Home > Sample essays > Secure Your Organisation With GDPR: A Guide to Data Protection Practices

Essay: Secure Your Organisation With GDPR: A Guide to Data Protection Practices

Essay details and download:

  • Subject area(s): Sample essays
  • Reading time: 5 minutes
  • Price: Free download
  • Published: 1 April 2019*
  • Last Modified: 23 July 2024
  • File format: Text
  • Words: 1,205 (approx)
  • Number of pages: 5 (approx)

Text preview of this essay:

This page of the essay has 1,205 words.



The Information systems function within an organisation is comprised of three subcategories. The first Is called an Information systems Department, The size of the organisations department varies depending  on the role of  information systems within the organisation and its size. The second entity which consists of Information system specialists, programmers, Engineers, Managers, System Analysts, Also external specialists such as hardware vendors, and operations that participate in the day to day work and long term planning of the information systems. The third element of the information systems is the technology itself, both Hardware and Software.

¬¬

Question 2:

Strong IT strategy provides the stepping stone  of how technology  provides supports and shapes the organisations overall business strategy. The strategy goals  should be aligned with the business projects and take into account key stake holders like employees, customers and business partners. Where the technology will be in the next 5 years¬¬

Certain models are needed to execute an IT strategy.

– High level overview of how IT department executes its, missions, core values and approaches to accomplish . Its goals.

– Current budget and spend forecast

– Outline current and future IT plans followed by timeframes

– Analysis of IT strengths and weaknesses

– Outline potential opportunities and vulnerabilities that will direct Technology for the organisations success.

Question 3:

Initially data modelling process starts with analysing the situation. Analysts need to gather requirements,  when designing a proper data model its vital to communicate with stakeholders about certain requirement, so that the data can be extracted and interpreted. Data analysis can impact the type of data model selected, if the intent is to provide query and reporting capability, a data model that structures the in data in a more normalized manner would provide the fastest and easiest access to the data. The querying and reporting consists of extracting certain data to analyse certain trends and highlight to the stakeholder from which strategies and improvements can be developed. The data modelling consists of three phases in systems analysis, the structural part, manipulating part and integrity part.

Question 4:

A Management Information System ( MIS ),  is comprised of a database, that collects, summarises and analyses any type of data for managers, One application of this system is MIS for Human Resource Management, this information system manages employee data such as basic personal information, attendance, PTO’s, Performance review scores and many more. However because the data within this database has sensitive and private information such as , names, addresses, PPS numbers, protecting and maintaining security is crucial. The HRM database can access information for any employee reducing the cost of having paper. The system is also designed to provide trending information for management feedback in such areas as improving recruiting efforts, managing schedules and workflows.

Question 5:

The acquisition of information systems by external sources such as vendors and contractors has been a practice for a lot of major organisations. It entails transferring the major components of the organisations systems and operations such as data centres, telecommunications, software development and maintenance to a specialised company that that provides its services under long-term contracts specifying the service levels, like the scope and the quality of the service to be provided. Some benefits from implementing this system is that it would reduce cost as a result of economic scale, enables strategic business focus. Some fall backs include, some loss of strategic flexibility, potential irreversibility if problem occurs, and organisations chosen outsourcing without negotiating a detailed contract may also encounter hidden cost or dramatic increases upon renewal.

Question 6:

One major consideration when building an information systems for an organisation despite it having major impact on business strategy and organizational success, is the extensive testing of this new system. Successfully implemented information systems include the involvement of management and decision makers is a key factor to the success of the organisation including higher profits and lower cost. Goals when creating or implementing a new system should be aligned with the benefits of having this information system, for example does it provide better safety, does it offer a  competitive advantage, fewer errors, greater accuracy, higher quality output. These goals can be measured by performing multiple tests on the potential information system by analysing the results vs expectation and if it meets the expectations then it can begin in production.

Question 7:

An example of key responsibilities of a managing operations in information  systems for example Engineering managers are in charge of tasks such as:

• To plan and lead technical improvement projects with established schedules, budgets and product cost targets

• Troubleshoot and determine root cause of product failure and provide solutions

• Complete product design enhancement projects such as improving reliability and upgrade current designs to increase value and customer satisfaction.

• Take part in project planning and drive execution to meet project timelines and deliverables.

Question 8:

The following are a set of example security system protocols and procedures to secure information systems:

• Identifying the type of data collected, stored and transmitted can help in identifying controls used to secure the information system. Some confidential data needs to be classified due to federal regulation, while other data may be classified as public. Security controls will be stronger for confidential data than those for public. Data classification can help organisations prioritise security efforts.

• Software requires regular maintenance to maintain peak performance and functionality. As when an issue arises the organisation is informed of the problem and are able to release a patch, update or a service pack. These patches can range from fixing small cosmetic issues to high priority security breach issues which would allow full control of the system from an authorised source

Question 9:

GDRP is a new regulation that was passed to secure the data and privacy of EU users. As it applies to all companies processing the personal data of data subjects residing in the Union, regardless of the company’s location. The conditions for consent have been strengthened, and companies are no longer able to use long illegible terms and conditions full of legalese. The request for consent must be given in an intelligible and easily accessible form, with the purpose for data processing attached to that consent. Consent must be clear and distinguishable from other matters and provided in an intelligible and easily accessible form, using clear and plain language. Under the GDPR, breach notifications are now mandatory in all member states where a data breach is likely to result in users personal information being used without their consent. Also known as Data Erasure, the right to be forgotten entitles the data subject to have the data controller erase his/her personal data.

Question 10:

Using web design as a reference, it is important for them to create a site that can easily generate interest and ease of use. The user interface design of the site plays a vital role in bringing interest and high volume of traffic to it. For a site to be successful it must provide a good user experience to online visitors, any site that has bugs, too difficult to navigate through or use will definitely push traffic away. A good user interface not only increases site usability but also leads to the smooth completion of any task at hand thereby making everything enjoyable and flexible as per the requirements of the user.

ay in here…

About this essay:

If you use part of this page in your own work, you need to provide a citation, as follows:

Essay Sauce, Secure Your Organisation With GDPR: A Guide to Data Protection Practices. Available from:<https://www.essaysauce.com/sample-essays/2018-10-30-1540895063/> [Accessed 13-04-26].

These Sample essays have been submitted to us by students in order to help you with your studies.

* This essay may have been previously published on EssaySauce.com and/or Essay.uk.com at an earlier date than indicated.