Network Management: Privacy and Global Business Operations

Verified

Added on  2020/03/23

|6
|2080
|34
Essay
AI Summary
This essay provides a comprehensive overview of network management in organizations, focusing on the crucial aspects of privacy laws and their global implications. It delves into the significance of effective network management for business efficiency and productivity, emphasizing the need for transparency and data protection. The essay examines privacy laws and regulations across different regions, including the United States, Canada, and Europe, highlighting the complexities and variations in data protection standards. It discusses key legislations such as PIPEDA and the GDPR, and their impact on international business operations. The essay also explores the privacy landscape in Asia-Pacific, India, and Latin America, revealing the diverse approaches to data protection across the globe. It concludes by emphasizing the importance of adapting network management strategies to comply with varying privacy laws, ensuring effective data protection and business success in the global market.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
RUNNING HEAD: Network Management in Organizations
1
Network Management in Organizations
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Network Management in Organizations 2
Network management is the procedure of overseeing and taking care of the personal computers
systems of one or numerous associations. Successful organization is basic to the accomplishment
of system associations and can diminish the hazard innately connected with the helpful
procedure. This essay explains the privacy laws and principles important for doing the business
globally. The essay describes the difficult information network to expand the business efficiency
and productivity of organizations. The main purpose of this essay is to help with the many-sided
quality of an information network and confirm that information can run across it with greatest
effectiveness and transparency to the customers.
According to Ding, J. (2016), the assurance of individual data is an imperative issue as business
operations turn out to be progressively globally in nature. Combined with the Internet
empowering individual information to be circulated immediately over the globe, security has
rapidly turned into a basic international worry that can much of the time confound because of an
overall interwoven of laws and controls. A United States affiliation coordinating business in
various outside locales must know security laws are not equivalent all over the place. Unless the
most prohibitive administrative government is adopted, nation by nation strategies may be
essential.
According to Glasbergen, P. (2012), Canada is regularly thought to resemble to the
United States with respect to business rehearses, security control is another issue. The Canadian
approach to manage mystery and the trading of individual information is significantly more as
per the European model than that of the United States. The administration singular information
security organization in the Canadian private division is essentially spoken to by the Personal
Information Protection and Electronic Documents ACT (PIPEDA), which wound up noticeably
suitable in 2004 and stretches out security affirmation to each individual information assembled
by organizations on people throughout the business movement, except workers other than those
of a federal endeavor. According to Group, A. (2012), it follows, in many cases, individual data
of representatives is managed by appropriate common law. Just Alberta, British Columbia, and
Quebec have initiated security establishment. In this way, regular institution is liberally like
PIPEDA. Ontario has approved insurance authorization however just with respect to individual
wellbeing data.
Document Page
Network Management in Organizations 3
According to Huang et al. (2016), it is imperative to note that while exchanging individual data
outside of Canada, the exchanging association has a commitment to give an equivalent level of
insurance meaning the level of security gave the outsider must be similar to the level of
affirmation dealt with the individual information inside Canada. The Privacy Commissioner of
Canada has chosen that, despite the United States of America PATRIOT Act, singular
information traded to the United States can advantage from assurance like that acknowledged in
Canada (Kazuya, 2016). She incorporated that notice must be given to individuals advised them
to the truth their information will be secured in the United States where it winds up noticeably
subject to the USA PATRIOT Act.
Other current, prominent case included Facebook, well-known long range
interpersonal communication site. According to Kershenbaum et al. (2013), on July 16, 2009,
Canada's Privacy Commissioner chose that Facebook was in break of Canadian security laws on
a couple of fronts, particularly concerning the conditions enveloping encompassing agree to the
divulgence of individual information to outsider application designers and the support of
individual information of clients who had shut their records. At first, Facebook contradicted
complete consistency with the Privacy's Commissioner's recommendations. Along these lines,
given the Commissioner's ability to exhibit the issue to the courts, Facebook finally proposed
plans satisfying Canadian security laws. As Facebook learned as a worldwide approach to
manage security works just where the security arrangement is composed to consent to all
purviews in which an affiliation cooperates. As indicated by Misra et al. (2010), Facebook as of
now exhibited that it plans to alter general practices to execute Canadian security necessities all
around. There is another case speaking to this is the circumstance of abika.com which is the
United States based online data specialist. On July 31, 2009, following an about the five-year
examination, the Privacy Commissioner ruled Abika had harmed Canadian security laws by
uncovering the individual information of Canadians without their knowledge or consent to
outsiders. According to Rao (2011), the privacy laws and regulations in Europe have built up an
extremely complex individual data assurance administration with stringent benchmarks that have
affected the appropriation of security laws all through the world. Order 95/46 was sets out the
general models with regards to the getting ready of individual information, which are right now
completed in the national law of every European Union state. The shrouded principles of
Directive 95/46 were, as it were, on those of all inclusive bodies, for example, OECD's
Document Page
Network Management in Organizations 4
Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. The European
Union's security sanctioning nearly takes after that of Canada, regardless, how this authorization
is deciphered can provoke a few amazing contracts, specifically the legitimacy of consent given
to the collection, utilize and reveal of individual data.
According to Taticchi et al. (2012), assent is the lynchpin of Canadian security
authorization. In the European Union Directive, individuals from or about whom data is
accumulated ought to unambiguously surrender their consent before such data is gathered, in the
wake of having been taught about the reason for which the data will be utilized. The translation
of the legitimacy of consent may influence a United States business taking care of individual
information of European customers or laborers. For instance, contingent upon delegates consent
to the accumulation of certain individual information can end up being troublesome as some
European countries question whether that assent is "straightforwardly given" gives the want to be
utilized or to keep work. On another side, another key rule of the European Union security
arrange is that it precludes the trading of individual information to non-European Union
countries, including the United States, unless those countries give palatable assurance for the
information. While the United States has not been legitimate, regarded to give adequate
assurance, the two purviews are masterminding keeping in mind the end goal to support standard
business relations. The Safe Harbor Agreement permits United States organizations to maintain a
strategic distance from sanction forced by the European Union if they deliberately embrace some
degree less stringent form of the European Union security mandate.
The other part of this essay explains the security laws and controls in whatever is left of the
world by barring Canada and Europe. As per Saz-Carranza (2012), while doing the business
outside of Canada and Europe, what happens next is anyone's guess regarding the degree that
security institution exists or is approved. In a few wards, there is no one law or administrative
structure representing strategy. Disregarding this, laws or directions relating to security are every
now and again found as a sub-set division specific or set up laws. The locales of Asia-Pacific that
have right now got security order fuse Australia, Hong Kong, Japan, Macao, New Zealand,
South Korea and Taiwan. China, Malaysia, the Philippines, and Thailand are at introduce amid
the time spent drafting sanctioning. Indonesia, Singapore, Vanuatu and Vietnam just have
assurance game plans in part particular laws. Regardless, a few Asia-Pacific locales don't have
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Network Management in Organizations 5
security establishment, including Brunei, Cambodia, Laos, Myanmar and the greater part of the
little Pacific island nations.
According to Sroka & Hittmar (2017), the privacy laws and regulations in India do not have
extensive protection laws set up. The privilege of insurance is not unequivocally perceived in the
Constitution of India, regardless of the way that the Supreme Court of India has recommended it
from article 21 of the Constitution which communicates that, "No individual might be denied of
his life or individual opportunity beside as demonstrated by strategy developed by law". Be that
as it may, this privilege is not total and can be restricted under frameworks set up by the law or if
predominant intrigue charges it. Laws that do exist relate to the security of data held by open
budgetary bodies, for example, banks and electronic information, for example, the Information
Technology Act of 2000. India is moving to adjust their security laws to Europe and distinctive
locales. The Personal Data Protection Bill, basically depend on foreign security enactments
which were initiated in 2006 and is currently still pending.
The last part of this essay shows the issues in Latin America which states that there are very few
many Latin Americans locales have any security establishment and there is no solid structure for
the area. In any case, the centrality of a mixed security legal structure for the region has been
seen and various countries in this area are at present chipping away at creating it (Subramanian,
2010).
From the above essay, it is concluded that efforts are in progress in numerous areas to fit
authorization, assurance laws around the globe still difference in many regards. Outside of
Canada and Europe, assurance institution is either non-existent or an interwoven of division
particular laws and directions. Joined States associations directing business in these locales must
utilize the most stringent establishment as the most minimized shared factor in order to build up
a powerful protection approach.
Document Page
Network Management in Organizations 6
References
Ding, J. (2016). Advances in Network Management. CRC Press. The United Kingdom.
Glasbergen, P. (2012). Managing Environmental Disputes: Network Management as an
Alternative. Springer.
Group, A. (2012). Network Management: Concepts and tools. Springer.
Huang, H., S., Hu, S., C., Lee., P., H., & Tseng., Y., C. (2016). An adaptive Paris Metro
Pricing scheme for mobile data networks. International Journal Network Management.
26(6), 419-578.
Kazuya, O. (2016). Strategic Policy-Based Network Management in Contemporary
Organizations. IGI Global.
Kershenbaum, A., Malek, M., & Wall, M. (2013). Network Management and Control. Springer.
Misra, S., Rohith Mohan, S.V., & Choudhuri, R. (2010). A probabilistic approach to minimize
the conjunctive costs of node replacement and performance loss in the management of
wireless sensor networks. IEEE Transactions on Network and Service
Management, 7(2), 107–117.
Rao, H., U. (2011). Challenges of Implementing Network Management Solution. International
Journal of Distributed and Parallel Systems. 2(5), 67-74.
Taticchi, P., Cagnazzo, L., Beach, R., & Barber, K. (2012) "A management framework for
organisational networks: a case study", Journal of Manufacturing Technology
Management, 23(5), 593-614.
Saz-Carranza, A. (2012). Uniting Diverse Organizations: Managing Goal-oriented Advocacy
Networks. Routledge.
Sroka, W., & Hittmar, S. (2017). Management of Network Organizations: Theoretical Problems
and the Dilemmas in Pratice. Springer.
Subramanian, M. (2010). Network Management: Principles and Practice. Pearson Education.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]