Discuss two instances in which duty of due care was lacking

Assignment Help Computer Engineering
Reference no: EM133614542

Assignment: Legal Analyses in Information Technology

Competencies

I. Compliance Legal Requirements

The graduate describes the legal requirements to address compliance with cybersecurity policies and procedures with an organization.

II. Protection Against Security Incidents

The graduate analyzes applicable laws and policies to legally protect the organization against security incidents.

Introduction

This course addresses the laws, regulations, authorities, and directives that inform the development of operational policies, best practices, and training. These standards assure legal compliance and minimize internal and external threats.

In this task, you will analyze legal constraints and liability concerns that threaten information security within the given organization and develop disaster recovery plans to ensure business continuity.

Scenario

Review the attached "TechFite Case Study" for information on the company being investigated. You should base your responses on this scenario.

Task

I. Demonstrate your knowledge of application of the law by doing the following:

A. Explain how the Computer Fraud and Abuse Act and the Electronic Communications Privacy Act each specifically relate to the criminal activity described in the case study.

B. Explain how three laws, regulations, or legal cases apply in the justification of legal action based upon negligence described in the case study.

C. Discuss two instances in which duty of due care was lacking.

D. Describe how the Sarbanes-Oxley Act (SOX) applies to the case study.

II. Discuss legal theories by doing the following:

A. Explain how evidence in the case study supports claims of alleged criminal activity in TechFite.

1. Identify who committed the alleged criminal acts and who were the victims.

2. Explain how existing cybersecurity policies and procedures failed to prevent the alleged criminal activity.

B. Explain how evidence in the case study supports claims of alleged acts of negligence in TechFite.

1. Identify who was negligent and who were the victims.

2. Explain how existing cybersecurity policies and procedures failed to prevent the negligent practices.

III. Prepare a summary (suggested length of 1-2 paragraphs) directed to senior management that states the status of TechFite's legal compliance.

IV. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

V. Demonstrate professional communication in the content and presentation of your submission.

Reference no: EM133614542

Questions Cloud

What makes this client at risk for pulmonary edema : What nursing action could have prevented the client from having pulmonary edema? What makes this client at risk for pulmonary edema?
Compute the hessian by computing the directional derivative : MATH 463 Convex Optimization, McGill University - Compute the Hessian by computing the directional derivative of the gradient. For this part, you will need
What specific information do families need to know about : What specific information do families need to know about ways this issue impacts their child's educational experience in school?
What can you do to improve your health : ECEA 300- What can you do to improve your health? Are you open to growth and change? Do you care for yourself? What are your personal values around wellness?
Discuss two instances in which duty of due care was lacking : Discuss two instances in which duty of due care was lacking. Describe how the Sarbanes-Oxley Act (SOX) applies to the case study.
What are the human dynamics that drive the negotiation : What are the human dynamics that drive the negotiation? Analyze and discuss the communication styles prevalent in your workplace.
Identify share and apply results and lessons learned : Such organizations employ innovative approaches to identify, share, and apply results and lessons learned from their programs and initiatives.
What types of employment communications are responsible for : What types of employment communications are they responsible for? How will current/future COVID-19 environment affect the role of human resources?
Submit the matrix as a single document : Scrutinize all ten sources and compile your findings into the matrix below. Submit the matrix as a single document.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd