Tasks
After the successful engagement of your team to develop privacy and personal data protection strategies for the charity, the team has now been engaged to develop a Personally Identifiable Information (PII) privacy and personal data protection strategy for the charity.
Team Setup
This assignment is the last of the team assignments for this subject. The rationale for using a team approach is that most IT policy formulations are normally conducted by teams of between 2-5 Architects, Information Security experts, Operations and Business leaders for each problem. You are already assigned to a team and the team, as a whole, will be responsible for the development of the policies.
Team Member Responsibilities
Each team member will be assessed on:
- The final privacy and personal data protection strategies presented by the team;
- The individual contributions that they have made to the policy formulation. This will be shown by the entries that they have made in the Team forum;
Team members should note that:
- A total of 20% of the total marks for this assignment are for individual contributions. These include:
- Contributions to the development of privacy and data protection policies (10%), and
- Reasoning behind the development of privacy and data protection policies (10%)
- A team member without any individual contributions in the Team Forum will be regarded as having not contributed to the risk assessment. This will result in either reduced marks or no marks being awarded to that team member for this assignment.
The task:
Your team is to:
- Develop a Threat and Risk Assessment (TRA) for PII data for the MySupport portal. This TRA should consider both the privacy and data protection aspects of PII data in the portal. (10 marks)
- Develop a PII strategy proposal for the MySupport portal. The strategy should consider the threats and risks to both Privacy and data protection for the PII data collected in the MySupport portal as well as possible controls to mitigate the identified risks. (20 marks)
- Develop a strategy to protect the informal Digital Identity that a user may create in the MySupport portal. You should consider both the privacy and data protection aspects for a digital identity as well as possible controls to mitigate the identified risks. (20 marks)
- Develop an outline plan for the Governance of:
- PII data and digital identities for users of the MyLicence portal.
- Personal data and PII data for DAS users of the HR Personnel Management suite.
- PII data and financial data for users and DAS staff in the COTS payroll suite. (20 marks)
- Create a PowerPoint slide deck that gives a comprehensive overview of the above tasks. This slide deck is not to exceed 30 slides. (10 marks)
Presentation
The team is to submit the following documents to complete this assessment:
- A PowerPoint presentation that gives a comprehensive overview of the four (4) tasks.
- The presentation should be a maximum of 30 slides, including introduction, conclusions and recommendations.
- Each slide should have speaking notes in the Notes section which expand on the information in the slide.
- The slides should give refer to the additional information contained in the appendices.
- Images and quotations used in slides must be referenced on that slide.
- The slide deck does not require a reference list.
- The TRA is to be attached in a separate Word document marked as Appendix A. The TRA can be presented in tabular format or similar.
- The PII strategy is to be attached in a separate Word document marked as Appendix B. This document should be fully referenced in APA 6th edition format, and should not exceed 5 pages.
- The Digital Identity is to be attached in a separate Word document marked as Appendix C. This document should be fully referenced in APA 6th edition format, and should not exceed 5 pages.
- The Governance plan is to be attached in a separate Word document marked as Appendix D. This document should be fully referenced in APA 6th edition format, and should not exceed 10 pages.
- A copy of the discussions in the team Wiki or forum should be exported into a single Word document marked as Appendix E.
All parts of the submission are to be loaded into the Team File Exchange Area in Interact.
Each student is required to submit the following through EASTS when their group assignment is complete. This submission should contain the following:
- Student name
- Team name
- Assignment number
- Assignment file name
- Copy of the student's answer to the question allocated to them by the team.
This will allow you to receive marks and feedback when your team assignment is marked.
Rationale
This assessment task will assess the following learning outcome/s:
- be able to examine the legal, business and privacy requirements for a cloud deployment model.
- be able to evaluate the risk management requirements for a cloud deployment model.
- be able to critically analyse the legal, ethical and business concerns for the security and privacy of data to be deployed to the cloud.
- be able to develop and present a series of proposed security controls to manage the security and privacy of data deployed to the cloud.
- be able to develop and present a cloud governance framework to underpin the cloud operations for an enterprise.
Identifying, assessing and explaining threats, security and risk for computer applications in the real world requires that you interact with colleagues, peers and various stakeholders, therefore team work has been incorporated into these assessments to facilitate this.
No comments:
Post a Comment