Impact of state privacy laws on infosec

Assignment Help Basic Computer Science
Reference no: EM131510576

Impact of State Privacy Laws on InfoSec

  • Within California SB1386, one of the greatest concerns for information security and privacy professionals is language that includes liability related to the personally identifiable information of California residents, regardless of where that data is collected and stored.
  • Tasty Candy Store is a candy manufacturer in Las Vegas, Nevada. It has a special line of high-priced chocolate liqueur truffles that are a popular favorite of visitors to Las Vegas. Tasty Candy owners saw the potential for expanding their sales by creating a Web site, allowing customers to purchase their favorite sweet treats over the Internet. Their predictions were accurate, and soon the Tasty Candy Web site was busy processing orders from customers all over the world. Their customer base includes a large number of California residents.
  • Two years after Tasty Candy set up their Web site, the site fell victim to hackers who gained access to all of the credit card and demographic data for all of Tasty Candy's 12,000 customers.
  • Use the study materials and any additional research needed to fill in knowledge gaps. Then discuss the following:
  • What are the mitigating factors that would work to the benefit of Tasty Candy in meeting the requirements of SB1386 that pertain to information breach reporting related to California residents?
  • What are responsibilities of Tasty Candy in terms of reporting this breach of data specific to California residents?
  • Are there other state or federal regulations that would impact how and when Tasty Candy reported this data breach to the general public or to specific segments of their customer base?

Reference no: EM131510576

Questions Cloud

Write an equation for each condition listed the line : Write an equation for each condition listed the line with a slope of 7 and a y-intercept of -1 ( in slope of 3 ( in point-slope form).
Information security and privacy professionals : Information security and privacy professionals are particularly concerned with language in SB1386 that includes liability.
Design the interventions and mutually agreeing : Need a better understanding of these 3 statements. It is in relation to Katharine Kolcaba, Comfort Theory.
Create a treatment plan for stabilization : Create a treatment plan for stabilization based on the information provided in the vignette.The client's physical and emotional wellbeing .
Impact of state privacy laws on infosec : Within California SB1386, one of the greatest concerns for information security and privacy professionals is language that includes
How much tax will tom pay on his groceries : Assuming that all of Tom's items are taxable, how much tax will Tom pay on his groceries if North Carolina charges 8% sales tax?
Improve a function performed by the college : Describe how TSP might be used to improve a function performed by the college. Be creative. The college's primary function is instruction.
Medical reconciliation and record maintenance : In a short essay form, discuss the reasons why a medication list should be obtained and a reconciliation performed for a patient at each visit.
Creation of java applet and creation of regular java : Compare and contrast the key similarities and differences between the creation of a Java applet and the creation of a regular Java application.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd