SlideShare a Scribd company logo
1 of 10
Answer the Below Question. APA format. 300 words.
Textbook :
Information Governance: Concepts, Strategies and Best
Practices; John R.S. Fraser, Betty J. Simkins, Kristina Narvaez;
Copyright © 2015 by John R.S. Fraser, Betty J. Simkins,
Kristina Narvaez (ISBN 978-1-118-69196-0)
Beasley, M. S. (2016). What is Enterprise Risk Management?
Retrieved from
https://erm.ncsu.edu/az/erm/i/chan/library/What_is_Enterprise_
Risk_Management.pdf
Question : You are requested to write an essay highlighting key
commonalities and key differences between GDPR and CCPA.
Select one of the key differences and elaborate further on which
you think is more effective.
Write Response to below two Discussions seperately.APA
format. 100 words each.
DISCUSSION 1:
CCPA is a law that provides consumers the right to personal
details to be gathered, shared, or sold by a company. GDPR is
also a privacy law that disallows the gathering and processing
of personal information by organizations. The similarity
between these laws is that they oblige organizations to adhere to
specific guidelines when handling personal data of people. Both
of them have the disclosure of transparency requirements
(Hammarling, 2019). They protect consumers or data subjects,
no matter where they are at the given time. Both of them protect
the same categories and kinds of information of natural people.
The first difference among these laws is the type of business
that should comply. CCPA has applied to primary business that
their sale is of personal information or to companies based in
California that its revenues are above twenty-five million
dollars. GDPR is for all businesses that process information of
EU individuals no matter their size and location. GDPR needs
websites, organizations, and businesses to have a legal basis for
processing data in the European, whereas CCPA does not
require prior consent from the consumer (Blanke, 2020). They
differ in their financial penalties as GDPR sanction for non-
compliance and data breach. In CCPA, a sanction is only done
when there is a breach and enables customers to sue an
organization for violation (Buresh, 2019). CCPA considers both
the consumer and household as entities and can consider the
information given by the customer while GDPR focuses on all
the data associated with the EU consumer.
The most effective difference is the right to prior consent in
GDPR versus to opt-out in CCPA. They are incomparable as
the right to opt-out goes hand in hand with the right to withdraw
consent while that of prior consent has no equivalent in CCPA.
The right to prior consent creates all the difference when
comparing the rights in these laws as it provides a legal
framework grounded on privacy first through user control.
References:
Blanke, Jordan M. (2020), Protection for 'Inferences Drawn:' A
Comparison between the General Data Protection Rule and the
California Consumer Privacy Act (January 12, 2020). Available
at SSRN: https://ssrn.com/abstract=3518164.
Buresh, D. L. (2019), A Comparison between the European and
the American Approaches to Privacy. Indon. J. Int'l & Comp.
L., 6, 257.
Hammarling, J. (2019), A comparative study on “the Right of
Access” under the GDPR and the CCPA. Retrieved from
http://lup.lub.lu.se/student-papers/record/9000026
DISCUSSION 2:
The GDPR as specific aspects would not be generally applicable
with reference to the context that has been purely personal or
even related with the household. CCPA on the other hand would
be completely applicable for the non commercial activities as
well. Exemption in this context with reference to GDP are
would only be referring to the individuals while the other ccpa
would be recovering the business aspects as well which has
been processed with the personal data (cookiebot, 2020).
CCPA will be tracking down the emergency applications that
have been associated with the benefits of the on information
while the agenda would be associated with the encouragement
of strong privacy as well as greater transparency. Proper
management of consumers and ownership on the other hand with
reference to personal information would also help in bringing
down the ability required. The context of each and every
conditions which has been associated with the business
disclosure in the personal information would also help in
management of connectivity which has been required as far as a
data has not been sold to parties. Third party management
would also help in knowing down the personal information
which has been collected and the access ability of personal
information that has to be collected based on request. We
should also make sure that whatever has been known in terms of
the personal information should not be opt out but however
equal service and price should be given to the privacy rights
(varonis, 2020).
The California consumer privacy act would also define the
business as far as a profit entity which would collect the
personal data which has been related to the consumer as well.
Therefore, the business related contact which has been
associated with the threshold would also be subjected to
compliance because there are annual exemptions (varonis,
2020).
References
Cookiebot. (2020). CCPA vs GDPR. Retrieved from,
https://www.cookiebot.com/en/ccpa-vs-gdpr/
varonis. (2020). California consumer privacy act. Retrieved
from,
https://www.varonis.com/blog/ccpa-vs-gdpr/
Please make your response posts substantive. A substantive post
will do at least TWO of the following:
Ask an interesting, thoughtful question pertaining to the topic
Provide an outside source (for example, an article from the UC
Library) that applies to the topic, along with additional
information about the topic or the source (please cite properly
in APA)
At least one scholarly source should be used in the initial
discussion thread. Be sure to use information from your
readings and other sources from the UC Library. Use proper
citations and references in your post.
APA format, 150 words each.
Discussion 1)
The reality is that all the cyber physical security systems also
contain a human component from their design and
implementation through to deployment, usage, maintenance,
evolution and decommissioning. Within this complex socio-
technical system all three components are not only potential
points of weakness but may also attack maliciously any other
component (Frey et al.,2016). However, the sheer scale,
velocity of adoption and pervasiveness of the IoT presents,
combined with on-system resource limitations, fundamental
challenges to software engineering and how best to ensure the
safety and security of the IoT.
Recently new methods are analyzed to the role of latent design
conditions in impacting security perceptions of operators in
industrial control systems and highlighted the challenges posed
by smart CPS, notably their emergent design arising from
dynamic aggregation of a range of devices and services and the
focus on automation that aims to “hide” complexity models
from the users. Whilst usability is considered a key non-
functional requirement during software engineering and there is
a body of research on usable security, emergent design and
automation pose key challenges with regards to security
behaviors in smart CPS (Kohn et al.,2000).
Security measures are designed in five principles for security
ergonomics within smart CPS be developed collaboratively by
the software engineering, human factors and security
communities. Proactive security ergonomic design, not reactive
remedy. Design should encourage secure behaviors. By default,
secure non-erroneous user behaviors are encouraged and where
possible enforced, Non-alignment by default (Schneier, 2016).
As human error is inevitable, security ergonomic design should
prevent alignment of active error and latent failures. External
design validation. Standard software development practices
such as automated and unit testing can help with this validation
although care must be taken that these themselves are not
biased.
References:
S. Frey, A. Rashid, A. Zanutto, J. Busby and K. Follis, "On the
role of latent design conditions in cyber-physical systems
security", Proceedings of the 2nd International Workshop on
Software Engineering for Smart Cyber-Physical Systems, pp.
43-46, 2016.
L. T. Kohn, J. M. Corrigan, M. S. Donaldson et al., To err is
human: building a safer health system, National Academies
Press, vol. 6, 2000.
B. Schneier, Security economics of the internet of things, 2016,
[online] Available:
https://www.schneier.com/blog/archives/2016/10/security_econ
om_1.html.
Discussion 2)
Should organizations invest in physical security? Physical
security is essential in organizations since it protects the
company’s assets, information, people, buildings, facilities,
sites, and premises. Nevertheless, it’s worth investing in since it
is essential to safeguard the availability of resources, integrity,
and confidentiality (Moses & Rowe, 2016). Furthermore,
physical security facilitates comprehensive accountability and
security for the overall company. It also ensures that the
organization’s information is secure from natural calamity and
human misuses such as espionage, vandalism, and sabotage.
Technology, procedures, and people are integrated to design a
successful physical security system effectively. Hence, the
objectives, characteristics, evaluation, and analysis of the
system should be measured before design. Furthermore, the
models available for the design of physical security are
technical, administrative, and physical controls. Technical
controls major on access control, which entails various layers of
security (Lalonde, 2018). The measures that can be applied to
safeguard the organization include audit systems, intrusion
detection, and smart-cards. Moreover, the administrative
controls encompass measures to design and control physical
attacks based on on-site planning, location, and design of
business facilities. The countermeasures that can be applied
include facility planning methods employed to distinguish the
systematic relationship between applications and connections in
business.
Physical controls restrict access to the organization’s facilities,
which has numerous layers of protection of non-employees and
employees based on their access level. The countermeasures to
ensure physical controls include setting up a fence around the
facility, protect entry doors with card readers, and ensuring
employees use badge authorization to access the facility.
Moreover, CCTV surveillance is an effective method to provide
physical security outside and inside the business facility (Jason
& Gigliotti, 2017).
References
Jason, R., & Gigliotti, R. (2017). Approaches to Physical
Security. Research Gate, 67-84.
Lalonde, M. (2018). Combining Strengths: Cyber and Physical
Security Convergence. Research Gate.
Moses, S., & Rowe, D. (2016). Physical Security and
Cybersecurity: Reducing Risk by Enhancing Physical Security
Posture through Multi-Factor Authentication and other
Techniques. International Journal for Information Security
Research, 667-676.

More Related Content

Similar to Answer the Below Question. APA format. 300 words.Textbook .docx

Identity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaIdentity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaLizbethQuinonez813
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxadampcarr67227
 
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)ProductNation/iSPIRT
 
Brendan Eich's letter to Senator Thune and Senator Nelson, Senate Committee o...
Brendan Eich's letter to Senator Thune and Senator Nelson, Senate Committee o...Brendan Eich's letter to Senator Thune and Senator Nelson, Senate Committee o...
Brendan Eich's letter to Senator Thune and Senator Nelson, Senate Committee o...Johnny Ryan
 
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCERIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCEVARUN KESAVAN
 
Artificial Intelligence is Watching You at Work - Digital Surveillance, Emplo...
Artificial Intelligence is Watching You at Work - Digital Surveillance, Emplo...Artificial Intelligence is Watching You at Work - Digital Surveillance, Emplo...
Artificial Intelligence is Watching You at Work - Digital Surveillance, Emplo...IE Law School, IE University
 
Posting 1 Reply required for belowBusiness costs or risks of p.docx
Posting 1  Reply required for belowBusiness costs or risks of p.docxPosting 1  Reply required for belowBusiness costs or risks of p.docx
Posting 1 Reply required for belowBusiness costs or risks of p.docxharrisonhoward80223
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxssuser454af01
 
Malware & Data Breaches: Combatting the Biggest Threat
Malware & Data Breaches:  Combatting the Biggest ThreatMalware & Data Breaches:  Combatting the Biggest Threat
Malware & Data Breaches: Combatting the Biggest ThreatChris Ross
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewEnow Eyong
 
Data Breaches
Data BreachesData Breaches
Data Breachessstose
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxjeanettehully
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxglendar3
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxtodd581
 
Contents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of AccounContents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of AccounAlleneMcclendon878
 

Similar to Answer the Below Question. APA format. 300 words.Textbook .docx (17)

Essay
EssayEssay
Essay
 
Identity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expaIdentity Theft ResponseYou have successfully presented an expa
Identity Theft ResponseYou have successfully presented an expa
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
 
Brendan Eich's letter to Senator Thune and Senator Nelson, Senate Committee o...
Brendan Eich's letter to Senator Thune and Senator Nelson, Senate Committee o...Brendan Eich's letter to Senator Thune and Senator Nelson, Senate Committee o...
Brendan Eich's letter to Senator Thune and Senator Nelson, Senate Committee o...
 
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCERIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE
 
ICE-B.pptx
ICE-B.pptxICE-B.pptx
ICE-B.pptx
 
Artificial Intelligence is Watching You at Work - Digital Surveillance, Emplo...
Artificial Intelligence is Watching You at Work - Digital Surveillance, Emplo...Artificial Intelligence is Watching You at Work - Digital Surveillance, Emplo...
Artificial Intelligence is Watching You at Work - Digital Surveillance, Emplo...
 
