{br} STUCK with your assignment? {br} When is it due? {br} Get FREE assistance. Page Title: {title}{br} Page URL: {url}
UK: +44 748 007-0908, USA: +1 917 810-5386 [email protected]
    1. QUESTION

    Details:
    Modern communication is data driven via social media and other methods and raises questions of who owns the data and how to mitigate the risk associated with data management and security. Add to that management and security of intellectual property, and the situation becomes quite complex. The complexity of the situation deepens as large companies must also manage issues of privacy and security juxtaposed against concerns for national security including the rights of government to access data and personal information. In this assignment, you will address some of the concerns and legalities associated with data management.

    General Requirements:

    Use the following information to ensure successful completion of the assignment:

    This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
    Doctoral learners are required to use APA style for their writing assignments. The APA Style Guide is located in the Student Success Center.
    This assignment requires that at least two additional scholarly research sources related to this topic, and at least one in-text citation from each source be included.
    You are required to submit this assignment to Turnitin. Refer to the directions in the Student Success Center.
    Directions:

    Write a paper (1,000-1,250 words) in which you address some of the concerns and legalities associated with data management. Include the following in your paper:

    A discussion of the risks associated with data management and security. What are the risks? How can they best be mitigated?
    A discussion of personal privacy and security as juxtaposed against the right of government to access data and personal information. How should business leaders manage this contrast?
    A discussion of when to engage legal counsel with regard to issues of data management and security and the right of government to access data.

    Details

    Details:

    Modern communication is data driven via social media and other methods and raises questions of who owns the data and how to mitigate the risk associated with data management and security. Add to that management and security of intellectual property, and the situation becomes quite complex. The complexity of the situation deepens as large companies must also manage issues of privacy and security juxtaposed against concerns for national security including the rights of government to access data and personal information. In this assignment, you will address some of the concerns and legalities associated with data management.

    General Requirements:

    Use the following information to ensure successful completion of the assignment:

    • This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
    • Learners are required to use APA style for their writing assignments. The APA Style Guide is located in the Student Success Center.
    • This assignment requires that at least five additional scholarly research sources related to this topic, and at least three in-text citation from each source be included.
    • You are required to submit this assignment to Turnitin. Refer to the directions in the Student Success Center.

    Directions:

    Write a paper (1,000-1,250 words) in which you address some of the concerns and legalities associated with data management. Include the following in your paper:

    1. A discussion of the risks associated with data management and security. What are the risks? How can they best be mitigated?
    2. A discussion of personal privacy and security as juxtaposed against the right of government to access data and personal information. How should business leaders manage this contrast?
    3. A discussion of when to engage legal counsel with regard to issues of data management and security and the right of government to access data.

     

    Note to writter

     

     Remember,  you are writing scholarly work. Even a short paper such as this should have no less than 10 authoritative sources, to demonstrate that you have thoroughly informed yourself on the subject you are presenting. You can’t just rely on the textbook alone. Please use the Rubric and follow instructions to submit quality work

 

Subject Communication Pages 7 Style APA

Answer

Risks Associated with Data Management and Security

In this age of globalization, there are huge piles of data that accrue as a result of communication. Modern communication, through media such as; Email, Facebook, WhatsApp, Twitter, Snapchat, and Messenger among other methods, are basically data driven. Managing this huge pool of data and mitigating privacy concerns as well as intellectual property issues may be difficult. There are many risks associated with data management and security. Corporations (especially social media operators) should be at the forefront in ensuring that data is tamperproof.  This paper is a discussion of the risks associated with data management and security and how these can be mitigated, as well as personal privacy security concerns as juxtaposed with the rights of governments to access data and personal information.

Risks Associated with Data Management and Security

Risks associated with data management and security usually come up in three main levels. The first level is during transit (Wheeler, 2011). When data is being transmitted electronically between one system to another, there is the threat of hacking or the data being erroneously sent to a wrong system (Wheeler, 2011). Security risk also occurs when the data is ‘in process’ (Wheeler, 2011). Data is ‘in process’ when it is being used by the system or application (Wheeler, 2011).

On every stage that the data is in as eluded to above, there are many threats that it comes across. One of the threats is “unauthorized disclosure such as data breach” (Wheeler, 2011, p. 16). Another risk is corruption; which is “an accidental modification of data record” (Wheeler, 2011, p. 16). Denial of service is also a prominent risk and involves an attack that renders the resource unavailable (Wheeler, 2011). The resource becomes unavailable when it is needed by a legitimate user. “Inability to prove the source of an attack” is also a risk associated with data management and this occurs when a legitimate account such as a website is being shared by another party for the purpose of engaging in unauthorized activity (Wheeler, 2011, p. 16).

Mitigating the Risks

The risks can be mitigated, for instance, by ensuring that there are separate web and database servers (Protiviti Inc., 2017. Database servers should be isolated (especially the ones that contain sensitive information) and should be placed in a separate network segment from the web and other internet accessible servers (Protiviti Inc., 2017. The risks associated with data management can also be alleviated by disabling and securing unnecessary network services (Protiviti Inc., 2017. 

Personal Privacy and Security versus the Right of Government to Access Data

Many service providers and communication and technology companies are keen on securing personal information and ensuring personal privacy in the communication sphere. That is why a Facebook users, for instances have to input a password before accessing the account. Similarly that is why WhatsApp provides end-to-end encryption which secures personal data between the parties communicating. Because of such tight security placed around personal data and information, it has become difficult for the government through the security agencies to access information that will allow the government to perform its function as a protector of the fundamental rights of the citizens. The government has the right to access data and personal information given the fact that with the advancement in technology, criminal as well as terrorist threats now have an international facet. Terrorist activities, for instance, are committed even without the need to cross the physical geographic borders. Because of globalization and technology, there is a lot of inter-connectedness in the realm of organized crime. The government has, therefore, had to adopt programs to combat this threat to national security. A conflict of interests, however, occurs when these programs are typically designed in such a way that they would lead to the infringement of personal security and privacy of the subscribers.

Governments are continually requiring key social media operators to fashion private data with respect to their subscribers. The question that often arises is; is privacy more important than national security? It would be very ironical and absurd if the right to privacy was upheld at the expense of the vulnerability of national security. Technology is meant to make life better and as such, if the government will secure our borders better by using some information provided by social media operators, then that option must be explored. Business leaders owe a duty to their nation, thus they ought to strive to have a careful balance between personal privacy and security on one hand and the right of government to access data and personal information.

Facebook, for instance, introduced Transparency Reports which was previously referred to as Government Requests Report (Sonderby, 2018). Through this platform, Facebook has been giving raw figures on data on governance issues (Sonderby, 2018). This program is also expanding to provide data regarding “reports from right holders concerning intellectual property” (Sonderby, 2018, p. 1). Though Facebook is limited with respect to the amount of information that can be shared, companies can still, for instance, share raw data in fulfillment of their Corporate Social Responsibility (CSR). 

When to Engage Legal Counsel with Regard to Issues of Data Management

In the corporate world, the directors of corporations are the ones who bear the duty of overseeing all matters appertaining to risk management (Sangster, Alameda, & Mack, 2016). This duty extends to recognizing and minimizing the corporations’ exposure to cyber-attacks (Sangster, Alameda, & Mack, 2016). Effective data management may be a problem, for instance, when former employees who had passwords to the company’s data systems use those passwords to acquire private data about the company or the employees for one reason or another. With the passing of time, the people who orchestrate such attacks are becoming more sophisticated and organized and such attacks have the potential of affecting a “company’s competitive positioning, stock price, good will and shareholder” (Sangster, Alameda, & Mack, 2016, pg. 1). It is, therefore, important for the company to know when to engage legal counsel with respect to issues of data management.

Legal counsel should be engaged from the start and not just when mitigating measures need to be taken. For instance, as aforementioned, it is important for the board to formulate and implement the company’s culture with respect to cyber security and protection of data (Sangster, Alameda, & Mack, 2016). Therefore, an in-house counsel can help the board of directors to clamor for a specified board member to be in charge of cyber security and data management (Sangster, Alameda, & Mack, 2016). The board member will then work closely with the undersigned employees in that regard.

Legal counsel can also educate the corporation regarding the preeminent vulnerabilities. This will enable the company to be more aware of the specific areas where more risk lies. An in-house counsel can educate the board regarding the company’s vulnerabilities by, for instance, showing the company what they have that others may want so that the board can know the information that is most vulnerable so as to effectively manage the data.

References

Protiviti Inc. (2017). Risks Associated with Data Integrity and Management Best Practices. KnowledgeLeader Blog. Retrieved from

http://info.knowledgeleader.com/bid/161682/Risks-Associated-with-Data-Integrity-and-Management-Best-Practices

Sonderby, C. (2018). Reinforcing Our Commitment to Transparency. Facebook Newsroom. Retrieved from

https://newsroom.fb.com/news/2017/12/reinforcing-our-commitment-to-transparency/amp/

Wheeler, E. (2011). Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. Elsevier.

 

 

Related Samples

WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, how can I help?