Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

This Discussion concerns digital content protection in the context of cyber secu

ID: 3878696 • Letter: T

Question

This Discussion concerns digital content protection in the context of cyber security compliance.

Choose one organisation that you have worked for (or one that you are familiar with).

Identify the digital content that needs protection for this organisation, and identify the mechanisms to protect this digital content. Include:

For each type of digital content, determine whether you recommend using patents, trade secrets or other mechanisms to protect it.

Are these mechanisms sufficient?

If some digital content items are distributed to customers, how can you protect your rights so that your digital content is not re-sold by your customers to others? What kind of techniques will you use and how effective are they?

Use examples to support your arguments.

Max 500 words

Explanation / Answer

I worked for Microsoft and am familiar with Amazon Web Services (AWS).

1) The digital content that needed protection for this organisation are:

In general, any information, ideas, data, test results including negative test results, plans, intents need to be protect.

1) Digital entertainment content.
2) Personal information.
3) Business information.
4) Web applications.
5) Web application data.

2) The mechanisms to protect this digital content are:

1) We customised information protection policies by classifying data in our organisation and applied controls and policies based on information sensitivity.
2) We increased digital privacy and safety by accelerating security compliance with agencies and regulations, including GDPR, to keep data safe.
3) All data is stored in highly secure "AWS data centers" (Cloud) - Even any customer companies who has AWS account can store their data securely on AWS cloud.
4) The organization will have mor econtrol and incresed privacy of the data been accessed.

7) Customer companies' and end users' credit card details - To safeguard credit card details entered on the websites, organizations used HTTPS or SSL URLs to securely encrypt the details, save in the databases and even process the transactions.

Yes, We recommend appropriate patents, trade secrets and/or other mechanisms to protect the data respectively based on the classification, visbility, accessibility and usages of the data.

The information must be secret and confidential. The organization used reasonable efforts (security measures) to protect the secrets. We followed obligation of confidence to maintain the information as confidential signing contract, NDA, consulting term.

Yes, these mechanisms are sufficient provided properly implemented, followed and used by the organizations, its employees, any custmers or users accessing the data as per the policy agreements.

5) How can you protect your rights so that your digital content is not re-sold by your customers to others? What kind of techniques will you use?

The rights of the Digital content can be protected by using a Copyright legal protection measure, software license or license agreement which is a legal contract, using proprietary software, EULA (End-User Licese Agreement), patents, trademarks thus adhering to the intellectual property laws.

Passing or publishing strict anti-piracy laws, using appropriate technologies to sramble and encrypt content, using digital rights management technology that physically prevents copying, by committing to consumer education and creating anti-piracy audios, videos, documents shown to the public.

7) How effective are they?

They are effective to some extent as it only used to be dificult and expensive to copy data (digital content) in the past. However, with the latest digital technology it is easy to reproduce copies with no loss in the quality ofthe original data. It has become easy, simple and inexpensive to pirate software.

8) Examples to support:

1) Proprietary software has restrictions and are effective in the way that it has restrictions on its use that adhere copyright, patents, or license agreements.
3) Selling Demoware which are trial version of software for the users to use them for a certain period of time and are bought for further use by only paying.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote