Document Preview:
USA and European Industry Standards in IT area Student’s name: Institutional affiliation: USA and European Industry Standards in IT area The consistent use of Information Technology both in the United States and Europe benefits the industrial progress in all every sector in the two economies. A few cases of cyber insecurity and cyber-attacks have however alerted the pertinent stakeholders after a wrenching tendency of data loss and data leakages. The two regions have been lobbying for the right legislation believed to redress the issue of data loss and data leakages. Perhaps the data and digital protection laws introduced both in European and USA have a common goal of protection firms from the overwhelming system insecurities. In this case the discussion will focus on the similarities differences and the superior legislation or standard established between the two. In regard to IT protection standards Europe performs reasonably well compared to the personal data of over 600000 people. Such a case implies lack of strictness and seriousness in the endeavored bodies believed to be in charge of the security details. References De Hert P. & Papakonstantinou V. (2016). The new General Data Protection Regulation: Still a sound system for the protection of individuals?. Computer Law & Security Review 32(2) 179-194. El Emam K. & Álvarez C. (2014). A critical appraisal of the Article 29 Working Party Opinion 05/2014 on data anonymization techniques. International Data Privacy Law 5(1) 73-87. Kim G. H. Trimi S. & Chung J. H. (2014). Big-data applications in the government sector. Communications of the ACM 57(3) 78-85. Martínez-Pérez B. De La Torre-Díez I. & López-Coronado M. (2015). Privacy and security in mobile health apps: a review and recommendations. Journal of medical systems 39(1) 181. Weiss M. A. & Archick K. (2016). US-EU data privacy: from safe harbor to privacy shield. [...]
Order Description:
Critically analyze current European and United States industry standards or recommendations for any Information Technology (IT) area or subarea (e.g., intrusion detection, data recovery, data retention, intrusion prevention, network infrastructure, identity validation, project management, telecommunications, etc.). Compare and contrast the standards or recommendations identifying any similarities and differences between them. Be sure to identify which standard is better. Remember to support your opinion with factual information. note; five scholarly references
Subject Area: Information Technology
Document Type: Reports