Posting 1 Reply required for belowBusiness costs or risks of p.docx
Posting 1  Reply required for belowBusiness costs or risks of p.docxPosting 1  Reply required for belowBusiness costs or risks of p.docx
Posting 1 Reply required for belowBusiness costs or risks of p.docx
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docx
 
Malware & Data Breaches: Combatting the Biggest Threat
Malware & Data Breaches:  Combatting the Biggest ThreatMalware & Data Breaches:  Combatting the Biggest Threat
Malware & Data Breaches: Combatting the Biggest Threat
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature Review
 
Data Breaches
Data BreachesData Breaches
Data Breaches
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Contents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of AccounContents lists available at ScienceDirectJournal of Accoun
Contents lists available at ScienceDirectJournal of Accoun
 

More from nolanalgernon

Answer the following questions using full sentences. Where possible.docx
Answer the following questions using full sentences.  Where possible.docxAnswer the following questions using full sentences.  Where possible.docx
Answer the following questions using full sentences. Where possible.docxnolanalgernon
 
Answer the following questions, after reading the three documents BE.docx
Answer the following questions, after reading the three documents BE.docxAnswer the following questions, after reading the three documents BE.docx
Answer the following questions, after reading the three documents BE.docxnolanalgernon
 
Answer the following questions regarding the passage below1. Bas.docx
Answer the following questions regarding the passage below1. Bas.docxAnswer the following questions regarding the passage below1. Bas.docx
Answer the following questions regarding the passage below1. Bas.docxnolanalgernon
 
Answer the following questions with 50- to 100-word responses. P.docx
Answer the following questions with 50- to 100-word responses. P.docxAnswer the following questions with 50- to 100-word responses. P.docx
Answer the following questions with 50- to 100-word responses. P.docxnolanalgernon
 
Answer the following questions in three well-developed paragraph.docx
Answer the following questions in three well-developed paragraph.docxAnswer the following questions in three well-developed paragraph.docx
Answer the following questions in three well-developed paragraph.docxnolanalgernon
 
Answer the following questions using ONLY your assigned readings. .docx
Answer the following questions using ONLY your assigned readings. .docxAnswer the following questions using ONLY your assigned readings. .docx
Answer the following questions using ONLY your assigned readings. .docxnolanalgernon
 
answer the following questions thoroughly and provide justification.docx
answer the following questions thoroughly and provide justification.docxanswer the following questions thoroughly and provide justification.docx
answer the following questions thoroughly and provide justification.docxnolanalgernon
 
Answer the following questions in paragraph form (2 pagesDouble.docx
Answer the following questions in paragraph form (2 pagesDouble.docxAnswer the following questions in paragraph form (2 pagesDouble.docx
Answer the following questions in paragraph form (2 pagesDouble.docxnolanalgernon
 
Answer the following questions in elaborate paragraph form. .docx
Answer the following questions in elaborate paragraph form. .docxAnswer the following questions in elaborate paragraph form. .docx
Answer the following questions in elaborate paragraph form. .docxnolanalgernon
 
Answer the following questions in the paperWhy was Freud’s wo.docx
Answer the following questions in the paperWhy was Freud’s wo.docxAnswer the following questions in the paperWhy was Freud’s wo.docx
Answer the following questions in the paperWhy was Freud’s wo.docxnolanalgernon
 
Answer the following questions in a two page word document.  Remembe.docx
Answer the following questions in a two page word document.  Remembe.docxAnswer the following questions in a two page word document.  Remembe.docx
Answer the following questions in a two page word document.  Remembe.docxnolanalgernon
 
Answer the following questions in a cohesive and comprehensive e.docx
Answer the following questions in a cohesive and comprehensive e.docxAnswer the following questions in a cohesive and comprehensive e.docx
Answer the following questions in a cohesive and comprehensive e.docxnolanalgernon
 
Answer the following questions based on Chapter 5 of Tuten, T. L. & .docx
Answer the following questions based on Chapter 5 of Tuten, T. L. & .docxAnswer the following questions based on Chapter 5 of Tuten, T. L. & .docx
Answer the following questions based on Chapter 5 of Tuten, T. L. & .docxnolanalgernon
 
Answer the following questions about psychosocial development in chi.docx
Answer the following questions about psychosocial development in chi.docxAnswer the following questions about psychosocial development in chi.docx
Answer the following questions about psychosocial development in chi.docxnolanalgernon
 
Answer the following question. My orgenization is Wells FargoI.docx
Answer the following question. My orgenization is Wells FargoI.docxAnswer the following question. My orgenization is Wells FargoI.docx
Answer the following question. My orgenization is Wells FargoI.docxnolanalgernon
 
Answer the following questions 150 words or so for each. References.docx
Answer the following questions 150 words or so for each. References.docxAnswer the following questions 150 words or so for each. References.docx
Answer the following questions 150 words or so for each. References.docxnolanalgernon
 
Answer the following question in a well-developed paragraph.  Includ.docx
Answer the following question in a well-developed paragraph.  Includ.docxAnswer the following question in a well-developed paragraph.  Includ.docx
Answer the following question in a well-developed paragraph.  Includ.docxnolanalgernon
 
ANSWER THE FOLLOWING QUESTION1. Describe at least four of th.docx
ANSWER THE FOLLOWING QUESTION1. Describe at least four of th.docxANSWER THE FOLLOWING QUESTION1. Describe at least four of th.docx
ANSWER THE FOLLOWING QUESTION1. Describe at least four of th.docxnolanalgernon
 
Answer the following question from the text book attached below..docx
Answer the following question from the text book attached below..docxAnswer the following question from the text book attached below..docx
Answer the following question from the text book attached below..docxnolanalgernon
 
Answer the following in 200 to 300 words and provide an example th.docx
Answer the following in 200 to 300 words and provide an example th.docxAnswer the following in 200 to 300 words and provide an example th.docx
Answer the following in 200 to 300 words and provide an example th.docxnolanalgernon
 

More from nolanalgernon (20)

Answer the following questions using full sentences. Where possible.docx
Answer the following questions using full sentences.  Where possible.docxAnswer the following questions using full sentences.  Where possible.docx
Answer the following questions using full sentences. Where possible.docx
 
Answer the following questions, after reading the three documents BE.docx
Answer the following questions, after reading the three documents BE.docxAnswer the following questions, after reading the three documents BE.docx
Answer the following questions, after reading the three documents BE.docx
 
Answer the following questions regarding the passage below1. Bas.docx
Answer the following questions regarding the passage below1. Bas.docxAnswer the following questions regarding the passage below1. Bas.docx
Answer the following questions regarding the passage below1. Bas.docx
 
Answer the following questions with 50- to 100-word responses. P.docx
Answer the following questions with 50- to 100-word responses. P.docxAnswer the following questions with 50- to 100-word responses. P.docx
Answer the following questions with 50- to 100-word responses. P.docx
 
Answer the following questions in three well-developed paragraph.docx
Answer the following questions in three well-developed paragraph.docxAnswer the following questions in three well-developed paragraph.docx
Answer the following questions in three well-developed paragraph.docx
 
Answer the following questions using ONLY your assigned readings. .docx
Answer the following questions using ONLY your assigned readings. .docxAnswer the following questions using ONLY your assigned readings. .docx
Answer the following questions using ONLY your assigned readings. .docx
 
answer the following questions thoroughly and provide justification.docx
answer the following questions thoroughly and provide justification.docxanswer the following questions thoroughly and provide justification.docx
answer the following questions thoroughly and provide justification.docx
 
Answer the following questions in paragraph form (2 pagesDouble.docx
Answer the following questions in paragraph form (2 pagesDouble.docxAnswer the following questions in paragraph form (2 pagesDouble.docx
Answer the following questions in paragraph form (2 pagesDouble.docx
 
Answer the following questions in elaborate paragraph form. .docx
Answer the following questions in elaborate paragraph form. .docxAnswer the following questions in elaborate paragraph form. .docx
Answer the following questions in elaborate paragraph form. .docx
 
Answer the following questions in the paperWhy was Freud’s wo.docx
Answer the following questions in the paperWhy was Freud’s wo.docxAnswer the following questions in the paperWhy was Freud’s wo.docx
Answer the following questions in the paperWhy was Freud’s wo.docx
 
Answer the following questions in a two page word document.  Remembe.docx
Answer the following questions in a two page word document.  Remembe.docxAnswer the following questions in a two page word document.  Remembe.docx
Answer the following questions in a two page word document.  Remembe.docx
 
Answer the following questions in a cohesive and comprehensive e.docx
Answer the following questions in a cohesive and comprehensive e.docxAnswer the following questions in a cohesive and comprehensive e.docx
Answer the following questions in a cohesive and comprehensive e.docx
 
Answer the following questions based on Chapter 5 of Tuten, T. L. & .docx
Answer the following questions based on Chapter 5 of Tuten, T. L. & .docxAnswer the following questions based on Chapter 5 of Tuten, T. L. & .docx
Answer the following questions based on Chapter 5 of Tuten, T. L. & .docx
 
Answer the following questions about psychosocial development in chi.docx
Answer the following questions about psychosocial development in chi.docxAnswer the following questions about psychosocial development in chi.docx
Answer the following questions about psychosocial development in chi.docx
 
Answer the following question. My orgenization is Wells FargoI.docx
Answer the following question. My orgenization is Wells FargoI.docxAnswer the following question. My orgenization is Wells FargoI.docx
Answer the following question. My orgenization is Wells FargoI.docx
 
Answer the following questions 150 words or so for each. References.docx
Answer the following questions 150 words or so for each. References.docxAnswer the following questions 150 words or so for each. References.docx
Answer the following questions 150 words or so for each. References.docx
 
Answer the following question in a well-developed paragraph.  Includ.docx
Answer the following question in a well-developed paragraph.  Includ.docxAnswer the following question in a well-developed paragraph.  Includ.docx
Answer the following question in a well-developed paragraph.  Includ.docx
 
ANSWER THE FOLLOWING QUESTION1. Describe at least four of th.docx
ANSWER THE FOLLOWING QUESTION1. Describe at least four of th.docxANSWER THE FOLLOWING QUESTION1. Describe at least four of th.docx
ANSWER THE FOLLOWING QUESTION1. Describe at least four of th.docx
 
Answer the following question from the text book attached below..docx
Answer the following question from the text book attached below..docxAnswer the following question from the text book attached below..docx
Answer the following question from the text book attached below..docx
 
Answer the following in 200 to 300 words and provide an example th.docx
Answer the following in 200 to 300 words and provide an example th.docxAnswer the following in 200 to 300 words and provide an example th.docx
Answer the following in 200 to 300 words and provide an example th.docx
 

Recently uploaded

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 

Recently uploaded (20)

Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 

Answer the Below Question. APA format. 300 words.Textbook .docx

  • 1. Answer the Below Question. APA format. 300 words. Textbook : Information Governance: Concepts, Strategies and Best Practices; John R.S. Fraser, Betty J. Simkins, Kristina Narvaez; Copyright © 2015 by John R.S. Fraser, Betty J. Simkins, Kristina Narvaez (ISBN 978-1-118-69196-0) Beasley, M. S. (2016). What is Enterprise Risk Management? Retrieved from https://erm.ncsu.edu/az/erm/i/chan/library/What_is_Enterprise_ Risk_Management.pdf Question : You are requested to write an essay highlighting key commonalities and key differences between GDPR and CCPA. Select one of the key differences and elaborate further on which you think is more effective. Write Response to below two Discussions seperately.APA format. 100 words each.
  • 2. DISCUSSION 1: CCPA is a law that provides consumers the right to personal details to be gathered, shared, or sold by a company. GDPR is also a privacy law that disallows the gathering and processing of personal information by organizations. The similarity between these laws is that they oblige organizations to adhere to specific guidelines when handling personal data of people. Both of them have the disclosure of transparency requirements (Hammarling, 2019). They protect consumers or data subjects, no matter where they are at the given time. Both of them protect the same categories and kinds of information of natural people. The first difference among these laws is the type of business that should comply. CCPA has applied to primary business that their sale is of personal information or to companies based in California that its revenues are above twenty-five million dollars. GDPR is for all businesses that process information of EU individuals no matter their size and location. GDPR needs websites, organizations, and businesses to have a legal basis for processing data in the European, whereas CCPA does not require prior consent from the consumer (Blanke, 2020). They differ in their financial penalties as GDPR sanction for non- compliance and data breach. In CCPA, a sanction is only done when there is a breach and enables customers to sue an organization for violation (Buresh, 2019). CCPA considers both the consumer and household as entities and can consider the information given by the customer while GDPR focuses on all the data associated with the EU consumer.
  • 3. The most effective difference is the right to prior consent in GDPR versus to opt-out in CCPA. They are incomparable as the right to opt-out goes hand in hand with the right to withdraw consent while that of prior consent has no equivalent in CCPA. The right to prior consent creates all the difference when comparing the rights in these laws as it provides a legal framework grounded on privacy first through user control. References: Blanke, Jordan M. (2020), Protection for 'Inferences Drawn:' A Comparison between the General Data Protection Rule and the California Consumer Privacy Act (January 12, 2020). Available at SSRN: https://ssrn.com/abstract=3518164. Buresh, D. L. (2019), A Comparison between the European and the American Approaches to Privacy. Indon. J. Int'l & Comp. L., 6, 257. Hammarling, J. (2019), A comparative study on “the Right of Access” under the GDPR and the CCPA. Retrieved from http://lup.lub.lu.se/student-papers/record/9000026 DISCUSSION 2:
  • 4. The GDPR as specific aspects would not be generally applicable with reference to the context that has been purely personal or even related with the household. CCPA on the other hand would be completely applicable for the non commercial activities as well. Exemption in this context with reference to GDP are would only be referring to the individuals while the other ccpa would be recovering the business aspects as well which has been processed with the personal data (cookiebot, 2020). CCPA will be tracking down the emergency applications that have been associated with the benefits of the on information while the agenda would be associated with the encouragement of strong privacy as well as greater transparency. Proper management of consumers and ownership on the other hand with reference to personal information would also help in bringing down the ability required. The context of each and every conditions which has been associated with the business disclosure in the personal information would also help in management of connectivity which has been required as far as a data has not been sold to parties. Third party management would also help in knowing down the personal information which has been collected and the access ability of personal information that has to be collected based on request. We should also make sure that whatever has been known in terms of the personal information should not be opt out but however equal service and price should be given to the privacy rights (varonis, 2020). The California consumer privacy act would also define the
  • 5. business as far as a profit entity which would collect the personal data which has been related to the consumer as well. Therefore, the business related contact which has been associated with the threshold would also be subjected to compliance because there are annual exemptions (varonis, 2020). References Cookiebot. (2020). CCPA vs GDPR. Retrieved from, https://www.cookiebot.com/en/ccpa-vs-gdpr/ varonis. (2020). California consumer privacy act. Retrieved from, https://www.varonis.com/blog/ccpa-vs-gdpr/ Please make your response posts substantive. A substantive post will do at least TWO of the following:
