Define governance of information within organizations

Assignment Help Management Information Sys
Reference no: EM13779534

This assignment consists of two (2) sections: a written paper and a PowerPoint presentation. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for.

In the day-to-day operations of information security, security professionals often focus the majority of their time dealing with employee access issues, implementing security methods and measures, and other day-to-day tasks. They often neglect legal issues that affect information security. As a result, organizations often violate security-related regulations and often have to pay heavy fines for their non-compliance. Thus, as a Chief Information Officer in a government agency, you realize the need to educate for senior leadership on some of the primary regulatory requirements, and you realize the need to ensure that the employees in the agency are aware of these regulatory requirements as well.

Section 1: Written Paper

1. Write a six to eight (6-8) page paper in which you:

a. Provide an overview that will be delivered to senior management of regulatory requirements the agency needs to be aware of, including:
i. FISMA
ii. Sarbanes-Oxley Act
iii. Gramm-Leach-Bliley Act
iv. PCI DSS
v. HIPAA
vi. Intellectual Property Law

b. Describe the security methods and controls that need to be implemented in order to ensure compliance with these standards and regulatory requirements.

c. Describe the guidance provided by the Department of Health and Human Services, the National Institute of Standards and Technology (NIST), and other agencies for ensuring compliance with these standards and regulatory requirements.

d. Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Section 2: PowerPoint Presentation

2. Create an eight to ten (8-10) slide security awareness PowerPoint presentation that will be presented to the agency's employees, in which you:

a. Include an overview of regulatory requirements and employee responsibilities, covering:
i. FISMA
ii. Sarbanes-Oxley Act
iii. Gramm-Leach-Bliley Act
iv. PCI DSS
v. HIPAA
vi. Intellectual Property Law

Your PowerPoint presentation must follow these formatting requirements:

Include a title slide, six to eight (6-8) main body slides, and a conclusion slide.

The specific course learning outcomes associated with this assignment are:

Explain the concept of privacy and its legal protections.

Describe legal compliance laws addressing public and private institutions.

Analyze intellectual property laws.

Examine the principles requiring governance of information within organizations.

Use technology and information resources to research legal issues in information security.

Write clearly and concisely about information security legal issues and topics using proper writing mechanics and technical style conventions.

Reference no: EM13779534

Questions Cloud

Economic factors affecting vulnerability : Describe the impact that at least two of the factors below have on the vulnerability of your chosen group: Analyze the intersection of social, political, and economic factors affecting vulnerability (must address all three factors).
Time of transition between childhood and adulthood : Compare and contrast these rites to common US rites of passage. Do they coincide with the physical, cognitive, or socioemotional changes taking place at this age? Describe which specific changes (physical, cognitive, or socioemotional) they coinci..
Finding literature values for atomic line spectra : Finding Literature Values for Atomic Line Spectra in gas discharge tubes
Assignment school engineering and information technology : atrobe Valley Product Gallery (LVPG) specialises in promoting and selling both (i) stand space at trade fairs and (ii) tickets for visitors to trade fairs in Latrobe Valley, Gippsland area.
Define governance of information within organizations : Examine the principles requiring governance of information within organizations. Use technology and information resources to research legal issues in information security.
Strategic choice and evaluation : Write a paper of between 600-800 words that evaluates alternatives an organization must consider to realize growth. Identify the best value discipline, generic strategy, and grand strategy for your organization.
Assemble a plan to protect patient information : Defend your position on the importance of healthcare quality for your organization. Provide support with at least three (3) examples that illustrate your position. Assemble a plan to protect patient information that complies with all legal requiremen..
Estimate the overall activation energy : Food rots about 40 times more rapidly at 25° C than when it is stored at 4° C. Estimate the overall activation energy for the process of decomposition.
Write a paper about urban design : Write a paper about Urban Design. Addington, one of Christchurch's first suburbs was born as a railway town on the periphery of the southern Town Belt, now Moorhouse Avenue which located to the south west.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Jake''s computer repair service exercise

Jake's Computer Repair Service Exercise - True or false? The cash basis of accounting is required under Generally Accepted Accounting Principles (GAAP) when preparing financial statements. Explain, if necessary.

  Comparing the communication strategies of the facebook pages

Comparison Report. Write a 3 to 4 page report comparing the communication strategies of the Facebook pages of two of the following companies: McDonald's, Burger King, J C Penney, Kohl's

  Differences between operating systems for personal computers

What are the fundamental differences between Windows, MacOS, UNIX, and Linux operating systems for personal computers? What unique characteristics do mainframe operating systems have?

  Evaluate the effectiveness of a scrum

Assignment: Scrum vs. Plan-Based Software Development Strategies, Evaluate the effectiveness of a Scrum approach compared to a plan-based approach

  Ethical issues related to information technology

Locate a news article based on a recent event on ethical issues related to information technology

  Rate and the mechanics'' performance

Electronic Unit Pricing in Supply Chain Management; Honda Allowed Mechanic's Rate - What is your opinion of Honda's allowed rate and the mechanics' performance?

  Describe your chosen architecture pattern

Describe your chosen architecture pattern. Explain why you selected the architecture of this case study. Explain how your chosen pattern could be applied to this case study

  Prepare a research paper on a strategic management

Conceiving to success of the business - methodology and prepare a research paper on a strategic management related topic

  Outsourcing it functionsone of the common it acquisition

outsourcing it functionsone of the common it acquisition alternatives is acquiring outsourcing services. organizations

  Compare and contrast the uml class diagram relationships

Compare and contrast the UML class diagram relationships that can exist between classes and explain when you would use each type of relationship to model a software project

  Explain the traditional is planning process

What is the Logic To-Be Model? What is accomplished with the Logic To-Be Model and Describe the traditional IS planning process. Why is this planning process changing?

  Pros and cons of the current alcan technology

What are the pros and cons of the current Alcan technology infrastructure? What are the pros and cons of the new Alcan technology infrastructure proposed by Robert Ouelette

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd