Preview

Nt1310 Unit 3 Assignment 1

Better Essays
Open Document
Open Document
1235 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Nt1310 Unit 3 Assignment 1
Edited
SLA Ammendments

Non-exclusivity
Clause 6 on non-exclusivity needs to be addressed. The lack of information here pertaining to the non-exclusivity of the 3 companies involved can be a huge security issue. The data being used here will not be exclusive to only one company, but rather all 3. However, provisions will need to be in place to where the data is shared only between these 3 companies, and not used for any other reason.
Finman would best protect its data by limiting the amount exposed to Datanal and Minertek. The data exposed should only be limited to exactly what is needed to complete the project. Finman should create a data pool that will only be used for the duration of the SLA, and that
…show more content…
Statements such as “highest standards” and “particular precautions” are not clear on how they apply to this specific case. Each company should have specific standards, all agreed upon, on how they will interact and handle the shared data, and communications involved with it. This is one small step in protecting Finman’s patents, copyrights and intellectual …show more content…
The Copyrights and Rights Database Regulations (CRDR) was created in the United Kingdom. Charles Goldblatt reports that “A special breed of protection for databases was implemented in the UK by the Copyright and Rights in Databases Regulations 1997 (“Database Regulations”), following the passage of Council Directive 96/9/EC of 14 March 1996; this directive applies Europe, and required member states to implement their own local law to give effect to the directive for the legal protection of databases.” Hosting the servers in this region would allow the information to be covered under this act. The CRDR provides a fifteen year protection of information for all data located in the databases, and due to the standards set by the SLA, the data collected will be destroyed before the protection of CRDR is complete.
Metrics and Quality The metrics here and are not defined. I would define these metrics in the SLA rather than just say they are defined, which will need to be agreed upon by all 3 parties. The progress can then be judged as time goes by according to these metrics. If at any time Finman feels, and can prove, that Datanal and Mintertek are not meeting the requirements set by these metrics, Finman can cancel the SLA. I would also remove the entire second paragraph in the metrics clause due to its lack of relevance pertaining to the SLA. The quality section can be added to the metrics section, and the

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 8 Assignment 1

    • 1415 Words
    • 6 Pages

    This project used an Atmega644 microcontroller clocked at 20MHz in each of the two functional modules for processing. Memory storage is provided by a standard Secure Digital (SD) card. Xbee modules provide bidirectional wireless communication and we use the TLV5616 DAC chip for generating analog audio. The LM358 dual op amp provides active filtering to the output of the DAC. Music files can be added to the SD card using any computer with a multimedia card reader. Once the base station detects an SD card inserted into the holder, it awaits data requests from the portable module. The portable module requests data when required and feeds these values into the DAC. The DAC output is low-pass filtered by the op amp, which also buffers the DAC output before it reaches the audio output…

    • 1415 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    A good example of refraction of light and reflection of light is a rainbow. Sunlight enters the rain droplet at a specific angle and the rain droplet separates the white light into many different colors. This angle is a fixed measurement between your eye and the sun. What color is refracted depends upon the critical angle, which is the angle the sunlight strikes the back of the rain droplet. Red light bends the least while violet light bends the most all the other colors bend at an angle that is between the two. Each rain droplet reflects all colors at a given point and time, but only one color comes back to your eye, requiring millions of rain droplets to create a rainbow. As the rain droplets fall…

    • 395 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Now, select a virtual switch depending on how you have configured the host. Proceed to the configuration of port properties. Give the port a specific name. I have given the label as ‘VMK’. Enter VLAN ID if there is any or else chose ‘None’. Put a check next to the ‘Virtual SAN traffic’ box and then click ‘Next’. Now start with configuring IPv4 settings for this port. After completing that, click ‘Next’. Click on the finish button to end the configuration for port group creation. Make sure that the group is created. Again a new window will pop up showing the devices created and their respective IP addresses. After confirming that the host is created, repeat this procedure two more times, since we require at least three hosts for configuring VSAN.…

    • 229 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    NT1310 Unit 1 Assignment 1

    • 4837 Words
    • 20 Pages

    In order to get some statistical data about the number of formula 1 crashes and their causes, we randomly picked up 1 race from each year starting from 1960 up till 2013, then extrapolated results to the respective entire year, and then calculated average numbers. Based on those figures we compiled the table below.…

    • 4837 Words
    • 20 Pages
    Good Essays
  • Satisfactory Essays

    a. The time in hours, minutes, and seconds is to be passed to a function named totsec().…

    • 720 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Assignment 1

    • 407 Words
    • 2 Pages

    II. Analysis. The intent for this program is to calculate the square footage of a house with no more than four rooms that are rectangular in shape. In order to do this we will identify each room, input the length (l) and width (w) of each room, multiply the l x w of each room to get the square foot, and add the sum of each room to secure the total square footage of the house.…

    • 407 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I recently had to deal with a problem with the Event Name as: BlueScreen. The Locale ID of the fault can be designated by the numerical value as: 5146. I am a touch apprehensive as to whether such a typical fault has been triggered owing to a virus attack. What should I do to eliminate the fault and ensure that the problem does not occur all over again?…

    • 474 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 3 Assignment 1

    • 2019 Words
    • 9 Pages

    Subnetting IP Addressing • Internet Protocol (IP) • A unique indentifier for a host, or node, on an IP network • 32-bit binary number, usually expressed as 4 “dotted decimal” values. • Each decimal value represents 8 bits, in the range of 0 to 255 Example 140.179.220.200 140 Written in binary form: .179 .220 .200…

    • 2019 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Is the S-video cable (green, blue, red, or yellow) properly secure into FuseBox? (This is the cable that connect from FuseBox to the USB capture card.…

    • 70 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The purpose of this policy is to define standards for connecting to Richman Investments network from any host. These standards have been designed to minimize the potential exposure to Richman Investments from damages which may result from unauthorized use of Richman Investments resources. Damages include intellectual property, the loss of sensitive or company confidential data, damage to critical Richman Investments internal systems, damage to public image, etc.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Good Essays

    An extra layer of authentication for the security of resources by two-step verification. The combination of any two or more veri-fication methods (password, biometrics, trusted device).…

    • 553 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1398 Words
    • 6 Pages

    Assignment: If you are considering the purchase of a smartphone, or already own one, visit the website listed under Resource to learn about the best camera phones, and answer the following questions:…

    • 1398 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    It 244 Final

    • 2332 Words
    • 10 Pages

    Customers trust this organization with highly private personal and financial information. That makes it our responsibly to handle that information with the utmost respect and care. Through the controls and procedures outlined in this policy we can achieve those goals.…

    • 2332 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    I choose the site Webinvestigator.org. This sites advertises that you can have access to the marriage, divorce, birth, and death records of someone. Also you can see their felony records. They can perform background checks, business searches, and phone searches. And they also do neighborhood checks, so you can see if any sex offenders live near the area. And they claim to have information on 90% of US residents.…

    • 529 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ABSs choice of a solution to the data protection and encryption problem is most likely directly related to the penalties that can be enforced against them for non-compliance of the laws. The Federal Trade Commission, state insurance authorities and other federal regulatory agencies have the power to enforce the Gramm-Leach-Bliley (GLB) Act which requires all financial, investment and insurance agencies to inform their customers of their information sharing procedures. The GLB Act also requires these agencies to safeguard their customer’s sensitive data and information. ABSs solution to safeguard their customer’s data and information is directly related to compliance of the GLB Act.…

    • 407 Words
    • 1 Page
    Satisfactory Essays