After reading the information presented in this module and other sources, write a one-page paper that outlines five recommendations for improving the privacy of e-mail in an organization. Your recommendations should also highlight ways that minimize or eliminate corporate data leakage. 2. After reading the information presented in this module and other sources, write a one-page paper that describes GDPR. Describe how businesses may benefit from this compliance. Research three companies that have been sued by the European Union. Which privacy issues were violated by each company? 3. The admissions office of Southern State University needs a simple and easy-to-follow Web policy document to send to its incoming freshmen. The document should tell students how to behave while on the Web. After reading the information presented in this module and other sources, create a document that includes a 10-item bulleted list highlighting the key issues of which incoming students should be aware. 4. An oil company in central Texas with more than 2,000 employees needs a document regarding green computing to send to all its key employees. After reading the information presented in this module and other sources, create a one-page document that includes an eight-item bulleted list highlighting the key issues of which all division managers should be aware. Give three examples of information technologies that can play a role in this green computing implementation. 5 . Southern Tech, a major distributor of electronic devices, needs your advice. With more than 1,500 employees who use tablets and smartphones to perform their jobs, the company needs a document highlighting key health-related issues, which it will distribute to its employees to improve efficiency and reduce work-related injuries. After reading the information presented in this module and other sources, create a one-page document that includes a five-item bulleted list highlighting key health-related issues of which employees need to be aware. Why could tablets and smartphones potentially create more work-related injuries than desktop computers? 6. An Internet company in Northern California is receiving frequent requests from employees who want to telecommute. The company’s CTO wants to be flexible and accommodate as many employees as possible. At the same time, the CTO wants to achieve productivity goals and keep to a minimum any legal issues that may arise from this new work alternative. After reading the information presented in this module and other sources, create a one-page document that includes three guidelines that telecommuters need to follow and three guidelines that the company needs to follow to achieve both personal and organizational objectives. What are three examples of information technologies that could help this company monitor these telecommuters

Fundamentals of Information Systems
9th Edition
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Ralph Stair, George Reynolds
Chapter10: Ethical, Legal, And Social Issues Of Information Systems
Section: Chapter Questions
Problem 2CE
icon
Related questions
Question
1. After reading the information presented in this module and other sources, write a one-page paper that outlines five recommendations for improving the privacy of e-mail in an organization. Your recommendations should also highlight ways that minimize or eliminate corporate data leakage. 2. After reading the information presented in this module and other sources, write a one-page paper that describes GDPR. Describe how businesses may benefit from this compliance. Research three companies that have been sued by the European Union. Which privacy issues were violated by each company? 3. The admissions office of Southern State University needs a simple and easy-to-follow Web policy document to send to its incoming freshmen. The document should tell students how to behave while on the Web. After reading the information presented in this module and other sources, create a document that includes a 10-item bulleted list highlighting the key issues of which incoming students should be aware. 4. An oil company in central Texas with more than 2,000 employees needs a document regarding green computing to send to all its key employees. After reading the information presented in this module and other sources, create a one-page document that includes an eight-item bulleted list highlighting the key issues of which all division managers should be aware. Give three examples of information technologies that can play a role in this green computing implementation. 5 . Southern Tech, a major distributor of electronic devices, needs your advice. With more than 1,500 employees who use tablets and smartphones to perform their jobs, the company needs a document highlighting key health-related issues, which it will distribute to its employees to improve efficiency and reduce work-related injuries. After reading the information presented in this module and other sources, create a one-page document that includes a five-item bulleted list highlighting key health-related issues of which employees need to be aware. Why could tablets and smartphones potentially create more work-related injuries than desktop computers? 6. An Internet company in Northern California is receiving frequent requests from employees who want to telecommute. The company’s CTO wants to be flexible and accommodate as many employees as possible. At the same time, the CTO wants to achieve productivity goals and keep to a minimum any legal issues that may arise from this new work alternative. After reading the information presented in this module and other sources, create a one-page document that includes three guidelines that telecommuters need to follow and three guidelines that the company needs to follow to achieve both personal and organizational objectives. What are three examples of information technologies that could help this company monitor these telecommuters?
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Encryption and Decryption
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Fundamentals of Information Systems
Fundamentals of Information Systems
Computer Science
ISBN:
9781337097536
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
Principles of Information Systems (MindTap Course…
Principles of Information Systems (MindTap Course…
Computer Science
ISBN:
9781305971776
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
Information Technology Project Management
Information Technology Project Management
Computer Science
ISBN:
9781337101356
Author:
Kathy Schwalbe
Publisher:
Cengage Learning
Fundamentals of Information Systems
Fundamentals of Information Systems
Computer Science
ISBN:
9781305082168
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning