Question
Write a paper about law, ethics, and security plan and database management system. Articulate the relevant legal and ethical standards that need to be considered
Write a paper about law, ethics, and security plan and database management system. Articulate the relevant legal and ethical standards that need to be considered in your solution design and in future implementation. Determine the best practices in design, data use, and storage to ensure legal compliance. The regulations in place and the best practices for aligning operations will likely change depending on the type of industry in which your company resides. Support your conclusions with research support. Determine best practices in design, data use, and storage to ensure ethical operation of your company. These best practices will likely change depending on the industry in which your company resides. Support your conclusions with research support. In consideration of the type of organization you selected (wild wood apartment), the data used, and your consideration of legal and ethical standards, discuss the security needs of your DBMS solution. Considering the group/department for which you constructed your enterprise data model (milestone four please see the attached document), discuss the differences in security needs at this level in comparison with those of the company as a whole. Given the comparisons and discussions above, recommend a comprehensive but high-level (pertaining to the solution as a whole rather than the particular department) security management plan for your design that will align to organizational needs. Complete your final project by submitting your database management system. This database management system will include the material development for the four final project milestones and the security plan and should address the feedback received in response to those submissions. The final project should be a complete, polished artifact containing all of the crucial elements of the final project. All this has to be discoursed: organization:
problem organization:
departments and operations analysis and design:
conceptual model analysis and design:
logical model analysis and design: physical design DBMS:
research DBMS:
analysis DBMS:
recommendation DBMS:
hardware, software data model:
enterprise data model data model:
operating rules data model:
rule reflection law, ethics, and security:
standards law, ethics, and security:
legal compliance law, ethics, and security:
ethical practices law, ethics, and security:
security needs of solution law, ethics, and security:
database security plan articulation of response note:
Step by Step Solution
3.33 Rating (159 Votes )
There are 3 Steps involved in it
Step: 1
Introduction The security environment is consists of three subsectionsAssumptions threats and security policies of the organization Security consultants help the projectdevelopment team and work with ...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started