Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Write review on this article with reference in APA format.

Privacy policy is a statement that declares a party's policy on how it collects, stores, and releases personal information it collects. It informs the client what specific information collected and whether it is kept confidential, shared with partners, or sold to other firms or organizations.

The exact contents of a certain privacy policy will depend upon the applicable law and may need to address requirements across geographical boundaries and legal jurisdicitons ( Halboob & al, 2015).

Therefore, privacy policy controls and counter measures must use to comply with laws and regulations. For instance, Acceptable use policy (AUP) is used to mitigate risk between the organization and its employees. According to Anderson, the Chinese Wall model is used by the intelligence community to describe the proposed mechanism to avoid any conflict of interest and the BMA model is to show the information flows approved by the medical ethic (2010). The Chinese Wall model offers a mix of free choice and allow the concept of separation of duty.

For example, a person can patch a system for any vulnerability but he/she can test the system, but someone else will test the system to see if he/she broke any functionality when the system was patched.

I think It will be a good idea to combine the Chinese Wall model and BMA because both are striving to reach a common goal which is protecting data integrity and ethics.

The evolving of the software and technology prices, differential pricing is economically efficient but increasingly resented. Therefore, the system operator is the one who is controlling the information and desiminate the information when needed. On the other hand, the stakeholder is the one who make sure that the system is efficiently secure and the data is flowing in an ecrypted way without any compromise.

George Loewnstein, points out that people are more sensitive if things suddenly got worse, but not if they get worse gradually (Anderson, 2008). "Whatever you do, work heartily, as for the Lord and not for men." Colossians 3:23. Everything we do has to be done with integrity and willingly.

References

Halboob, Waleed, Ramlan Mahmod, Nur Izura Udzir, and Mohd Taufik Abdullah. 2015. Privacy policies for computer forensics. Computer Fraud & Security 2015 (8): 9-13. Anderson, R.J. (2008).

Security Engineering: A Guide to Building Dependable Distributed Systems. Hoboken, NJ: Wiley. ISBN: 9780470068526. BT

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92816262
  • Price:- $10

Priced at Now at $10, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Access your browsers security settings and configure the

Access your browser's security settings and configure the browser to refuse all cookies or to prompt you before allowing a cookie. Restart the browser; then visit several different Web sites. Be sure to visit popular sit ...

What are information silos what are the problems caused by

What are information silos? What are the problems caused by information silos? How organizations can solve the problems caused by information silos?

What is the difference between dekkers algorithm and igloo

What is the difference between Dekkers Algorithm and Igloo approach? Please provide examples that can explain this.

In thenbspworkspaceproject-lognbspdirectory create file

In the ~/workspace/project-log directory, create file named  changelog.txt  with the following content and format: Changelog Version: 1.0 Redirect the output of the ls command to a file named  file-list.txt  in the ~/wor ...

You are putting together a trip to kamino to pick up clones

You are putting together a trip to Kamino to pick up clones and need to take a group of droids along to help. You have 11 droids from which to select, and decide to take 4. How many different groups of droids could you t ...

On a multiple choice test there are 8 questions worth 125

On a multiple choice test, there are 8 questions worth 12.5 points each. There are four choices for each question (a,b,c,d). Robin has not studied for the quiz and decides to randomly guess on all of the questions. 1. Th ...

Question suppose you are constructing a 3-bit counter using

Question : Suppose you are constructing a 3-bit counter using three D flip-flops and some selection of gates. The inputs to the system are Reset (sets every output to zero) and Inc (a signal to increment the counter). Th ...

Question suppose alice bob and carol want to use secret key

Question : Suppose alice, bob and carol want to use secret key technology to authenticate each other. If they all use the same key, K, then bob would impersonate carol to alice. suppose instead that each had their own se ...

A random sample ofnbsp87nbspeighth gradenbspstudents scores

A random sample of 87 eighth grade? students' scores on a national mathematics assessment test has a mean score of 279. This test result prompts a state school administrator to declare that the mean score for the? state' ...

Question suppose a process ie parent forks a child process

Question : Suppose a process (i.e., parent) forks a child process using resource sharing such that the parent and child share all resources. Does this include the Process Control Block and memory space or does the child ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As