Describe how an entity or individuals outside and within organisations can have legitimate power to access corporate data and, therefore, influence how it is managed.
What will be an ideal response?
For example, some governments have established laws that provide them with unrestricted
access to corporate or individual private data. The USA Patriot Act 2001, established as a
direct response to the terrorist attacks of September 11 th , forces US companies with local or
foreign servers or companies with data controlled by a US company, to release data on
individuals – even if their local laws (for example EU) prevent them from doing so. Since a
US company and its subsidiaries operating in Europe are still subject to the U.S. Patriot Act,
European customers that use their services are exposing themselves to U.S. laws. The US and
EU Swiss Safe Harbour framework was established to avoid this situation, however , there
have been reports from some US companies operating in Europe that have admitted that this
has proved ineffective.
You might also like to view...
Match the following math symbols with their meanings?
I. Asterisk (*) II. Plus (+) III. Hyphen (-) IV. Caret (^) V. Diagonal slash (/) A. Exponentiation B. Subtraction C. Addition D. Division E. Multiply
In each example, when would you use a hash and when would you use an array?
a. Counting the number of occurrences of an IP address in a log file. b. Generating a list of users who are over disk quota for use in a report.