Privacy and data sovereignty strategy assessment

Assignment Help Computer Engineering
Reference no: EM132599648 , Length: word count:4000

ITC568 Cloud Privacy and Security - Charles Sturt University

Assessment - Security, Privacy and Data Sovereignty strategy

Scenario

The sudden increase in COVID-19 cases worldwide has caused considerable disruption in many countries. However, a number of countries have started to use an individual tracking approach to try and contain the spread of the virus.

A number of countries have developed mobile phone apps that track people and their movements. Some details of these apps are:
• Singapore: Contact tracing app. See:
• South Korea: Tracking mobile phones and cashless transactions:
• Taiwan: Quarantine by mobile:
• Australia: CovidSafe:

Tasks

After your successful engagement to develop privacy and personal data protection strategies for DAS, you have been engaged by the Department of Health (DoH) to advise on the development of privacy and data protection for CovidSafe users. DoH expect up to 16 million Australian mobile users to download and use this app. DoH have announced that they will be using a major U.S. based public cloud provider to host the CovidSafe data, but claim that the data will always be under Australian Government control.
You are to provide a report to DoH that:
1. Discusses the possible threats and risks to the security of user data on mobile phones, and in linked Cloud and financial accounts from the use of the CovidSafe app.
2. Discusses the possible threats to the privacy of a user's data, location and activities from the use of the CovidSafe app.
3. Discusses the issues of data sovereignty that may apply to the storage of CovidSafe data in U.S. based Cloud storage.
4. You are to recommend that DoH adopt:
a. Possible security controls that would prevent the loss or breach of user data, while still enabling effective tracking for COVID-19, and the reasons these controls will be effective.
b. Possible privacy controls to protect user privacy, particularly of data, location and activity, while still enabling effective tracking of COVID-19, and the reasons these controls will be effective.

c. Possible controls to ensure that the CovidSafe data remains under Australian data sovereignty and control, and the reasons these controls will be effective.

Presentation
Your report should use the following heading structure:
• Data and security risks
• Privacy, location and activity issues
• Data sovereignty issues
• Recommendations:
o Security controls
o Privacy controls
o Data sovereignty controls
Your report should be about 3,000 to 4,000 words.
Referencing is required in APA 7th ed. Format.

Attachment:- Privacy and Data Sovereignty strategy.rar

Reference no: EM132599648

Questions Cloud

What is Delaney income tax payable : Delaney also had expenses of $100,000 for both book and tax purposes. If Delaney has a 35% tax rate, what is Delaney's income tax payable for 2008
What are the proceeds from the bond issue : The bonds pay interest semiannually on June 30 and December 31. The bonds are issued to yield 5%. What are the proceeds from the bond issue
Significant threat to us interests in the decade ahead : What is the most significant threat to US interests in the decade ahead? How would you tailor US foreign policy to deal with this issue effectively?
Describe challenges of global virtual projects : Topic : CHALLENGES OF GLOBAL VIRTUAL PROJECTS. It should be at least 10 pages; have at least 5 APA citations and reference; Abstract /introduction.
Privacy and data sovereignty strategy assessment : Security, Privacy and Data Sovereignty strategy Assessment - Discusses the possible threats and risks to the security of user data on mobile phones
Find why do accountants use the accrual-basis method : Find Why do accountants use the accrual-basis method instead of the cash basis method of accounting? What are some of the benefits of using accrual accounting?
Air and space power theorists : To what extent, if at all, can the geopolitical theories of Mahan, Mackinder, and Air and Space power theorists,
Find the slope of the line joining the points : Office equipment was purchased for $20,000 and is assumed to have a scrap value of $2,000 after 10 years. Find the slope of the line joining the points
How effective is the visualization and why : Use the internet to research and find one example of a data visualization each for categorical data, time-series data, and spatial data.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd