The aim of this paper is to provide brief
overview regarding the mail system of UAE. In the paper the things like cyber
crime and other important rules and regulations which are important for
successive use mail are discussed. Along with cyber security the paper have
discussed how the companies should gather the data ethically. Today many organizations
collect data of customers so that they can provide better customer services.
However it is the duty of the organizations to consider ethics while gathering
customer information.
Explain a minimum of 3 (any)
appropriate use of telephone & email system?
If a multinational corporation wanted to establish a
telephone as well as email hotline for its employees to report wrongdoing
within the company, along with some of those offices resided in the UAE. Then
that organization better familiarize itself with the UAE data protection laws. Telephone and email system is very
useful in the modern era. Here we explain the appropriate use of telephone and
email system. Telephone is used for communicating with one another. It’s a
useful wireless device that does not matter in which country you are living you
can communicate. This is the same as for email use can send business-related
emails or personal and confidential document share with the help of emails.
Explain a minimum of 3 illegal use of
the system. Answers should be associated with UAE Cyber Law.
Against cybercrimes, the UAE has clear &
strict law with several penalties. According to the law, no five which is
issued in 2012 by the president of UAE include the range of penalties that
depend on the type as well as the cruelty of offence. The criminal should stay
in jail for five years with a fine of Dh 3 million; this is the severe penalty (financierworldwide, 2013 ).
Case
2
Describe what personal information is collected.
As the online website that sell the antiques. For the privacy factor,
personal information is collected. Such as the visitor name their choice. What
type of antique piece they like. First name, date of birth, username and
preferred pronoun is used.
Describe how the company will use this information.
The company used this information for the purpose of the success of the company.
Improve the customer experience with the help of information that is collected
from the customers. With the help of information refining the marketing
strategy according to the information that is collected. As a means of securing
more sensitive information some business even uses consumer data.
Describe how this information will be transferred to third party companies.
The personal information of the customer will
not share to the organizations in which corporation, the public organization is
included. To any mailing lists, we don’t sell and communicate the information
with others. If the law or a court order compels us this is the only
expectation. With government agencies, we will share the information.
Provide instructions on how users can
modify or delete their personal information.
This is the customer authority that they can change or update personal
information at any time. The customer can access the information that is
collected by the company.
Provide instructions on how users can
opt-out of future communications.
From your computer to retrieve your personal information we don’t use
cookies. For the statistical purpose, this information is used as well as find
the pages that are most visited. Future communication is done through the
website where anyone can communicate with the admin.
Finally, websites that collect
sensitive personal information, such as bank details and credit card
Te sensitive personal information that is
collected from the websites like your bank details as well as a credit card.
These are quite sensitive these can be hacked, so a lot of privacy is required.
Case
3
As an information security consultant,
what changes would you make to the (Arabic)
existing security policy so that security is improved after employees are terminated? Explain (not list) at least
(any) 6 actions. The answer should be associated with UAE cyber Law
Arabtic company security is not secure. So
the security consultant should work more hard regarding the security. As
according to the scenarios, that is described one of the two clients leave the
Arabic and join the Wasata. But, the profiles of both the clients are removed
from the company database. It means that there is no proper security for the
database of Arabic Company. So after the
termination of the clients the company should change the criteria of the access
to the database. According to the UAE cyber law the person who is caught while
gaining access to a website or a system without the authorization permission
than the criminal has fine of Dh50,000, but this can be increased to 1 million
Dh if the personal data is stolen or deleted from the website. To invade
someone else’s privacy those caught by using technology in which include the
publishing news, copying photos and for six months jail and the fines among
Dh150,000 to Dh300,000. For the numbers of other cybercrimes in UAE, the law
stipulates several penalties such as religion insulting along with related
rituals, official’s public slandering, and official documents forging
electronic as well as acquiring the passwords or pin codes (Debusmann, 2017).
Case
4
Based on this scenario list, what
cyber threats to intellectual property that social network sites can pose? Give
at least five examples.
The way to interact with people and friend’s
social networking has changed. But there is the five security threat that is
usually faced. One of them is having your identity stolen the thieves collected
the personal data through the sites of social media. If you have a proper
privacy setting on your account by using the social information the hackers can
hack the account. And also because of the revealing location, the information
can be leaked easily so avoid using this information. Shortened links, Threats of
advanced persistent, Botnets are the examples.
How does computer technology threaten
the privacy of the data to social network users?
Because of the following reason the social
networking sites become more popular, the privacy, as well as security issues,
should be examined through these networking sites. The personal contacts of
network a large number of people use the same database that is the risk from
hackers. To reduce these threats social networking sites take precautionary measures,
on social networking sites due to the personal nature of the data, the user
faces the privacy issues.
Discuss other unauthorized use of an intellectual
property that may lead to legal liability?
The issue of unauthorized use of the intellectual
property as well as for innovation is on the international environment it’s
affected, transfer of technology, as well as the development of economic. On developing countries, it considers the
economic factor, as well as this also influencing the investment of foreign
direct as well as the transfer of technology.
Case
5
For a university IT organizational code of
conduct you are required to develop:
IT staff will receive communications and
training.
To annually review as well as affirm
IT staff will be required.
As challenges are observed IT
leadership will provide guidance. (MANSFIELD, 2018).
References
of the mail system of UAE