Important role of computer security profession

Assignment Help Basic Computer Science
Reference no: EM132857270

Question 1.

An important role of the computer security profession involves efforts to uphold policy and training. What does the Supreme Court of Canada say about the role that an organization's computer use policy and practices may play in the assessment of whether there is a reasonable expectation of privacy in a work laptop computer where employees are permitted to use the laptop computer for personal matters? What do you recommend to an organization should be done to address this situation?

Question 2. 

You are the IT systems security manager of the organization. Your organization in based in Edmonton but does share some employee data with a benefits service provider in Toronto. A breach has occurred affecting both customers and employee information held by your organization. Some of your customers are in the United States and some are in Europe. Discuss and contrast your organization's obligations to report a breach under Alberta's Personal Information Protection Act (PIPA) and under the Personal Information Protection Electronic Documents Act (PIPEDA). Discuss the circumstances when the company is subject to report a breach under each of these laws and the variables that should be considered in making the assessment. Discuss other applicable considerations in this case.

Reference no: EM132857270

Questions Cloud

Protocols and threats to network security : You have been introduced to a set of concepts, protocols and threats to network security. Explain the basic idea about IPsec protocol, its aim and disadvantage
What is Susan QBI deduction : In 2020, the business pays $100,000 in W-2 wages, has $150,000 of qualified property, What is Susan QBI deduction
Research the facebook user data breach : Research the Facebook user data breach. Did Facebook have the necessary policies and procedures in place? Did Facebook adhere to their policies?
Law enforcement efforts against digital crime : Identify and explain the factors that have limited local law enforcement efforts against digital crime.
Important role of computer security profession : An important role of the computer security profession involves efforts to uphold policy and training.
Demonstrated operational excellence : Select an organization that has a Global platform (they operate in more than one country), that has demonstrated operational excellence
Personal statement for grad school : How are businesses using Big Data to solve problems or increase revenue? Find articles online that will help you with your discussion.
Global enterprises to set transfer-pricing policies : What motivate managers and managerial accountants of MNE and global enterprises to set transfer-pricing policies?
COSO framework of internal controls : discuss suggestions for integrating COSO framework compliance into a company in which you are familiar.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Which kite is higher and by how much

The angle that Markisha's kite string makes with the horizontal is 42°. Which kite is higher and by how much?

  Disadvantages of using VPN instead of leased line

Who is ultimately responsible for the security of information in an organization? What are the disadvantages of using a VPN instead of a leased line?

  What percent accuracy in the distance is required

If one of the satellites is at a distance of 20,000 km from you, what percent accuracy in the distance is required if we desire a 2-meter uncertainty?

  What are the benefits and limitations of Python 3

Why is object-oriented programming a valuable skill? What are the benefits and limitations of Python 3? what are some other tasks you can perform with Python 3?

  Describe various network types and terminology

Describe various network types and terminology. discuss types of network topologies. describe different numbering systems.

  Finding criminals who have fled the scene of crime

Finding criminals who have fled the scene of a crime, or unsolved crimes from the past that have been solved due to the use of new techniques

  Essay on hacking manufacturing systems

Write two page single space essay on hacking manufacturing systems. Recent hacks happened for the automotive industry. How to secure their infrastructure

  What are steps for incident response plan

What are the steps for an incident response plan? How does network security play into an incident response plan?

  Describe the process of electronic image scanning

What are the four parts that make up a complete television signal?

  Disadvantages of losing languages

What are the advantages and disadvantages of losing languages? Overall, is it a significant problem?

  List several encapsulated methods that would be useful

List several encapsulated methods that would be useful for all of the following data structures: a queue, a binary tree, a list, and an array. List several methods that would each be useful for one of the data structures but not necessarily the ot..

  Use the class date type to store the date of birth

Use the class date type to store the date of birth, admit date, discharge date, and class doctorType, to store attending physicians name. Add appropriate constructors and member functions to initialize, access and manipulate the data members.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd