Laws influencing information security and privacy

Assignment Help Computer Network Security
Reference no: EM133276918

Laws Influencing Information Security and Privacy in the Federal Government ISOL 633 Portfolio Assignment 4 Select one U.S. federal government agency, bureau, directorate, or another organizational entity in the Administrative Branch that frames your research. Describe the organization, its place in the structure of the federal government, its scope of control or legal influence, what types of organizations or individuals are subject to its regulations, and any additional descriptive information that will inform your reader about your subject matter. Describe and define at least one the laws focused on compliance within the federal government system that came up during our course. Research the law itself, any legal cases that were based on that law, and the critique of the law that you found through your research. Of course, your selected agency was likely involved in such litigation, or has published their critique of the laws, so include that information foremost. In addition to compliance laws that directly target the federal government's security and privacy, countless other laws apply to them. Use the U.S. Patent and Trademark Office's website to discover whether your selected agency has been awarded intellectual property rights (yes, the federal government both owns and awards IP protection through USPTO) for their trademarks, patents, or IP. Describe whether and how it maintains or protects its trade secrets. Describe for your reader some of the most prominent criminal or tort risks that your entity faces; or perhaps has been involved in. Again, even the government is subject to the laws that it creates in this regard. In addition to risks in the realms of criminal or tort law, every organization faces the potential risk of enduring a cyber-attack or other incident that must be followed by a forensics investigation. Keeping the focus on your agency, and likely also looking to NIST materials, research and discuss an incident or case in which such the agency or another within its greater organization was compelled to go through the forensic investigation process. There are no sectors exempt from those incidents or cases, regrettably, so be diligent and you will find one to discuss. Conclude the Portfolio with your overall assessment of whether the legal system-from compliance mandates, to IT, criminal, and tort laws, to forensic investigations-benefits, hurts, or otherwise affects the agency. Assume the role of information security and privacy risk consultant in this section.

Reference no: EM133276918

Questions Cloud

Quis custodiet ipsos custodes : Quis custodiet ipsos custodes? How might this affect intellectual property rights? How might undermining privacy then undermine our economy?
Security perspective-dependent on internet of things : From a security perspective, what should organizations expect will occur as they become more dependent on the Internet of Things (IoT)?
Homeland security it department : What specific improvements should be made and why should each be made now instead of later? What residual risk will remain after safety measures are in place.
Develop comprehensive security strategy : As the CSO (Chief Security Officer) of a new company, you have been asked to develop a comprehensive security strategy.
Laws influencing information security and privacy : Laws Influencing Information Security and Privacy in the Federal Government ISOL 633 Portfolio Assignment 4 Select one U.S. federal government agency
Child pornography protection act : Why is the Child Pornography Protection Act 1996 struck down by the supreme court? What is Miller standard of obscenity?
Wedding dresses cost : When Vera Wang was the design director of Ralph Lauren Women's Wear, she was surprised to find that wedding dresses cost an average of $4,000.
Business reengineering process : What Information Technology resources could be utilised during the business reengineering process?
Services acquisition family of security controls : Include information from the System and Services Acquisition (SA) family of security controls

Reviews

Write a Review

Computer Network Security Questions & Answers

  Rate your current vigilance regarding cyber safety

Rate the impact of Malware from 1980 - 2019 and Rate your current vigilance regarding cyber safety - name of the Malware, and a short summary of the effects

  Write a paper about malware that could cripple organization

Write a paper about malware that could cripple your organization. You have been tasked to describe the ways in which different malware function. You also must provide at least one example.

  Describe the seven layers of the osi model

Describe the seven layers of the OSI model and how they interact with the connected layers. Discuss seven hardware or software components.

  Forensic challenges of umapolophous encryption

CSI6116 Network Security - Edith Cowan University - The forensic challenges of umapolophous encryption - What challenges stakeholders face due to offensive

  Define what Network Access Control

Define what a Network Access Control (NAC) is. How can a NAC be most effective for organizations in managing BYOD?

  Treats to a companies intellectual property

Day by day threats to a company's intellectual property have grown to an alarming rate over the years. After looking at your network security, structure there are three specific threats that we will focus on that could have a Hughimpact on your bu..

  What are the specific limitations of a computer system

1. what are the specific limitations of a computer system that provides no operating system? what must be done to load

  Information security management assignment

Information Security Management - Find and evaluate appropriate published information to remain up-to-date about threats, vulnerabilities and patches

  Discuss what security policies commerce should implement

For Reflective Article Paper 3, select an article that details current methods that are used to successfully prevent identity theft. Discuss what security policies commerce should implement to prevent it from happening.

  Develop the issp for the organisation

You are required to analyse the scenario on page 3 and develop the following ISSP for the organisation - You also need to include a section containing the justification of the contents of your policy as well as any assumptions that you have made.

  Create an information flow diagram using visio or dia

Create an information flow diagram, using Visio or Dia, which Illustrates how remote users will securely connect to the government agency's network.

  Develop the issp for the organisation

Assessment Task - You are required to analyse the scenario on page 3 and develop the following ISSP for the organisation described in the scenario: Access and use of sensitive information of the organisation

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd