• Home
  • Blog
  • CIS 512 Strayer University Email Protection Discussion

CIS 512 Strayer University Email Protection Discussion

0 comments

Some organizations receive confidential e-mails and take specific steps to protect and label these e-mails.

Go to Basic Search: Strayer University Online Library to locate and integrate at least two quality, academic resources (in addition to your textbook) on the protection and labeling of confidential emails. You may also use government websites, such as Cybersecurity from the National Institute of Standards and Technology.

Please respond to the following in a post of at least 200 words:

  • Describe the methods organizations use to protect and label confidential e-mails.
  • Identify and describe any laws, such as the General Data Protection Regulation (GDPR), or legal requirements, such as eDiscovery, by which organizations may be required to abide.
  • Provide full citations and references, formatted according to Strayer Writing Standards.
    • For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

In 60 to 75 words, please respond to Student’s post below:

Hello Class and Professor. Well just off the top of my head methods that organizations use to protect and label confidential emails would be encryption. The encryption of synchronous data along with certificates. Generation of public and private keys to be encrypted at the beginning and decrypted with the recipient.

Public key cryptography allows someone to send their public key in an open, insecure channel. Having a friend’s public key allows you to encrypt messages to them. Your private key is used to decrypt messages encrypted to you.

The GDPR defines several roles that are responsible for ensuring compliance so that would mean that would be a legal requirement to have someone in charge or assigned to those roles. Data controller, data processor and the data protection officer. The data controller defines how personal data is processed and the purposes for which it is processed. The controller is also responsible for making sure that outside contractors comply.

Under GDPR, you need to know how your vendors operate including their security framework and how they manage data. Without that knowledge, you don’t know the risk they present.

Sanjay Sharma. Data Privacy and GDPR Handbook. Wiley; 2020. Accessed May 11, 2021. https://search-ebscohost-com.libdatab.strayer.edu/…

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}