Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Introduction of the mail system of UAE

Category: Computer Sciences Paper Type: Case Study Writing Reference: APA Words: 1220

The aim of this paper is to provide brief overview regarding the mail system of UAE. In the paper the things like cyber crime and other important rules and regulations which are important for successive use mail are discussed. Along with cyber security the paper have discussed how the companies should gather the data ethically. Today many organizations collect data of customers so that they can provide better customer services. However it is the duty of the organizations to consider ethics while gathering customer information.

Explain a minimum of 3 (any) appropriate use of telephone & email system?

If a multinational corporation wanted to establish a telephone as well as email hotline for its employees to report wrongdoing within the company, along with some of those offices resided in the UAE. Then that organization better familiarize itself with the UAE data protection laws. Telephone and email system is very useful in the modern era. Here we explain the appropriate use of telephone and email system. Telephone is used for communicating with one another. It’s a useful wireless device that does not matter in which country you are living you can communicate. This is the same as for email use can send business-related emails or personal and confidential document share with the help of emails.

Explain a minimum of 3 illegal use of the system.  Answers should be associated with UAE Cyber Law.

Against cybercrimes, the UAE has clear & strict law with several penalties. According to the law, no five which is issued in 2012 by the president of UAE include the range of penalties that depend on the type as well as the cruelty of offence. The criminal should stay in jail for five years with a fine of Dh 3 million; this is the severe penalty (financierworldwide, 2013 ).

Case 2

Describe what personal information is collected.

As the online website that sell the antiques. For the privacy factor, personal information is collected. Such as the visitor name their choice. What type of antique piece they like. First name, date of birth, username and preferred pronoun is used.

 Describe how the company will use this information.

The company used this information for the purpose of the success of the company. Improve the customer experience with the help of information that is collected from the customers. With the help of information refining the marketing strategy according to the information that is collected. As a means of securing more sensitive information some business even uses consumer data.

Describe how this information will be transferred to third party companies.

The personal information of the customer will not share to the organizations in which corporation, the public organization is included. To any mailing lists, we don’t sell and communicate the information with others. If the law or a court order compels us this is the only expectation. With government agencies, we will share the information.

Provide instructions on how users can modify or delete their personal information.

This is the customer authority that they can change or update personal information at any time. The customer can access the information that is collected by the company.

Provide instructions on how users can opt-out of future communications.

From your computer to retrieve your personal information we don’t use cookies. For the statistical purpose, this information is used as well as find the pages that are most visited. Future communication is done through the website where anyone can communicate with the admin.

Finally, websites that collect sensitive personal information, such as bank details and credit card

Te sensitive personal information that is collected from the websites like your bank details as well as a credit card. These are quite sensitive these can be hacked, so a lot of privacy is required.

Case 3

 As an information security consultant, what changes would you make to the (Arabic) existing security policy so that security is improved after employees are terminated? Explain (not list) at least (any) 6 actions. The answer should be associated with UAE cyber Law  

Arabtic company security is not secure. So the security consultant should work more hard regarding the security. As according to the scenarios, that is described one of the two clients leave the Arabic and join the Wasata. But, the profiles of both the clients are removed from the company database. It means that there is no proper security for the database of Arabic Company.  So after the termination of the clients the company should change the criteria of the access to the database. According to the UAE cyber law the person who is caught while gaining access to a website or a system without the authorization permission than the criminal has fine of Dh50,000, but this can be increased to 1 million Dh if the personal data is stolen or deleted from the website. To invade someone else’s privacy those caught by using technology in which include the publishing news, copying photos and for six months jail and the fines among Dh150,000 to Dh300,000. For the numbers of other cybercrimes in UAE, the law stipulates several penalties such as religion insulting along with related rituals, official’s public slandering, and official documents forging electronic as well as acquiring the passwords or pin codes (Debusmann, 2017).

Case 4

Based on this scenario list, what cyber threats to intellectual property that social network sites can pose? Give at least five examples.

The way to interact with people and friend’s social networking has changed. But there is the five security threat that is usually faced. One of them is having your identity stolen the thieves collected the personal data through the sites of social media. If you have a proper privacy setting on your account by using the social information the hackers can hack the account. And also because of the revealing location, the information can be leaked easily so avoid using this information. Shortened links, Threats of advanced persistent, Botnets are the examples.

How does computer technology threaten the privacy of the data to social network users?

Because of the following reason the social networking sites become more popular, the privacy, as well as security issues, should be examined through these networking sites. The personal contacts of network a large number of people use the same database that is the risk from hackers. To reduce these threats social networking sites take precautionary measures, on social networking sites due to the personal nature of the data, the user faces the privacy issues.

Discuss other unauthorized use of an intellectual property that may lead to legal liability?

The issue of unauthorized use of the intellectual property as well as for innovation is on the international environment it’s affected, transfer of technology, as well as the development of economic.  On developing countries, it considers the economic factor, as well as this also influencing the investment of foreign direct as well as the transfer of technology.

Case 5

For a university IT organizational code of conduct you are required to develop:

IT staff will receive communications and training.

To annually review as well as affirm IT staff will be required.

 As challenges are observed IT leadership will provide guidance. (MANSFIELD, 2018).

References of the mail system of UAE

Debusmann, J. B. (2017, October 1). What UAE law says about cybercrimes, penalties. Retrieved from https://www.khaleejtimes.com/legalview/what-the-law-in-the-uae-says-about-cybercrimes-penalties-

financierworldwide. ( 2013 , November). Cyber security and data protection in the Middle East. Retrieved from https://www.financierworldwide.com/cyber-security-and-data-protection-in-the-middle-east#.XMQW9OhKjIU

MANSFIELD, E. (2018). Unauthorized Use of Intellectual Property: Effects on Investment, Technology Transfer, and Innovation. Retrieved from https://www.nap.edu/read/2054/chapter/9

 


Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Top Class Engineers

ONLINE

Top Class Engineers

1218 Orders Completed

Quality Assignments

ONLINE

Quality Assignments

0 Orders Completed

Coursework Assignment Help

ONLINE

Coursework Assignment Help

63 Orders Completed