  • 6. Ask an interesting, thoughtful question pertaining to the topic Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA) At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post. APA format, 150 words each. Discussion 1) The reality is that all the cyber physical security systems also contain a human component from their design and implementation through to deployment, usage, maintenance, evolution and decommissioning. Within this complex socio- technical system all three components are not only potential points of weakness but may also attack maliciously any other component (Frey et al.,2016). However, the sheer scale, velocity of adoption and pervasiveness of the IoT presents, combined with on-system resource limitations, fundamental challenges to software engineering and how best to ensure the safety and security of the IoT.
  • 7. Recently new methods are analyzed to the role of latent design conditions in impacting security perceptions of operators in industrial control systems and highlighted the challenges posed by smart CPS, notably their emergent design arising from dynamic aggregation of a range of devices and services and the focus on automation that aims to “hide” complexity models from the users. Whilst usability is considered a key non- functional requirement during software engineering and there is a body of research on usable security, emergent design and automation pose key challenges with regards to security behaviors in smart CPS (Kohn et al.,2000). Security measures are designed in five principles for security ergonomics within smart CPS be developed collaboratively by the software engineering, human factors and security communities. Proactive security ergonomic design, not reactive remedy. Design should encourage secure behaviors. By default, secure non-erroneous user behaviors are encouraged and where possible enforced, Non-alignment by default (Schneier, 2016). As human error is inevitable, security ergonomic design should prevent alignment of active error and latent failures. External design validation. Standard software development practices such as automated and unit testing can help with this validation although care must be taken that these themselves are not biased. References:
  • 8. S. Frey, A. Rashid, A. Zanutto, J. Busby and K. Follis, "On the role of latent design conditions in cyber-physical systems security", Proceedings of the 2nd International Workshop on Software Engineering for Smart Cyber-Physical Systems, pp. 43-46, 2016. L. T. Kohn, J. M. Corrigan, M. S. Donaldson et al., To err is human: building a safer health system, National Academies Press, vol. 6, 2000. B. Schneier, Security economics of the internet of things, 2016, [online] Available: https://www.schneier.com/blog/archives/2016/10/security_econ om_1.html. Discussion 2) Should organizations invest in physical security? Physical security is essential in organizations since it protects the company’s assets, information, people, buildings, facilities, sites, and premises. Nevertheless, it’s worth investing in since it is essential to safeguard the availability of resources, integrity, and confidentiality (Moses & Rowe, 2016). Furthermore, physical security facilitates comprehensive accountability and security for the overall company. It also ensures that the
  • 9. organization’s information is secure from natural calamity and human misuses such as espionage, vandalism, and sabotage. Technology, procedures, and people are integrated to design a successful physical security system effectively. Hence, the objectives, characteristics, evaluation, and analysis of the system should be measured before design. Furthermore, the models available for the design of physical security are technical, administrative, and physical controls. Technical controls major on access control, which entails various layers of security (Lalonde, 2018). The measures that can be applied to safeguard the organization include audit systems, intrusion detection, and smart-cards. Moreover, the administrative controls encompass measures to design and control physical attacks based on on-site planning, location, and design of business facilities. The countermeasures that can be applied include facility planning methods employed to distinguish the systematic relationship between applications and connections in business. Physical controls restrict access to the organization’s facilities, which has numerous layers of protection of non-employees and employees based on their access level. The countermeasures to ensure physical controls include setting up a fence around the facility, protect entry doors with card readers, and ensuring employees use badge authorization to access the facility. Moreover, CCTV surveillance is an effective method to provide physical security outside and inside the business facility (Jason & Gigliotti, 2017).
  • 10. References Jason, R., & Gigliotti, R. (2017). Approaches to Physical Security. Research Gate, 67-84. Lalonde, M. (2018). Combining Strengths: Cyber and Physical Security Convergence. Research Gate. Moses, S., & Rowe, D. (2016). Physical Security and Cybersecurity: Reducing Risk by Enhancing Physical Security Posture through Multi-Factor Authentication and other Techniques. International Journal for Information Security Research, 667-676.