This website uses cookies to ensure you have the best experience. Learn more

An Evaluation Of Security Acts And Models

1936 words - 8 pages

Information security acts have been established with the intent to protect the rights of all citizens. Specifically to enhance privacy and confidentiality, models have been developed to aid organizations in securing citizens’ private information to attain assurance and security of their information. Legislation must be continuously updated to adapt to the growing use of technology and its effects of storing and using personal information. Public and private sector organizations must abide by government-mandated legislation regarding information security and risk management.
Guiding Principles
Several statues have been enacted in order to uphold the fundamental rights to the privacy of an individual’s information. In particular, these laws pertain to what it is known as personally identifiable information (PII). PII should always be protected via means of encryption and additional security measures not only when it is being transmitted across the internet, but also when it is being stored locally on a server. Many of these security and risk oriented rulings mandate the requirements of securing individuals’ personal information. Some of the acts and models even go as far as to designate how an organization must respond to and notify instances of persona data breaches. The aforementioned area is one that, especially in the midst of ever more prevalent and expansive impact of recent breaches, this author opines is so pertinent to addressing because the risks to an individual’s right to privacy cannot be understated. Jones (2007) exceptionally states the significance of these guiding principles:
Organisations need to deal with (treat) the management of information security risks in a manner that gives confidence to all parties that are involved. Risk management processes should be able to be modelled, be repeatable and provide an auditable trail that is of a level suitable to satisfy the regulatory requirements. The audit trail has two main uses — satisfying the legal and regulatory requirements for traceability, and allowing for the review of the decisions that have been made so that modelling can be undertaken to determine the optimal set of risk treatment measures to meet the needs of the organisation. (p. 36)
To ensure that the security of citizens’ private information is effectively protected, information risk legislation and models have been ordained in order to mitigate cyber threats and security risks.
Effectiveness of Legislation
The various acts that have been sanctioned often focus on addressing how the PII of individuals should be handled and what security measures should be implemented to ensure the safekeeping of such private data. Some of the most well-known, not to mention the expansive impact, of such legislation includes the Federal Information Security Management Act (FISMA), the Gramm-Leach-Bliley Act (GLBA), the Health Insurance Portability and Accountability Act (HIPAA), and the Sarbanes-Oxley Act (SOX). In...

Find Another Essay On An Evaluation of Security Acts and Models

Evaluation of Two Models Of Memory

2161 words - 9 pages Evaluation of Two Models Of Memory In this essay 2 models of memory will be described and compared. They are the Atkinson and Sniffrin model of memory, the Multistore model, and Crain and Lockhart model, the Levels of Processing Model. Models of memory are primitive diagrams of human memory to help understand the flow of information and how it is stored. In order to evaluate those 2 models appropriately it is important

An Evaluation of Composting, Incineration, and Recycling

2306 words - 9 pages two processes require education and equipment. Secondly, composting method will give profit directly to that person who composted. When an individual makes composting in the yard, waste will affect the yard as fertiliser, so, the person save money, as he/she does not need to buy fertilizers. In contrast, person who puts waste in recycling or combusting bins, may or may not obtain the profit from those processes. The owner of recycling or

An evaluation of "Micmac Customs and Traditions"

1415 words - 6 pages ) followed by an extensive description of a complex board game, named "wŏltĕstômkwŏn", played by the Micmac (Hager 1895:31-35). Following this is a description of the Micmac's version of football named "tooâdijik" (what we now refer to as soccer)(Hager 1895:35-36). Hager then goes on to describe the serpent dance, named "choogichoo yajik", which is then related to similar practices and beliefs held by other native groups of

Evaluation of an Advertisement

1065 words - 4 pages Evaluation of an Advertisement Advertising is to persuade people to buy their product or in this case encouraging people to send money to help its charity. However to persuade people isn't that easy, you have to use the correct wording, and things such as power of three, alliteration in order to persuade that customer/person. In this advertisement many of these things are used. They really make you want to send a

Give an explanation of the differences between effects models of audience behaviour and uses and gratifications models

1638 words - 7 pages The relationship between the media and its audiences is one that is ever changing. The media cannot survive without an audience, and thus must constantly strive to provide what the audience seeks, and we as an audience rely on the media as a source of entertainment, knowledge, and an escape from reality. The media can be explained through the use of various model, two of which are the uses and gratifications model, and the effects model. A brief

