Hello pleaase see scenario below: Scenario...

1 answer below »
Hello pleaase see scenario below:

Scenario

Fit-vantageTechnologiesisaquicklygrowingcompetitorinthepersonalfitness-trackingindustry.Asthecompanygetsclosertolaunchingitsnewestdevice,theFlamewatch,theFit-vantageexecutiveshavebeenapproachedbyHeliosHealthInsuranceInc.toformapartnership.ThispartnershipproposesaprogramallowingHeliossubscriberstopurchaseaFit-vantageFlameatadiscountinexchangeforaccesstotheanonymousdatacollectedfromparticipatingcustomers.

AninternalstakeholderboardhasbeenformedtodeterminewhetherthepartnershipisinthebestinterestofFit-vantage.Discussionsatthestakeholdermeetingshaveraisedthefollowingquestionsforconsideration:

  • What are the concerns around the privacy of customer data, including the data of Helios subscribers and Flame owners who are not part of the Helios program?
  • As health insurance companies are considered covered entities under HIPAA, what new legal compliance requirements does this partnership require?
  • How profitable will this partnership be?What is the likely effect on the company’s value to stockholders?
  • What effects will this partnership have on the current customer base?
  • How would this partnership align with Fit-vantage’s mission and core values?

Inthisscenario,youwillassumetheroleofanexecutive-levelsecurityconsultantwiththeprimaryresponsibilityofadvisingseniormanagementincybersecuritymatters.Sinceyouareamemberoftheinternalstakeholderboardfortheproposedpartnership,yourinputisessential.Acustomersurveyandfinancialoutlookhavebeenpreparedtohelpinformyourrecommendations.

Tocompletethisproject,reviewthefollowingdocuments,whichhavebeenprovidedbyyourinstructor:

(attachment below)

  • Fit-vantage company profile, which contains the mission statement, core values, and draft of the Fit-vantage privacy statement
  • Financial outlook based on the Helios partnership
  • Summary of the HIPAA Privacy Rule

This scenario places you back in the role of an executive-level security consultant for the organization.The scenario will provide you additional details surrounding the organization’s decisions on the proposal you addressed in Project One.

To complete this task, you will prepare alegal and ethical recommendation brieffor the internal stakeholder board in order to identify an approach to meeting the privacy protection, data security, and ethical needs of the scenario.

Write a brief memorandum to the internal leadership board outlining your recommendations for meeting the needs of the scenario.

Be sure to address thecritical elementslisted below.

  1. Recommend an approach to protectingdata privacy. Support your recommendation with evidence from applicable laws or the corporate mission and values.
  2. Recommend an approach to ensuringdata security. Support your recommendation with evidence from applicable laws or the corporate mission and values.
  3. Describe howethical considerationsabout data use influenced your recommendations for security-enhancing safeguards.
Answered 2 days AfterApr 07, 2022

Solution

Rudrakshi answered on Apr 09 2022
14 Votes
Running Head: COMPUTER NETWORK SECURITY                    1
COMPUTER NETWORK SECURITY                             2
COMPUTER NETWORK SECURITY
Table of Contents
I. Recommendation for the Data Privacy    3
II. Recommendation of Ensuring Data Security    3
III. Ethical Considerations about the Data    4
References    5
I. Recommendation for the Data Privacy
As per Yang, Xiong and Ren (2020), data portability is a critical need for many contemporary information technology firms. Transfe
ing data across multiple contexts and software programs is refe
ed to as "data mobility." Most of the time, file sharing refers to the capacity to send information between its data centers and the public cloud, as well as between multiple cloud services (cloud providers).
Cloud service companies often use proprietary data formats, and storage engines to differentiate themselves from their competitors. Consequently, it becomes difficult to migrate data through one service to some other, as well as creating manufacturer lock in. Corporations are actively searching for standardized methods of collecting and managing data in order to make it transferable among cloud environments.
II. Recommendation of Ensuring Data Security
The fundamentals of data security are often traced back to the CIA's triad. Data...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here