Apartment Rental Company
Various organizations such as the apartment rental companies need to comply with different set legal and ethical standards during the solution designs which include the design architecture compliance. The development of solution design and architecture of such buildings begins with a design process that must meet various legal standards as required by the property management licensing authority before its initiation (Buede & Miller, 2016). Such companies by using and storing such design in the relation database management system will enable the property management authority to retrieve any company’s data outlining such legal and ethical requirements as compliance with such laws and regulations (Bell, 2016).
The database management systems will provide reports needed such as the building licensing, terms and conditions of leasing, landlord-tenant ethics as contained in the fair housing act among others. A database design to handle all of such information’s can improve the company grasp and the organization to remain in compliance with the law. When creating such relational database in the Microsoft SQL software’s for solution design and future implementation by apartment rental company, the company is important to consider not only the laws of the state but all states the software will be implemented particularly when such properties are located. In that case, a flexible and configurable gamification design that provides a rich capability for the customers to turn features on or based on their regional policies regarding rental and leasing of apartments.
Apartment rental companies must meet various legal and ethical standards that range from property management laws including property licensing, managers license, landlord-tenant ethical requirements and agreement. For example, in Texas united states, landlords are represented by licensed realtor and where the owner becomes a member of an apartment association. Copies of the Principles of Ethics for the Apartment Association of the Panhandle Texas including the principles of ethics and standards of practice of the National Association of Realtors are attached (Hughes, Goldman & Nemeth, 2013). With all those information, available in the company relational database system, it will be possible to create a shortcut where any tenant willing to rent the apartment can retrieve such requirements information using the Microsoft SQL Server system.
B: Legal Compliance
Protection of the company data, transactions or journeys through the company computer system can be seen as a primary component of good corporate hygiene. It also entails protection of the organization from reputational risks and demanding losses, failure to protect their data could result in both entrepreneurial and personal criminal prosecutions. Privacy by design describes a concept and principles that companies now use to offer a roadmap so as to integrate privacy considerations into their business models (Pokorny, 2013). The concept outlines the way the customer’s data are maintained, stored, collected and shared. In that case, the company should automatically protect any of its tenant’s data by default and from the outset such as the resident’s identity, occupation, race, gender among others from any unconcerned authority.
The company should ensure that its database must be designed such that the new software can be quickly entered and updated to track all software available including those of versions of the company. In the case of violation of the tenant’s personal data, the company’s operational all stored by any an authorized person, then the software can track the location of the machines being used, their certified users and their level of access including the computer configuration.
Various regulations can be employed by the company that includes data collection and retention policies, access control, access authentication, authentic screen savers, encryption, firewalls in combating unauthorized access attempts and software patching among other regulations. Such rules were suggested by the European community’s body that constitute data protection acts after conducting a survey on various data management risk of 2011 (Bell, 2016).
C: Ethical Practices
New computer technologies for designing, storing, manipulating and communicating data are since transforming the use and spread of information but thus creating various ethical dilemmas. The issues of agreed behavior in the networks include simple standards of civility that question the rights and responsibilities in administering information that has not yet been classified by law. The company should employ the netiquette or the on-line civility practices among its data handlers which describe a common sense and of remembering the context of behavior (Bell, 2016). That is, any activity that could be questionable from the networks should be handled with some discretion and kept to the parts of the systems where those who would be offered can, in turn, avoid them.
Other practices the company can include to ensure ethical operations of the enterprise may include the data and information exporting restriction to company data handlers through encrypted codes and making those staff entitled with business data management to get familiarity with the basic existing copyright principles thus keeping most networks on ethical grounds. Copyrights protect the original works of authorship, including literary, musical, dramatic, graphic, and architectural works (Rittinghouse & Ransome, 2016).
Apartment rental company can apply various best practices to ensure the company’s ethical operation by first making the employees to know the degree to which their behavior is monitored, and ensure that data gathered does not violate employees and customer’s rights. Moreover, if the employees and the customers become aware to which extent their behavior are scrutinized, then they will act with a lot of discretion towards the company information and their client’s data made available in the enterprise database system. Consequently, if the tenants ascertain that the company does not violate privacy rights, then they will act ethically towards their landlord and vice versa.
D: Security Needs of Solution
Apartment rental company with its relational database being created in the Microsoft SQL server implies that it contains vital information ranging from its clients and tenant’s personal information, tenant-landlord agreement documents, the company building layout/architecture among other company information that needs to be safeguarded. In that case, the company must protect t its database and its servers on which they reside, administer and preserve the rights of internal database users, guarantee the confidentiality of the clients and tenants as they access the company databases (Rittinghouse & Ransome, 2016).
Protecting all the elements of complex computing systems may take various angles and all are channeled to the enterprise IT department tasked with handling and computing such data. The department work by ensuring that the computers containing vital company data are physically inaccessible to unauthorized users except other computers used in other company offices without servers for critical company information. Secondly, the department personnel responsible for system administration and data security must be reliable and ethically trained. Additionally, the procedures used in the operation of the system must assure a reliable data. That is, each person is responsible for a particular task so as to avoid conflict of interest that may lead to data information leakage which is different from other computers used by all employees in a given office. Finally, the department must design various technical measures to ensure the credibility of the company information by making sure that the storage, access, manipulation, and transmission of data must be safeguarded by technology that enforces the company particular information control policies (Bell, 2016).
E: Database Security Plan
Apartment rental company database consists of the list of buildings, units, leases, receivable vendors, and repairs. However, the company has initiated a relational database already created in a Microsoft SQL server which enables it to manage each of their apartments buildings including a breakdown of finances in various ways. To ensure the security of such data, the company has initiated a database authentication plan to secure its server from being hacked by either the insiders or outsiders (Rittinghouse & Ransome, 2016). It also includes changing of its database server every six months since the longer the database stays in operation, the more access rights drift away from a secure baseline.
Database authentication plan will require that username and password combination will strictly control access to the database. Consequently, the username including the initial password will be set by the system administrator while the user will be compelled to insert a new password upon first access to the company database. The plan will assist the enterprise data security wise in that only the apartment manager can input rent into the system and that the social security numbers will be encrypted and credit history will not be saved. The user passwords will also be changed every ninety days making it hard for hackers to retrieve any company tenant and customer’s information from the enterprise database servers.
Bell, C. (2016). Retrieved 4 June 2016, from http://Principles of Database Design
Buede, D. M., & Miller, W. D. (2016). The engineering design of systems: models and methods. John Wiley & Sons.
Hughes, A. H., Goldman, T. F., & Nemeth, C. P. (2013). Real Estate Law Fundamentals. Pearson Higher Ed.
Pokorny, J. (2013). NoSQL databases: a step to database scalability in web environment. International Journal of Web Information Systems, 9(1), 69-82.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management, and security. CRC press.