StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Data Protection Issues - Report Example

Cite this document
Summary
This report "Data Protection Issues" discusses threats relating to cloud computing that is falling under external threat whereas the other threats will be falling under internal threats. Cloud computing involves data stored in different jurisdictions…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.4% of users find it useful
Data Protection Issues
Read Text Preview

Extract of sample "Data Protection Issues"

Windrush ventures should see whether the cloud vendor has implemented necessary security initiatives and whether it is adhering to the provisions of the Data Protection Act. Risk Assessment:   Severity Score (out of 10): 9             Likelihood Score (out of 10):  6 Risk Index (Severity x Likelihood):  54 Safeguarding Strategy: Detection: There always exists the threat of the breach of data. Windrush ventures should have an adequate risk identification process so that it can minimize revenue losses, loss in productivity and time and the negative impact on customers can be minimized.

For deduction of risk, Windrush Ventures may use fault tree analysis, which is a well-known risk analysis method to recognize risk scenarios in a reference process model for logistics. Avoidance: Windrush should also look into the data encryption facility offered by Oracle as a safeguarding strategy for its valuable data stored with them. Protection: Windrush Ventures should assess how far Oracle SQL Server offers data security solutions and how Oracle supports their platform, what are all the data protection elements are available and how the Oracle comprehends best practice.

Recovery: Windrush should use Oracle “ Data Recovery Advisor “ for recovering the corrupted data, if any, that may happen in the near future.  

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Security Coursework Example | Topics and Well Written Essays - 2750 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1628798-information-security
(Information Security Coursework Example | Topics and Well Written Essays - 2750 Words)
https://studentshare.org/information-technology/1628798-information-security.
“Information Security Coursework Example | Topics and Well Written Essays - 2750 Words”, n.d. https://studentshare.org/information-technology/1628798-information-security.
  • Cited: 0 times

CHECK THESE SAMPLES OF Data Protection Issues

Setting Up a New Social Networking Site

The situation observed is that you have been hired by a group of first-time entrepreneurs who intend to set up a new social networking site.... They have asked you to answer some key questions, and they plan to use the answers to help them begin serious planning of their social networking site.... hellip; The key questions are: Who should we be targeting as potential users of our new social networking site?...
6 Pages (1500 words) Assignment

Comparative Article Report: Uses, Benefits and Risks of RFID Technology

Thus, RFID is a means of collecting, storing and retrieving data through electromagnetic radio transmission from and to a radio-frequency compatible integrated circuit.... The reader and the tags use a defined radio frequency and protocol to transmit and receive data.... The RFID readers, also known as the transceiver, can send query to and receive data reflected or transmitted from the tags, depending on the tag type, on objects (Lionel et al, 2004, p....
14 Pages (3500 words) Essay

Data Protection Act

The paper "data protection Act " presents that DPA is an act that provides the legal foundation for dealing with and managing information pertinent to living people.... hellip; Whereas this translates to the fact that the court considered a constricted approach to the conditions of data protection, it also took a considerably extensive approach to the FoI ones.... The data protection Act is considered an immense Act that has a status for difficulty....
5 Pages (1250 words) Essay

Advice for Handling Potential Breaches of the Data Protection Act

Though her immediate supervision has assured her that this is not a… nor a breach of ethical compliance standards, she is concerned about the activity and is considering reporting INF to the data protection Commissioner.... Joan, a hypothetical employee of INF Ltd.... has discovered that information is being collected about various corporate officers and public officials who are employed by different publicly listed companies....
7 Pages (1750 words) Essay

Ethical Approval for Post-Graduates

Any difference or conflict between the patients experience and nurses assessment of the pain will be (For example, outline of research methodology, what information/data collection strategies will you use, where will you recruit participants and what approach you intend to take to the analysis of information / data generated) data will be collected through a face-to-face semi-structured interview of nurses and patients.... This is only fitting considering that Hancock (1998) relates that data collection in a qualitative research involves direct encounters with individuals through one to one interviews....
12 Pages (3000 words) Essay

Data Protection Act

The researcher of this essay aims to analyze the "data protection Act" (DPA) of 1998, activities controlled by it, complying with DPA, the role of Commission Officer, and the Impact of the UK data protection Act on Organizations.... There are three major aspects of the data protection Act (DPA).... he DPA affects the activities of data controllers, as it regulates the manner in which they process the personal data of an individual....
10 Pages (2500 words) Essay

What is the Computer Misuse Act

This paper "What is the Computer Misuse Act" discusses the main legislative provisions dealing with computer misuse is the Computer Misuse Act 1990, which was drafted without the foresight of the practical implications of Internet growth.... The Act covered two types of computer-related offenses....
7 Pages (1750 words) Assignment

Critically Assessing the Statement - Private Life Should Mean What It Says

The paper "Critically Assessing the Statement - Private Life Should Mean What It Says" highlights that dismissal of an employee may still be unfair even if the activities are deemed related to the nature of work, especially if the employee assists in minimizing “any risk of adverse publicity”....
20 Pages (5000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us