News‎ > ‎

10IPT: Privacy Controls Case Study

posted Aug 11, 2011, 5:44 PM by Unknown user   [ updated Aug 11, 2011, 6:40 PM by Eddie Woo ]
Today, the marking guidelines and sample answers have been pasted straight into this news post - so that you don't have to deal with the lag that comes up when all 24 of you open the Google Doc simultaneously. A mark out of 13 please!

Marking Guidelines & Sample Answers 
(by Thanya the Awesome One)
 
(a)
Criteria Marks
Gives the main features of TWO social and ethical issues and identifies at least THREE related implications (positive and negative)

5

Gives the main features of TWO social and ethical issues and identifies: THREE (only positive OR negative) implications OR, TWO related implications (one positive and one negative)

3-4

Gives the main features of ONE social and ethical issues and identifies ONE related implication

1-2



Sample Answer
Privacy (if you did not get this one, shame on you) -
Data Security -
Changing Nature of Work -
Data Ownership & Control -

(b)
Criteria Marks
Gives the main features of THREE project management techniques and argues for or against the use of each (note: good responses will determine which project management techniques are significantly better than others, + 1 mark if they do!)

5

Gives the main features of TWO project management techniques and argues for or against the use of each

3-4

Gives the main features of TWO project management techniques unsubstanially argues for or against its use.

2

Gives the main features of ONE project management technique and argues for or against its use

1



Sample Answer
Conflict Resolution and Negotiation Skills, used obscurely by Google when handling this issue of privacy invasion with their users. The following techniques were employed as a resolution to this issue.
  • Project Plan; what the article outlines in the formation of a project plan by Google specific to solving the issue of privacy invasion, the below techniques fall from this move by Google
    • For: provides a clear idea and thought process as to what needs to be done and why
    • Against: ??
  • Project Leader, Alma Whitten as been appointed and has been set the goal of increasing staffingin various fields (enigeering and product management).
    • For: Has great expertise and therefore can be confident in her approach and lead the team well
    • Against: She has already been head of privacy for two years and system failures still occurred, recommended is a couple of project leaders.
  • Staff Re-training, Google’s staff are being re-educated in how to handle and use sensitive data
    • For: All of Google’s staff will be explicitly told what and what not to do and will bring them up to date on the terms and condition of their occupation. Re-training everyone means there is no excuse for error and provides a common playing field
    • Against: Staff re-training is costly and will take time out of their work hours. The new compulsory information security program is an additional cost too and may not be required for every individual but must take place to showcase Google’s efforts to sidetrack another privacy invasion as outlined in the article.
  • A project register, all data handled and viewed must be logged so the project manager forms an explicit image of what data  is handled and provides evidence of manipulation and use to system managers,
    • For: everything done is open and transparent for investigation thus providing and incentive to not use data maliciously.
    • Against: an extra process for staff, must be manually logged and is not an option with good feasibility.


(c)
Criteria Marks
Provides atleast TWO security measures taken and outlines why this is effective in relation to employee regulation

3

Provides ONE security measures taken and outlines why this is effective in relation to employee regulation

2

Gives ONE or TWO security measure but they are not related to employees.

1



Sample Answer
- Signing a code of contract - legally binding,consequences of breaking contract is severe
- Undertaking a new security awareness program - reiterates secuirty and privacy procedures
- Enhanced training for enigeers - handle sensitive data, know what to design (the specifics)
- Orientation training on Google’s morals and principles Marking Guidelines and Sample Answers:
 
 
Comments