Information governance (IG) is perhaps one of the functional ar
Information governance (IG) is perhaps one of the functional areas that has a significant impact on legal functions. Failure to meet legal and regulatory requirements could literally put an organization out of business or land executives in prison. Privacy, security, records management, information technology (IT), and business management functions are very important. However, the most significant aspect of all these functions relates to legality and regulatory compliance from a critical perspective.
For this discussion, identify the industry you will be writing about in your final project and discuss the regulatory compliance requirements the company must meet and the corresponding security, privacy, and records management functions that would need to be enabled for that organization. Remember to cite your sources and critically respond to two other learners.
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
Week 2
Portfolio Project
Introduction
Ankitha Pagadala
Introduction
I have been selected as the Chief Information Governance Information Officer (CIGO) at Apple Company to develop a policy to promote secure data transmission and protect the enterprise and its customers from the vulnerable to cyber-attacks. Apple Company stores transmit sensitive information and handle large sums of money, which are at risk of increasingly sophisticated cyber-attacks (Kangyi, 2021). The damage that can be caused, both in terms of financial losses and damage to reputation, means that it is vital that companies take appropriate measures to protect their information.
Like many other companies in the electronic industry that hire and endorse the position of a CIGO, the company found it fit to hire me to assess the cyber-attack vulnerability and provide recommendations to the necessary authorities. One key role is that of the Chief Information Governance Officer (CIGO). As a CIGO, I am responsible for ensuring that all the processes are secure, and that the organization complies with relevant legislation when ensuring the privacy of its data system. The other significant role is to ensure that the company's community is protected from cyber-attacks. It is also in the customers' interests that the company takes appropriate action to protect its information.
Based on the assessment provided by the executive, the company faces many technical and managerial challenges that create vulnerability to its sensitive data. One challenge is that the company still stores much of its data in hard copy. Information stored in hard copy is prone to theft, misplacement, and tearing, thus erasing critical information that can use during decision-making. Although the company has started to collect its data in electronic format, they lack a technology that fully protects the information. For instance, storing data in the file shares create security vulnerability since the technology is not compatible with advancing Firewall software,
The other challenge is storing information in a relational database without policies and systems to monitor the administration. The duplication issue can overwhelm the system, leading to the database's crash and losing data without any chance of recovery (Mullon & Ngoepe, 2019). In business, managers always need to plan for the future. The most successful companies plan, set goals and take responsibility for achieving those goals. However, some businesses do not plan. A business that does not have policies to address the management of data, business, or customers, is at a disadvantage.
Therefore, the main challenge of handling customers and data and leveraging social media with considering the legal issues or adaptive policies that govern other organizations is risky. Apple Company will likely lose considerable finances due to legal or financial penalties from the oversight authorities. The other main challenge is that the reputation of Apple Company will be tinted.
Establishing the policies based on the established legal regulations will enable Apple Company to know the firm or a person to consult during a data breach. The enterprise will not be able to respond to threats during a data breach. Apple Company is at risk of losing customers upon the realization that the company does not well safeguard its data. The business will risk losing employees who are not given the platform to advance their technical knowledge like other big enterprises.
In today's business environment, companies must respond to changes in laws, technology, customer expectations, and competition (Agrawal & Alharbe, 2019). Business leaders and managers should create plans that prepare for "what if?" situations. The managers of a company that does not have policies to address the management of data, business, or customers are at risk of losing customers and money. There are several ways in which Apple Company can protect the information that they store. For example, they may encrypt data before transferring or store it only on computers with strong firewalls. Companies can also take other steps to protect themselves. These include having clear guidelines and procedures for detecting and dealing with security.
References
Agrawal, A., & Alharbe, N. R. (2019). Need and importance of healthcare data integrity. International Journal of Engineering and Technology (IJET), 11(4), 854-859.
Kangyi, W. (2021, June). Analysis of Financial Policy at Apple Company in 2020. In 2021 International Conference on Enterprise Management and Economic Development (ICEMED 2021) (pp. 150-153). Atlantis Press.
Mullon, P. A., & Ngoepe, M. (2019). An integrated framework to elevate information governance to a national level in South Africa. Records Management Journal.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.