+1(978)310-4246 credencewriters@gmail.com
  

According to the authors from Chapter 11, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business.  As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations.   
For this discussion, find an example of a security breach that compromised data records at a company in the same industry as you will be using in your final paper. Summarize the breach, discuss the data that was lost, and identify security controls that you would recommend being in place (be certain to remember to cite sources) that could have prevented this breach from occurring. Remember to critical respond appropriately to two other learners for full points.
250 words.INFORMATION
GOVERNANCE

Founded in 1807, John Wiley & Sons is the oldest independent publishing company in
the United States. With offi ces in North America, Europe, Asia, and Australia, Wiley
is globally committed to developing and marketing print and electronic products and
services for our customers’ professional and personal knowledge and understanding.

The Wiley CIO series provides information, tools, and insights to IT executives
and managers. The products in this series cover a wide range of topics that supply
strategic and implementation guidance on the latest technology trends, leadership, and
emerging best practices.

Titles in the Wiley CIO series include:

The Agile Architecture Revolution: How Cloud Computing, REST-Based SOA, and
Mobile Computing Are Changing Enterprise IT by Jason BloombergT

Big Data, Big Analytics: Emerging Business Intelligence and Analytic Trends for Today’s
Businesses by Michael Minelli, Michele Chambers, and Ambiga Dhiraj

The Chief Information Offi cer’s Body of Knowledge: People, Process, and Technology by
Dean Lane

CIO Best Practices: Enabling Strategic Value with Information Technology (Second
Edition) by Joe Stenzel, Randy Betancourt, Gary Cokins, Alyssa Farrell, Bill
Flemming, Michael H. Hugos, Jonathan Hujsak, and Karl Schubert

The CIO Playbook: Strategies and Best Practices for IT Leaders to Deliver Value by
Nicholas R. Colisto

Enterprise Performance Management Done Right: An Operating System for Your
Organization by Ron Dimon

Executive’s Guide to Virtual Worlds: How Avatars Are Transforming Your Business and
Your Brand by Lonnie Bensond

IT Leadership Manual: Roadmap to Becoming a Trusted Business Partner by Alan R. r
Guibord

Managing Electronic Records: Methods, Best Practices, and Technologies by Robert F. s
Smallwood

On Top of the Cloud: How CIOs Leverage New Technologies to Drive Change and Build
Value Across the Enterprise by Hunter Muller

Straight to the Top: CIO Leadership in a Mobile, Social, and Cloud-based World (Second
Edition) by Gregory S. Smith

Strategic IT: Best Practices for Managers and Executives by Arthur M. Langer ands
Lyle Yorks

Transforming IT Culture: How to Use Social Intelligence, Human Factors, and
Collaboration to Create an IT Department That Outperforms by Frank Wanders

Unleashing the Power of IT: Bringing People, Business, and Technology Together by Dan
Roberts

The U.S. Technology Skills Gap: What Every Technology Executive Must Know to Save
America’s Future by Gary J. Beach

Information Governance: Concepts, Strategies and Best Practices by Robert F. Smallwoods

Robert F. Smallwood

INFORMATION
GOVERNANCE

CONCEPTS, STRATEGIES AND

BEST PRACTICES

Cover image: © iStockphoto / IgorZh
Cover design: Wiley

Copyright © 2014 by Robert F. Smallwood. All rights reserved.

Chapter 7 © 2014 by Barclay Blair

Portions of Chapter 8 © 2014 by Randolph Kahn

Published by John Wiley & Sons, Inc., Hoboken, New Jersey.
Published simultaneously in C

  
error: Content is protected !!