Create an initial post in which you analyse an act

Assignment Help Basic Computer Science
Reference no: EM13993192

The volume of data circulating the Internet is astronomical, and amongst these data are troves of personal information gathered from HTML forms, emails, Google searches and so on. In many cases, the information is relatively ordinary and harmless (e.g. a name or address), but other forms of personal information can be considered ‘sensitive data'. This includes things like ethnic origin, political opinions, medical conditions, financial data and more. In order to protect such data, several countries have enacted ‘Data Protection Acts' to guard against information loss, misuse and/or theft.

Consider for a moment the country within which you reside. What sorts of data protection acts or laws exist there? How effective do you think they are at protecting sensitive information? For this Discussion, research one of these acts along with a type of organisation where data protection is important (e.g. banking, health care, education, etc.). Analyse at least 3-4 potential violations of your selected act within your selected organisation type and recommend countermeasures to mitigate its likeliness to occur.

To complete this Discussion:

Post: Create an initial post in which you analyse an act within your country with the purpose of protecting data. Focus on how your selected act protects data. Analyse a type of organisation of your choosing (e.g. banking, health, etc.) and identify at least 3-4 violations of data protection that could occur (e.g. disclosure of patient data, disclosure of employee information, etc.) and how the violations might occur. Based on your analyses, evaluate the likelihood of at least one of your noted violations occurring and recommend countermeasures to reduce that likelihood. Explain why you selected that violation to discuss.

Reference no: EM13993192

Questions Cloud

Determine the directions of the currents in each resistor : Consider the circuit shown in (Figure 1) . The batteries have emfs of E1=9.0V and E2=12.0V and the resistors have values of R1=28Ω, R2=64A?©, and R3=32Ω. Determine the magnitudes of the currents in each resistor shown in the figure. Ignore interna..
Define and give examples of three strategies : Define and give examples of three strategies that are rooted in instruction design theory referred to in our Course Content: Organizational strategies. Delivery strategies. Management strategies.
Denote the mean of a random sample of size : 1. Let X denote the mean of a random sample of size 100 from a distri­ bution that is x2(50). Compute an approximate value of Pr (49 X 51).
Instances of an important theorem : Find the limiting distribution of Yn as n -+ oo. This exercise and the immediately preceding one are special instances of an important theorem that will be proved in the next section.
Create an initial post in which you analyse an act : Create an initial post in which you analyse an act within your country with the purpose of protecting data. Focus on how your selected act protects data.
Calculate the currents in each resistor : Calculate the currents in each resistor of the figure. Calculate the current in 25Ω resistor. Calculate the current in 120Ω resistor.
Does it appear that the realty business can pay it is debts : Identify the personal items given in the proceeding facts that would not be reported on the balance sheet of the business.
Create at least six screens representing various states : Make the purpose small and achievable. For example, imagine an application that constantly keeps you updated on what is happening in the class, with classmates posting and commenting on your work and assignments. Be sure to explain the purpose of ..
What is the value of the resistance of the circuit : What is Imax, the amplitude of the current oscillations in the circuit? What is R, the value of the resistance of the circuit? What is C, the value of the capacitance of the circuit?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Discuss when program might use both base and derived class

Discuss when a program might use both the base class and the derived class and why

  How asymptotic notation can be used to rank the efficiency

To illustrate how asymptotic notation can be used to rank the efficiency of algorithms, use the relations "Ì" and "=" to put the orders of the following functions into a sequence, where e is an arbitrary real constant, 0

  Influence or change users relationship with information

How does the technology of information feed influence or change users' relationship with information?

  Describe the four basic access rights for files

Explain the role of a file name and a path name in locating a file on a hard drive. Describe the four basic access rights for files and other resources in general.

  Edmonds-karp algorithm for finding the maximum flow

1. Edmonds-Karp algorithm for finding the maximum flow of O (NM 2 ) 2. Method push predpotoka finding maximum flow of O (N 4 ) 3. Modified method for pushing predpotoka O (N 3 ) 4. Feed restrictions 5. The flow of minimal cost (min-cost-flow). Algori..

  What networking-communications changes were in past decades

What networking and communications changes were introduced in the past decade (2000s), and what were their implications?

  Your cousin has asked you to help her to design a small

your cousin has asked you to help her to design a small home network for her own use.a what are the important questions

  Explain computer etiquette for effective communication

Each day we should be careful to insure that personal information is not compromised. Computer etiquette is difficult for effective communication.

  Given a 3 millisecond seek time

Given a 3 millisecond seek time for a disk drive and assuming that once you reach the starting track you will write the file as contiguous sectors, how long will it take to write a 1 megabyte file? The disk rotates at 7200 rpm and each sector hold 1 ..

  Explain how data and information can be categorised

What is meant by data? What is meant by information? How can data information be categorised? Where from? Used for?

  Describe the graphical coordinate system in java

Describe the graphical coordinate system in Java. Where is the origin? What units apply to the x,y coordinates?

  Analyze the major threats to mobile devices

Analyze the major threats to mobile devices, and suggest at least two (2) methods to mitigate the concerns and make the devices more secure from an organizational standpoint. Justify your response.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd