Discuss a data security methods


Discuss the below:

• Mobile and cloud based solutions should be investigated. Furthermore, data secuirty also needs to be further investigated, which includes data ownership (by headspace, the young person, the ED, etc), data security in the cloud and who has access permission, and to what level of access, etc.

Outputs should include the following:

o An updated Project Vision.

o Non-Functional Requirements - a System Wide Requirement Specification.

This sets out the critical system qualities, system interfaces, user interface requirements, and system constraints.

o Validation, and project management issues need to be considered in the response to this assessment item.

Review the attachment:

Attachment:- What a mental health policy.docx

Request for Solution File

Ask an Expert for Answer!!
Other Subject: Discuss a data security methods
Reference No:- TGS01795926

Expected delivery within 24 Hours