Explain the concept of privacy and its legal protections

Assignment Help Computer Engineering
Reference no: EM132109755

Question: This assignment consists of two (2) sections: a written paper and a PowerPoint presentation. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. In the day-to-day operations of information security, security professionals often focus the majority of their time dealing with employee access issues, implementing security methods and measures, and other day-to-day tasks. They often neglect legal issues that affect information security. As a result, organizations often violate security-related regulations and often have to pay heavy fines for their non-compliance. Thus, as a Chief Information Officer in a government agency, you realize the need to educate for senior leadership on some of the primary regulatory requirements, and you realize the need to ensure that the employees in the agency are aware of these regulatory requirements as well.

Section 1: Written Paper1. Write a six to eight (6-8) page paper in which you:

a. Provide an overview that will be delivered to senior management of regulatory requirements the agency needs to be aware of, including:

i. FISMA

ii. Sarbanes-Oxley Act

iii. Gramm-Leach-Bliley Act

iv. PCI DSS

v. HIPAA

vi. Intellectual Property Law

b. Describe the security methods and controls that need to be implemented in order to ensure compliance with these standards and regulatory requirements.c. Describe the guidance provided by the Department of Health and Human Services, the National Institute of Standards and Technology (NIST), and other agencies for ensuring compliance with these standards and regulatory requirements.d. Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Section 2: PowerPoint Presentation2. Create an eight to ten (8-10) slide security awareness PowerPoint presentation that will be presented to the agency's employees, in which you:

a. Include an overview of regulatory requirements and employee responsibilities, covering:

i. FISMA

ii. Sarbanes-Oxley Act

iii. Gramm-Leach-Bliley Act

iv. PCI DSS

v. HIPAA

vi. Intellectual Property Law

Your PowerPoint presentation must follow these formatting requirements:

• Include a title slide, six to eight (6-8) main body slides, and a conclusion slide.

The specific course learning outcomes associated with this assignment are:

• Explain the concept of privacy and its legal protections.

• Describe legal compliance laws addressing public and private institutions.

• Analyze intellectual property laws.

• Examine the principles requiring governance of information within organizations.

• Use technology and information resources to research legal issues in information security.

• Write clearly and concisely about information security legal issues and topics using proper writing mechanics and technical style conventions.

Reference no: EM132109755

Questions Cloud

Why should duties be segregated : Why should duties be segregated? How can management determine if duties are properly segregated? What if management has inadequate staff to properly segregate.
Identify the possible alternative points of view : Identify the possible alternative points of view. You may be able to support either a yes or no answer for any of these scenarios.
Probability that the filling machine will cause overflow : What is the probability that the filling machine will cause an overflow in a can, that is, the probability that more than 950 ml will be placed in the can?
What motivate hackers to attack computer networks : Provide an example based on your professional experience of what motivate hackers to attack computer networks? The response must be typed.
Explain the concept of privacy and its legal protections : This assignment consists of two (2) sections: a written paper and a PowerPoint presentation. You must submit both sections as separate files for the completion.
How will you coordinate with other organizations : How will you coordinate with other organizations with which the networks connected to determine how to handle their IPv4 or IPv6 traffic?
Define governance principles for cloud-based solutions : The chief information officer (CIO) is very pleased with all of your efforts to adopt cloud-based services and wants to ensure the data is secure.
What is the companies overarching goal : Identify the organization's primary product or service What is the companies overarching goal?
Describe elliptic curve cryptosystems : 1) What is a digital signature? 2) Describe Elliptic curve cryptosystems.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd