Arise from collection and distribution of open data

Assignment Help Basic Computer Science
Reference no: EM132378308

You have been invited to participate in a panel presentation for a conference attended by federal government IT managers and staff. For this activity, you must prepare a 5 to 7 paragraph briefing statement which answers the following questions. Use information from the weekly readings. Go to Content >> Course Resources >> Expanded Explanation for Discussion Question Responses to learn more about the format requirements for a "briefing statement."

Definitions:

Privacy Impact Assessment (PIA): A PIA is both a process and a document. It is a process that focuses upon identifying and assessing risks related to privacy of data handled by a specific IT system or database. A PIA is also a document in which the results of the assessment are communicated to stakeholders. Some PIA's are released to the public in full while others are redacted to remove sensitive / non-public information.

1. What is privacy? Is it a right? An expectation? Discuss differing definitions, e.g. "the average person" definition vs. a legal definition, and how these differences impact risk assessments for privacy protections (or the lack thereof).

2. What are some important best practices for protecting privacy for information collected, stored, used, and transferred by the US federal government? Identify and discuss three or more best practice recommendations for reducing risk by improving or ensuring the privacy of information processed by or stored in an organization's IT systems and databases.

3. Explain why federal government agencies and departments required to complete PIA's. Must a PIA be completed for every federal IT system? Why or why not?

4. Name and briefly describe 3 benefits to citizens which result from the use of PIA's. (Considering citizen's needs for privacy and the protection of the privacy of individuals whose information is collected, processed, transmitted, and stored in federal government IT systems and databases.)

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.

To ensure you include all required elements, be sure to use the Discussion Rubric when creating your initial response, critiques, and replies.

You have been asked to provide a briefing for your state legislature's Joint Committee on Cybersecurity and Information Technology as part of their "Cyber Scholars Day." The members of this committee are elected representatives of your state's government. Since this is a formal setting, your briefing statement must be written and then delivered word-for-word from the prepared statement. (Think "speech" and you'll be on the right path.) Since you are a "scholar" it would be more appropriate for you to stick to the facts and, where opinion is needed, paraphrase from or quote authorities in the field. Inclusion of your own personal opinion is permitted but should be limited.

The topic of your briefing is: Potential Privacy Issues Arising from OPEN Data initiatives for federal and state governments. In your briefing statement you must:

• Identify and discuss 3 or more specific types of OPEN Data

• Identify and discuss 3 or more privacy issues which could arise from the collection and distribution of OPEN data

• Recommend at least 3 safeguards or counter measures which the legislators should consider requiring of state agencies when engaging in OPEN data initiatives.

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your briefing statement.

Post your briefing statement in a reply to this topic.

You must start a thread before you can read and reply to other threads

Reference no: EM132378308

Questions Cloud

Association analysis or cluster analysis technique : Define a data mining problem that can be solved using an Association Analysis or Cluster Analysis technique.
Technologies ate circuit switched versus packet switched : What are the differences between technologies that ate circuit switched versus packet switched? What are the pros and cons of each?
What role do end users play in incident reporting : What role do end users play in incident reporting? Should end users be encouraged to report suspicious occurrences? Why or why not?
Association analysis or cluster analysis technique : Define a data mining problem that can be solved using an Association Analysis or Cluster Analysis technique.
Arise from collection and distribution of open data : Identify and discuss 3 or more privacy issues which could arise from the collection and distribution of OPEN data
How botnet Necrus is related to IT infrastructure : what were your challenges? How you divided the work between 10 members. How botnet Necrus is related to IT infrastructure.
Discusses decision making using system modeling : Discusses decision making using system modeling. The author briefly mentions an open source software tool,
Double spaced paper on digital steganography : Double spaced paper on Digital Steganography, written in APA format, showing sources and a bibliography
Efficient frontier analysis to evaluate risks of portfolio : Assume you are the project lead for the analysis team that uses Efficient Frontier Analysis to evaluate risks of the portfolio presented in chapter 25.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd