You have chosen to sponsor your bid up to a maximum amount of .
We have a 3D video that has needs to be updated since its outdated and needs to be recreated and enhanced into something more elegant and represented in better graphics, your story board is the old video, which you can either copy and paste, or you can put your own personal creative input which we wont mind.
Please send us your work that is not less than the Expected Graphics output level, we wont be accepting anything without a proper cover letter accompanied with previous works.
The old video is almost 3 min long, the new one will be 2 min and some few seconds, it wont exceed 170 seconds. write dear GOOD sir so I can make sure that you read this.Please watch the old video, the expected graphics video and the read the Script below
Expected Graphics output (ignore the bad video editing and the sound editing and focus on the graphics) :
Link to the expected result style
The most important thing to our organization is our Information. Information drives our mission and is targeted by numerous competitors. The easiest way for someone to cause harm to our organization is by compromising an insider. An insider can be anyone who works in our organization including employees and contractors. Insiders are prime targets because they have the means and methods to cause a great deal of harm since insiders are often given more access than what they need to do their jobs. Compromising information becomes a simple task. It is as easy as copying critical data to a portable drive or just emailing it out of the organization.
If you see the following behavior you should report it immediately to the security team:
• Someone asking for access to information they do not need access to in order to perform their jobs.
• Copying large amounts of information at a copier carrying a large number of documents out of the organization
• Transferring extremely large or unusable files
• Working strange hours and coming into the office when no one else is around.
• Someone trying to log into someone else's accounts or asking someone to give them access to a secure area such as a data center.
• Sending a large number of emails out of the company with attachments.
• Carrying USB drives out of the organization.
In order to minimize the impact of the information leakage threat, take the following steps to help protect yourself and our organization for any information that you are responsible for:
• Only give people access that is required for their job function this access should be reviewed on a regular basis.
• Do not copy work related information to personal drives or take sensitive information home with you unless you have prior authorization.
• Always lock your computer when you were going to be away for a long period of time.
• Never give anyone access to your account.
• Always be on the lookout for suspicious behavior