An Evaluation of Body Image and Self-esteem

1361 words - 5 pages weight evaluation. Although African Americans girls are dissatisfied with their bodies, it does note conducts them to assess their overall appearance. (Dalton et al. 2011) The increase of eating pathology is partially due to the mass media. The unrealistic thin images of models in the media in comparison to female's actual self-image. The exposure to images of slender models could lead to restrained diet, and several other risk factors. According to

An Evaluation and Analysis of the Marriage Dance Program

1436 words - 6 pages Introduction In this paper, a further evaluation and analysis will be conducted on the Marriage Dance (MD) group work conducted by Fei Yue Family Service Centre (FYFSC). Suggested improvements to some aspects of the practice are also mentioned. MD was introduced by FYFSC as a response to the service gap in marriage enhancement for the non-religious. The use of group work as an intervention technique is an alternative method for empowerment as

An Evaluation of Body Image and Self-esteem

1206 words - 5 pages Procedures The random sample of females that is selected will be conducting an investigation on the correlation between body image and self-esteem. A consent form will be given to the participants. The participants will be told the procedures vaguely. They will be told that they will be debriefed in the end. Any question will also be answered at the beginning of the experiment. The participants will be studied in the same environment. They will

An operating system is a program that acts an intermediary betweena user of a computer and the computer hardware

663 words - 3 pages complete operating systembut not an operating environment. The advantages of Windows NT, thecapability of working with multiple CPUs using symmetric multiprocessing,preemptive multitasking and multithreading, it can support of most majornetworking communications protocols, and Windows NT also include theuser and account system security. The disadvantages of the Windows NTare it requires more disk space, memory, and the faster processors justfor the

Three Models of Change: An Outline

687 words - 3 pages Explain the three models of change According to the Greek philosopher Heraclitus, “change is the only constant. “ Whether an organization is large or small, the common thread is intimidation, or having an uneasy feeling about the challenge(s) that change can bring. Below are three models of change: Kotter Model John Kotter introduced the Kotter model of change in 1995 in his book “Leading Change” with an eight -step program building on each

An Evaluation of Ryan Air

4283 words - 17 pages scratch. This is distinguished from growth by acquisition or merger, which involves an outside firm. The method of organic growth seems to be the most suited method of implementation for the options stated above. The benefits of this method are:-Cost Spread-Choice of Location-Latest Technology-No Inappropriate Cultural HistoryTask B-Evaluation of Strategic ProposalsFigure 8: A Framework for the Evaluation and Selection of StrategiesSource: ARU

Similar Essays

An Evaluation Of Information Security And Risk Management Theories

2183 words - 9 pages An abundance of information security and risk management theories are prevalent; however, it can be difficult to identify valid and applicable theories. In the reading to follow, several information security and risk management theories are evaluated. These theories are presented and employed via various frameworks, models, and best practice guidelines. An assessment of sufficient research pertaining to these theories is addressed, along with

The Importance Of Program Evaluation And Three Evaluation Models

1779 words - 7 pages and applicable for today’s global market. This paper will discuss the importance of program evaluation and three evaluation models, Tyler’s Goal Attainment Model, Stufflebeam’s CIPP Model and Scriven’s Goal Free Model. CURRICULUM EVALUATION Curriculum evaluation is an important aspect of any national education system. It provides the basis for curriculum policy decisions, feedback on continuous curriculum adjustments and processes of

Information Security: Security Acts And Effectiveness

2438 words - 10 pages rely and have increasingly become reliant on technology to conduct business operations (Herath, Herath, & Bremser, 2010). Consequently, security measures are necessary to protect organizational information from both inside and outside entities of an organization. The protection and security of organizational information is under constant threat and mitigation measures are necessary to ensure information is protected from unauthorized users

Rational Models And Self Evaluation Essay

919 words - 4 pages : John Wiley & Sons. 2002), meant using the same criteria applied to Alternative 2; assisting the client toward getting the system operational and still comply with company requirements. The seven criteria yielded 6x1= 6 –1 (-1 for not complying with my supervisors decision) resulting in in an optimal decision net result of +5. EVALUATION During the self evaluation in connection with this incident, I revealed to my supervisor several problems