|3
|502
|90

INFORMATION SECURITY MANAGEMENT.
|3
|324
|3

Network Security: Importance, Aims, Issues, Current Techniques, and Future Solutions
|8
|3208
|244

Administration Law Report - Information Act 1982
|6
|1344
|138

Patching Rhododendron Application
|4
|883
|113

Google and the Right to Be Forgotten | Assignment
|5
|1037
|21