Write review on given article - combine the chinese wall


Write review on this article with reference in APA format.

Privacy policy is a statement that declares a party's policy on how it collects, stores, and releases personal information it collects. It informs the client what specific information collected and whether it is kept confidential, shared with partners, or sold to other firms or organizations.

The exact contents of a certain privacy policy will depend upon the applicable law and may need to address requirements across geographical boundaries and legal jurisdicitons ( Halboob & al, 2015).

Therefore, privacy policy controls and counter measures must use to comply with laws and regulations. For instance, Acceptable use policy (AUP) is used to mitigate risk between the organization and its employees. According to Anderson, the Chinese Wall model is used by the intelligence community to describe the proposed mechanism to avoid any conflict of interest and the BMA model is to show the information flows approved by the medical ethic (2010). The Chinese Wall model offers a mix of free choice and allow the concept of separation of duty.

For example, a person can patch a system for any vulnerability but he/she can test the system, but someone else will test the system to see if he/she broke any functionality when the system was patched.

I think It will be a good idea to combine the Chinese Wall model and BMA because both are striving to reach a common goal which is protecting data integrity and ethics.

The evolving of the software and technology prices, differential pricing is economically efficient but increasingly resented. Therefore, the system operator is the one who is controlling the information and desiminate the information when needed. On the other hand, the stakeholder is the one who make sure that the system is efficiently secure and the data is flowing in an ecrypted way without any compromise.

George Loewnstein, points out that people are more sensitive if things suddenly got worse, but not if they get worse gradually (Anderson, 2008). "Whatever you do, work heartily, as for the Lord and not for men." Colossians 3:23. Everything we do has to be done with integrity and willingly.

References

Halboob, Waleed, Ramlan Mahmod, Nur Izura Udzir, and Mohd Taufik Abdullah. 2015. Privacy policies for computer forensics. Computer Fraud & Security 2015 (8): 9-13. Anderson, R.J. (2008).

Security Engineering: A Guide to Building Dependable Distributed Systems. Hoboken, NJ: Wiley. ISBN: 9780470068526. BT

Solution Preview :

Prepared by a verified Expert
Computer Engineering: Write review on given article - combine the chinese wall
Reference No:- TGS02773078

Now Priced at $10 (50% Discount)

Recommended (96%)

Rated (4.8/5)