Chief Data Officer

Review the following websites and in 80 words or more discuss and answer the following:

What involvement would a CDO have with respect to the organization’s data classification strategy and schemes (i.e., classifying data such as Public, Restricted, Confidential, etc?

 https://www.forbes.com/sites/ciocentral/2018/01/29/the-chief-data-officer-dilemma/#3ec18ece3896 

 https://www.cio.com/article/3234884/what-is-a-chief-data-officer.html 

Project Assignment

 

Write a 6-8 page paper (deliverable length does not include the title and reference pages)

  • What is the basis for the protection of freedom of expression in the United States, and what types of expression are not protected under the law?
  • What are some key federal laws that affect online freedom of expression, and how do they impact organizations?
  • What important freedom of expression issues relate to the use of information technology?

Provide three articles to substantiate the above three questions.

Using the APA format provide a citation for each of the articles you read

Suggestion: Use a search engine (Google) and keywords

Reflective writting Topic related to “Decision Mkg/Essent Bus Comm “

question 2. Final Reflective writting (approximately 500 words).

What are some assumptions and expectations you have about this Decision Mkg/Essent Bus Comm 

How will you engage in the process for Content Discussions and Weekly Logs?

What questions do you have about the Communication Audit Project?  

What is your understanding of the Virtuous Business Model, and how do you plan on applying it to your learning?

What has been your previous experience doing research?

follow check below link to know how to write reflective writting

http://www2.port.ac.uk/media/contacts-and-departments/student-support-services/ask/downloads/Reflective-writing

password recommendations

Learn About creating good password security.

An IT Security consultant has made three primary recommendations regarding passwords:

  1. Prohibit guessable passwords
    • such as common names, real words, numbers only
    • require special characters and a mix of caps, lower case and numbers in passwords
  2. Reauthenticate before changing passwords
    • user must enter old pw before creating new one
  3. Make authenticators unforgeable 
    • do not allow email or user ID as password

Using WORD, write a brief paper of 300 words explaining each of these security recommendations.  Do you agree or disagree with these recommendations. Would you change, add or delete any of these?  Add additional criteria as you see necessary.