Sign In
Not register? Register Now!
Pages:
4 pages/β‰ˆ1100 words
Sources:
Check Instructions
Style:
APA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 24.3
Topic:

Policies, Plans, and Risks

Essay Instructions:

Justin wants to move forward with developing privacy policies to ensure videos are not distributed or uploaded to the net without the consent of the people in them. This opens a much larger conversation: Devil’s Canyon is also in need of a complete security plan, as well as risk assessments.
In a 4- to 5-page paper, explain and prepare the following information to present to the Devil’s Canyon team:
: Explain the relationship between policies and security plans. Identify potential policy needs, noting.
Justin’s privacy policy, in relation to the Devil’s Canyon enterprise structure.
: Outline the importance of a security plan in relation to security roles and safeguards.
: Analyze at least 5 security-related risks/threats that Devil’s Canyon may face.
: Assess the probability and impact to the Devil’s Canyon if each risk occurs. Based on these two factors, determine the overall risk level. For purposes of this assignment, evaluate and categorize each factor as low, medium, or high, and create a table to illustrate the risks. For example, a risk/threat with a low likelihood of occurrence and a high impact would represent an overall medium risk.
: Consider digital elements mentioned in the designing of the enterprise architecture, such as software, hardware, proposed security measures, smart lift tickets, webcam systems, and

Essay Sample Content Preview:

Policies, Plans, and Risks
Name:
Institution:
Course code:
Date:
Policies, Plans, and Risks
A privacy policy is needed in instances where information sharing is taking place. A form of regulation is needed regardless of the number of participants and the influence of the system involved. Therefore, it is a written and published statement that lays out how organizations handle personally identifiable information. It covers the process of information collection, analysis, maintenance, access, and dissemination. Consequently, the policy ensures there is a requirement for an organization to adhere to legal requirements while protecting personal interests. This essay analyzes privacy policies, their roles, and potential risks that an organization may face.
As stated, a privacy policy is tasked with identifying laws that will help safeguard a team's security. On the other hand, security plans refer to the actions and measures to ensure the policy is implemented. The first order of business is to identify the sensitive information and databases that require restricted access or any form of distribution CITATION USD06 \l 1033 (Justice, 2006). In this case, Justin has identified the shortcomings with videos being uploaded on the internet. His policy intends to regulate video distribution by ensuring that people in the video give their consent beforehand. According to PIPEDA, consent is a means of self-preservation where individuals can protect their private information by exercising their control over the information. Their control can over how information is collected, how it will be used, and whom or where it can be disclosed. To breach this clause, individuals can give consent or get compensation to relinquish control over the information. Therefore, when information is distributed without personal consent, there are grounds for legal action against the offender.
The magnitude of information circulating in an organization will demand the people involved to develop a strategy that confines everything into the 'walls' of an organization. Small information systems can get away with little to no strategic action; however, a large institution has to implement measures to protect its information. An information strategy is essential in placing an organization in a position of power to mitigate information access. It also places measures that allow an organization to avoid any form of information from risk-related individuals CITATION Bri151 \l 1033 (Evans, 2015). A security plan is important in maintaining the confidentiality of the people involved with the information. This is essential, especially if an organization seeks to garner the trust and loyalty of the people involved with the information. By safeguarding confidentiality, the organization can control the narrative, which will maintain the integrity of the confidants. Lastly, a plan will ensure that an organization is updated on the laws and regulations of the industry to avoid lawsuits. By complying with the standards, an organization avoids security incidents that may damage the business's reputation, customers, partners, and shareholders.
Technology has been a revelation and a huge part of modern society. It has allowed individuals to access, distribute and ...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Essay Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!