Assignment 12-Dawood-OpX

doc

School

Harrisburg University Of Science And Technology Hi *

*We aren’t endorsed by this school

Course

701

Subject

Information Systems

Date

Nov 24, 2024

Type

doc

Pages

5

Uploaded by ravindra1987

Report
Running head: ASSIGNMENT 1 Week 12 Assignment Dawood Ali University of the Cumberlands Operational Excellence (ITS-631-M51) 11/18/2023
ASSIGNMENT 2 Information Systems for Business and Beyond Chapter 12 What does the term information systems ethics mean? The ethics in information system focus on how the data is protected with integrity, and shared with others. What is Code of ethics mean? Code of ethics talk about what moral principles one has to follow as way of doing business with integrity. This code will be guiding principle for people to follow in maintaining the right approach in doing things accordingly. What is Intellectual Property. Intellectual Property is defined as the right provided to the invention for the idea and has certain rights/protection in certain jurisdictions. For example, Carrier has the IP on the HVAC invention around cooling and heating. What do you mean by Protections of the copyright? Copyright is the legal authority provided to the original owner on the material and any copy of this content can be termed as a violation. There will be a copyright violation fee for the other party if there is any incident reported by the original owner. What is fair use?
ASSIGNMENT 3 Fair use policy is how to ensure that any content or material is good to use or copy without any legal challenges. For all the academic purposes, the fair use policy is used. What level of protection for the patent filing? For any patent, there are certain protections provided to the idea submitters from any non-fair use (Caiza et al., 2019). The patent is often protected from the government and USA offers the best rights to the patent owner for any infringements. What does trademark protect? A trademark is any logo or picture or phrase that is protected to ensure its usage is controlled. All companies’ logos like Tesla, KFC, etc. are trademarks. What does personally identifiable information mean? Personal identifiable information (PIA) includes any information that can help to link back to the person. This would include the social security number, which is unique for each individual. What is the protection offered by HIPAA, COPAA, and FERPA? HIPAA is the regulation that provide protection on how the confidential medical data is protected across the IT system. COPAA talks about how the information of children under 13yrs are only used with consent from parents. FERPA protect student records when shared across other systems. How would you explain the concept of NORA?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ASSIGNMENT 4 NORA is the approach to collect large amount of data via aggregators and building relationships to build user profiles accordingly. What is GDPR and its implications? GDPR is one of the best data privacy policies within the European Union jurisdiction. The impact of this privacy framework is how the user data is protected for utilization and result in high penalties for any violation in terms of non-compliance to GDPR. Exercise 1 The purchase of the Windows Operating System is done via a CD and would need to install this on the personal computer. There is a 16-digit license code that need to be entered into the installation process. There are many cases where the license code can be manipulated and random keys are generated using online websites at low cost. This is very important to understand that license we get is only for per user and multiple user is not allowed. Exercise 2 There is an acceptable desktop policy for employees to follow in my organization. This includes how the desktops need to clean the device for easy usage. A clean desktop should not have any confidential data on the screen for others, the folders should be organized to ensure data is properly documented, system maintenance can be uniform for all the systems with desktop policy, and provide guardrails for avoiding any tail gating of employees.
ASSIGNMENT 5 References Caiza, J. C., Martín, Y. S., Guamán, D. S., Del Alamo, J. M., & Yelmo, J. C. (2019). Reusable elements for the systematic design of privacy-friendly information systems: A mapping study. IEEE Access , 7 , 66512-66535. Zhang, J. F., Tan, J. W., & Wang, J. M. (2021). Privacy security in control systems. Science China Information Sciences , 64 (176201), 1-176201.