Information governance.

  

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Research Paper Sentence Outline

Runningheader: Online policies to see how the financial companies manages privacy issues.

7

Rajesh Chamallamudi

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Spring 2020 – Information Governance (ITS-833-10) – Second Bi-term

Assignment: Sentence outline of online policies to see how the financial companies manage privacy issues.

Due date: 03/22/2020

University of the Cumberlands

ABSTRACT

As many technology tools are available to collect data and analysis from the internet we need to protect the data and secure customer’s data from hackers. To protect the data from hackers my research paper deals with how to create policies to protect the data.

INTRODUCTION

As being a financial company our major goal is to protect the data from hackers and not to disclose any sensitive data to unauthorized personals or third party vendors. Day by day as technology is growing cyber-crime also increases rapidly among through internet and from website cookies. As I am researching data policy my major goal is to design a policy to manage privacy issues.

LITERATURE REVIEW

(Aleecia M et al.,) understood from research paper how they deal with data privacy techniques and workarounds to mitigate the data leakages from internal or external resources from financial origination. (Pollach Irene, 2007) understood how do we create trust with customers on data protection policies and Identified weaknesses in privacy policies.

RESEARCH METHOD

Per the above research papers and articles and research methods, I have arrived on policy-making aspects In terms of avoiding data leakages. (Julia B. Earp,2005)

· Content analysis: content analysis is a theoretical approach for making valid inferences from text-based data.

· Developing a survey instrument to measure users: This topic deals with a web-based survey like measurement items, pilot testing and survey distribution.

· Survey results.

· Exploratory factor analysis.

· Confirmatory factor analysis.

Based on the above parameter analysis will come to get a conclusion on the good measure for the research question about whether the privacy policy statements provide the information that customers want to understand.

RESULTS

Based on the above research results, it helped a lot to choose the right information technology tool to protect the data from third-party vendors and data hackers. In our organization we did implement a (secure sockets layer) and PCI DSS techniques.

DISCUSSION

I found from the best particle and suggestions that information practice principles determine below 5 principles, (Julia B. Earp,2005).

1. Access/participation,

2. Choice/consent,

3. Enforcement/Redress

4. Integrity/security

5. Notice/Awareness.

SSL/PC DSS software tools that provide data privacy on customer’s data through an online website and provide inbound and outbound securities.

CONCLUSION

I conclude with my research we as a financial company provided 100 % data protection by following the survey techniques and pally the software policy techniques (SSL, PC DSS, EXABEAM and GLBA) in terms of firewall mechanisms avoid from hackers. In the coming future our projects are planning to implement the same techniques as well.

My current research paper contained a sentence outline of each section and in future weeks will develop sentence outlines based on statements that are under each section.

REFERENCE

Aleecia M. McDonald,1 Robert W. Reeder,2 Patrick Gage Kelley, 1 Lorrie Faith Cranor1 1 Carnegie Mellon, Pittsburgh, PA 2 Microsoft, Redmond, WA “A Comparative Study of Online Privacy Policies and Formats” .

Pollach, Irene. (2007). What’s wrong with online privacy policies?. Commun. ACM. 50. 103-108. 10.1145/1284621.1284627.

Julia B. Earp, Member, IEEE, Annie I. Antón, Senior Member, IEEE, Lynda Aiman-Smith, and William H. Stufflebeam. Examining Internet Privacy Policies Within the Context of User Privacy Values IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 52, NO. 2, MAY 2005.

University of the Cumberlands

School of Computing and Information Sciences

Certification of Authorship

Submitted to (Professor’s Name): Dr. Mary Cecil

Course: __ITS 833_Information Governance

Student’s Name: _Rajesh Chamallamudi

Date of Submission: 03/22/2020

Purpose and Title of Submission: Sentence outline of online policies to see how the financial companies manage privacy issues

Certification of Authorship: I hereby certify that I am the author of this document and that any

assistance I received in its preparation is fully acknowledged and disclosed in the document. I

have also cited all sources from which I obtained data, ideas, or words that are copied directly or

paraphrased in the document. Sources are properly credited according to accepted standards for

professional publications. I also certify that this paper was prepared by (me or by my group #)

for this purpose.

Students’ Signature: ___Rajesh Chamallamudi Date : 03/22/2020

Grammarly result screenshot:

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.

Order your essay today and save 30% with the discount code ESSAYHELP