Discussion builds upon the role-play conducted

Assignment Help Basic Computer Science
Reference no: EM13708288

Need help on a assignment here are the instructions: W4 DQ: Examine FERPA, CIPA, and COPPA
Discussion: Examine FERPA, CIPA, and COPPA

Learning Objectives and Outcomes
Describe the requirements of FERPA, CIPA, and COPPA.

Assignment Requirements
This discussion builds upon the role-play conducted in the Roles section of this lesson. In the role-play, you were the systems administrator for a for-profit educational institution. The institution's library provides Internet access, in particular, to students and their children (while the parents are attending classes). While referring to FERPA, CIPA, and COPPA, discuss the requirements of each of these laws in granting rights to an individual under the First Amendment. In addition, you need to explain why you think these laws should outweigh the special rights related to free speech, keeping the good of society in mind.

After your discussion, you need to prepare a report. The report should include:

An analysis of the requirements of specific laws mentioned in granting rights to an individual under the First Amendment
Explain why these laws should outweigh special rights related to free speech
Summarize all the discussed points and the various perspectives shared in the discussion
Required Resources
None

Submission Requirements
Format:
Microsoft Word
Font:
Arial 10-point size, Double-space
Citation Style:
Follow Your school's preferred style guide
Length:
No more than 500 words

Evaluation Criteria and Rubric

Did the student list the requirements of FERPA?
Did the student list the requirements of CIPA?
Did the student list the requirements of COPPA?
Did the student justify how each law might outweigh First Amendment rights?

Reference no: EM13708288

Questions Cloud

Executives deal with a tremendous amount of dail stress : Executives deal with a tremendous amount of dail stress dealing with politics in organizations - yet they do not suffer from job burn out. Some argue that their political skills save them. Research and find an article that discusses the specifi..
Writing about principal demographic and macroeconomic : A bout ConAgra Food Inc. Writing about Principal demographic and macroeconomic trends and their effect on future performance.
Introduction of the electrooculogram : Introduction of the electrooculogram (EOG). - theory and usage
Change the number of parameters an operator takes : "You cannot change the number of parameters an operator takes." What does this really mean and what are implications of this when you use polymorphism in your programs? Try to provide specific examples and 600 words.
Discussion builds upon the role-play conducted : Discussion builds upon the role-play conducted in the Roles section of this lesson. In the role-play, you were the systems administrator for a for-profit educational institution. The institution's library provides Internet access, in particular..
How has the personality test and entrepreneurship test made : How has the personality test and Entrepreneurship test made you think about opening a Business - Please look at the link above to Landline from the ABC and type a search for Entrepreneur.
Active directory structure for a financial organization : Consider that you have to design the Active Directory structure for a financial organization that has 10 sites throughout the country and 5 major departments at each site. The sites are located in the following cities: Detroit, MI; New York Cit..
What might be some challenges in formatting a spreadsheet : What might be some challenges in formatting a spreadsheet? What are the added values in formatting a spreadsheet? What new feature (s) enhanced your ability to better format your spreadsheets.
What new threats do computer systems and networks pose : What new threats do computer systems and networks pose to personal privacy? Conversely, what threats are enabled or enhanced by computer systems and networks? How does cryptography help or hinder protection of privacy and public safety? What po..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd