Posted: August 1st, 2023
Office Communications Applications
Assignment 2:
Homework help – Write a two-page paper explaining the potential impact of e-discovery and security concerns in respect to using MS Outlook 2010, 2013. or 2016—be sure to address the items in the rubric below.
************
Assessment Rubric Exemplary Accomplished Developing Beginning Points Available Comments
Explain the potential impact of e-discovery in respect to using MS Outlook 2010, 2013, or 2016. Student effectively completed the assignment. Student partially completed the assignment. The student provided limited and meaningless substance completing the assignment. Student failed to complete the assignment. 40
Explain the potential impact of security concerns in respect to using MS Outlook 2010, 2013, or 2016. Student effectively completed the assignment. Student partially completed the assignment. The student provided limited and meaningless substance completing the assignment. Student failed to complete the assignment. 40
The paper structure needs to include an introduction and summary. Student effectively completed the assignment. Student partially completed the assignment. The student provided limited and meaningless substance completing the assignment. Student failed to complete the assignment. 10
Use the American Psychological Association (Help write my thesis – APA) format for in-text citations and references (Your article summary should not exceed 3 pages. Turnitin is used in this class to assess the originality of your work—you must have less than 15% Similarity/matching. Paraphrase instead of using direct quotes to reduce your matching percent to 15% or less.). You need at least two references!
Writing Format: Help write my thesis – APA
• What is Plagiarism: http://www.plagiarism.org/
• What is Plagiarism and How to Avoid It: http://www.youtube.com/watch?v=eIsLV9zOOe0
• Purdue Online Writing Lab: https://owl.english.purdue.edu/owl/resource/560/01/
• Help write my thesis – APA and MLA Citation Game Home Page: http://depts.washington.edu/trio/quest/citation/apa_mla_citation_game/
• Help write my thesis – APA Game (This will only function correctly on a mobile device or a modern web browser)
• Writing Help: http://apus.campusguides.com/writing/thesiscapstone
Student effectively completed the assignment. Student partially completed the assignment. The student provided limited and meaningless substance completing the assignment. Student failed to complete the assignment. 5
Grammar, Punctuation, Spelling, & Readability Student effectively completed the assignment. Student partially completed the assignment. The student provided limited and meaningless substance completing the assignment. Student failed to complete the assignment. 5
Office Communications Applications
Student:
Institution:
Office Communications Applications
Communication is a crucial element for every business organization in the world today. Companies embrace the use of various applications to improve both internal and external communication and provide a healthy communication environment (Hoyt, et, al., 2019). Offices communicate through sending emails, making telephone calls as well as through online chatting apps. The most conventional method of communication is by use of necessary emails and calls between team members. The paper is a discussion on the potential impacts of e-discovery and security concerns concerning the use of Microsoft (MS) outlook.
Office emails are created in multiple formats, including through the use of MS outlook.MS Outlook is an application easy to access and quick to review. Most organizations prefer the use of e-discovery in evaluating outlook emails instead of using Microsoft outlook. Some of the disadvantages of studying emails from outlook include inadequate review functionality, data insecurity, as well as failure to produce an original form of emails.
E-discovery improves compliance through effectively locating identifying and retrieving information stored in Microsoft outlook. E-discovery uses advanced analytic tools during email review, which is cost-effective compared to direct outlook study (Verberne, et, al.,2019). The advanced analytic tools in e=discovery are vital in reducing over-presentation enhance investigation as well as the lower cost of using e-discovery directly. E-discovery uses a feature known as in-place e-discovery that assists in searching for a mailbox in an MS outlook through the use of primary search keys. The in-place discovery used by non-technical office personnel such as human resource personnel as well as managers in a different department such as records and compliance managers manages and secures information.
Achieving messages in a mailbox is achieved through e-discovery where mails and other files can be easily accessible in the MS outlook (Blaustein, McLellan, and Sherer, 2016). Most of the time, organizations store business information in a personal store (PST), which is not secure. Additionally, office information needs a high level of preservation for future use. E-directory uses the hold-and litigation in-place hold to store and holds mails in the mailbox as well as search the preserved letters when in need. The e-directory protect information contained or maintained from modification, disruption as well as permanent deletion. Nevertheless, lately, the e-discovery is used to hold public older (PF) as well as search for the PF files.
E-discovery preparation and management is vital to avoid security concerns. E-discovery implementation has various implications in office information as well as the organization’s IT security team. For instance, storage, transfer, and integrity of the office communication process. Disclosure of the organization’s e-discovery exercises to clients and other organizations may put the organization at risk. The information technology security team should maintain high integrity through the use of electronic signatures as well as identity management systems for secure access to information. Organizations such as the criminal justice and health industry require a reliable and defined search engine. Preserved information can be compromise sensitive information as well as disrupt and modify critical information through the use of a search engine.
Organizations need to integrate the use of intelligent tools to minimize data security risks and threats. Data security investment is essential to meet the client’s security demands as well as develop end-to-end compliance systems (Blaustein, McLellan, and Sherer, 2016). Assigning e-discovery security roles to various personnel assist in reducing security issues, for instance, an e-discovery manager, reviewer as well as e-discovery administrator.
To sum up, e-discovery is vital in MS outlook 2010, 2011, and 2013 in enhancing compliance and providing secure sensitive information. E-discovery reduces risks of duplicated data, preserves deleted information, saves on time and cost of review, protects content as a lower cost, saves on storage as well as deletes unwanted information. E-discovery goes through several security issues mitigated through proper preparation and risk management plan.
References
Blaustein, S., McLellan, M. L., & Sherer, J. A. (2016). Digital Direction for the Analog Attorney-Date Protection, E-Discovery, and the Ethics of Technological Competence In Today’s World of Tomorrow. Richmond Journal of Law & Technology, 22(4), 10.
Hoyt, C., Rucker, D., Doran, J., Alexander, B., & Daley-Fell, A. (2019). U.S. Patent Application No. 16/460,415.
Verberne, S., He, J., Kruschwitz, U., Wiggers, G., Larsen, B., Russell-Rose, T., & de Vries, A. P. (2019, January). First International Workshop on Professional Search. In ACM SIGIR Forum (Vol. 52, No. 2, pp. 153-162). New York, NY, USA: ACM.
Order | Check Discount
Sample Homework Assignments & Research Topics
Tags:
Masters Essays,
PSY Papers,
PSYC,
Psychology Assignment,
Psychology Dissertations