Chapter Eight (8): Information Governance and Legal Functions: According to the authors, Smallwood, Kahn, and Murphy, IG is perhaps one of the functional areas that impact legal functions most. Failure to meet them could be literally put an organization out of business or land executives in prison. Privacy, security, records management, information technology (IT), and business management functions are very important. However, the most significant aspect of all of these functions relates to legality and regulatory compliance from a critical perspective.
undefined
For this discussion, identify the industry you will be writing about in your final paper and discuss the regulatory compliance requirements that the company has to meet and the corresponding security, privacy, and records management functions that would need to be enabled for that organization. Remember to cite your sources and critically respond to two other learners.
undefined
Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:
undefined
undefined
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the college Library. Use proper citations and references in your post.
students will take a look at some of the legal areas surrounding governance and technology concerns. Additionally, students examine aspects of record management information management functions.
Textbook: Chapter 8- Information Governance and Legal Functions
undefined
Textbook: Chapter 9 – Information Governance and Records and Information Management Functions
undefined
Md Ajis, A. F., & Hajar Baharin, S. (2019). Dark Data Management as frontier of Information Governance. 2019 IEEE 9th Symposium on Computer Applications & Industrial Electronics (ISCAIE), Computer Applications & Industrial Electronics (ISCAIE), 2019 IEEE 9th Symposium On, 34–37. https://doi.org/10.1109/ISCAIE.2019.8743915
undefined
Tallon, P. P., Ramirez, R. V., & Short, J. E. (2013). The Information Artifact in IT Governance: Toward a Theory of Information Governance. Journal of Management Information Systems, 30(3), 141–178. https://doi.org/10.2753/MIS0742-1222300306
undefined
Griffin, J. G. H. (2014). The future of technological law: The machine state. International Review of Law, Computers & Technology, 28(3), 299–315. https://doi.org/10.1080/13600869.2014.932520
undefined
Vogel, H. S., & Rood, D. K. .(2019). Dealing with subpoena requests for digital data. Journal of Accountancy, 227(3), 1–4. Retrieved from http://eds.a.ebscohost.com/eds/pdfviewer/pdfviewer?vid=17&sid=73312ccd-f875-4af5-9c62-d1adf1d7c39c%40sessionmgr4008
undefined
Zarsky, T. Z. (2014). Social Justice, Social Norms and the Governance of Social Media. Pace Law Review, 35(1), 154–191.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more