Discuss circumstances when the company is subject to report

Assignment Help Basic Computer Science
Reference no: EM132856352

Discussion 1: You are the IT systems security manager of the organization. Your organization in based in Edmonton but does share some employee data with a benefits service provider in Toronto. A breach has occurred affecting both customers and employee information held by your organization. Some of your customers are in the United States and some are in Europe. Discuss and contrast your organization's obligations to report a breach under Alberta's Personal Information Protection Act (PIPA) and under the Personal Information Protection Electronic Documents Act (PIPEDA). Discuss the circumstances when the company is subject to report a breach under each of these laws and the variables that should be considered in making the assessment. Discuss other applicable considerations in this case.

Reference no: EM132856352

Questions Cloud

Calculate Christine net pay : Christine works for Marian Transport in Québec and is paid $962.35 weekly. Calculate Christine net pay
Organizing business for sake of potential rewards : Entrepreneur is a "person who assumes the risks of managing and organizing a business for the sake of potential rewards."
What is ubiquitous communication : What is ubiquitous communication, and what kinds of controversies does it raise?
Write a program to model the vertical position of a car : Write a program to model the vertical position of a car that is rolling along at constant speed and hits a linear ramp to a new level of y=6 inches
Discuss circumstances when the company is subject to report : Discuss and contrast your organization's obligations to report a breach under Alberta's Personal Information Protection Act (PIPA)
Capture high-quality images of the lake bed : In the summer of 2017, a mission to recover the nine models of the Avro Arrow was launched. It was a collaborative effort by several private companies
What does the supreme court of canada say about the role : What does the Supreme Court of Canada say about the role that an organization's computer use policy and practices may play in the assessment
What is the loan impairment loss : The PV of 1 at 10% for three periods is 0.75, and the PV of an ordinary annuity of 1 at 10% for three period is 2.49. What is the loan impairment loss for 2019
Organization from two different organizational structures : Differentiated the structure of the selected organization from two different organizational structures.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Using digital forensic tools or encryption tools

Using digital forensic tools or encryption tools in the virtual lab to extract the text in the picture (10%) and answer the question (10%).

  What are the benefits and drawbacks of a host-based firewall

What are the benefits and drawbacks of a host-based firewall?

  Describe three different types of data anomalies

Describe three different types of data anomalies.

  Why is programming efficiency important

Taking into account the availability of today's powerful computers, why is programming efficiency important? Consider how the number of lines of programming instructions impact the number of CPU processing cycles?

  What is the encryption of m=34

What is theencryption of m=34?

  Research and the development of a summary of 5 it

Clarification: These systems are out of date, are not running virus software, and users all have administrative rights to the server and workstations. The website is also out of date and the website front end allows users to input data.

  Simply abandon intellectual property laws

Develop a hypothesis as to whether we should continue or even strengthen intellectual property laws, or should we simply abandon intellectual property laws

  Provide specific evidence of particular crime

It is sometimes said that information extracted from a router or switch does not necessarily provide specific evidence of a particular crime.

  What would be an ethical concern for your business

What would be an ethical concern for your business?...and what would you do in that situation?

  Create a function dictify that takes

Your challenge for this problem is to create a function dictify that takes in 1 argument: book_name.

  Uppercase and one lowercase letter

If the passwords don't match or the rules are not fulfilled, prompt again. Needs to include a method that checks whether a password is valid. The password must be 8 characters long, must have at least one uppercase and one lowercase letter, and mu..

  Describe a hypothetical situation

Provide a real-world example or describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive manner.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd