Prepare a checklist to ensure section 404 compliance

Assignment Help Management Information Sys
Reference no: EM131587008

1.Learning Objectives and Outcomes

Assess the compliance requirements of Section 404 and prepare a checklist to ensure Section 404 compliance.

Assignment Requirements

This assignment builds upon the role-play conducted in the Roles section of this lesson. In this assignment, you play the role of an internal auditor. You've been given the task of creating a specific checklist to ensure compliance with Section 404.

You need to review the requirements of Section 404 and create a list identifying compliance requirements. The checklist should include information about reporting requirements, audits, IT security, and any other topics relevant to Section 404 compliance.

The checklist should include information on internal controls over financial reporting (ICFR) controls as well as any known difficulties in complying with Section 404.

Required Resources

None

Submission Requirements

Format: Microsoft Word

Font: Arial 10-point size, Double-space

Citation Style: Follow your school's preferred style guide

Length: No more than 500 words

2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssignTM services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution's policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

2.Assignment: Office of Management and Budget Breach Notification

Learning Objectives and Outcomes

Examine the elements required by the Office of Management and Budget (OMB) for a breach notification plan for federal agencies and develop a checklist to address the compliance requirements.

Assignment Requirements

In this assignment, you play the role of an inspector general. You've been given the assignment of reviewing the Office of Management and Budget (OMB) breach notification plan requirements and submitting a checklist to senior management regarding the steps necessary to comply. You need to review the breach notification plan requirements and create a checklist to be submitted to senior management.

The checklist should identify all OMB requirements for a breach notification plan, along with an example of actions that could be taken to comply with the requirement.

Required Resources

None

Submission Requirements

Format: Microsoft Word

Font: Arial 10-point size, Double-space

Citation Style: Follow your school's preferred style guide

Length: No more than 500 words

3.Learning Objectives and Outcomes

Assess the compliance requirements of Section 404 and prepare a checklist to ensure Section 404 compliance.

Assignment Requirements

This assignment builds upon the role-play conducted in the Roles section of this lesson. In this assignment, you play the role of an internal auditor. You've been given the task of creating a specific checklist to ensure compliance with Section 404.

You need to review the requirements of Section 404 and create a list identifying compliance requirements. The checklist should include information about reporting requirements, audits, IT security, and any other topics relevant to Section 404 compliance. The checklist should include information on internal controls over financial reporting (ICFR) controls as well as any known difficulties in complying with Section 404.

Required Resources

None

Submission Requirements

Format: Microsoft Word

Font: Arial 10-point size, Double-space

Citation Style: Follow your school's preferred style guide.

4.Learning Objectives and Outcomes

Describe violation of copyright privileges as applied to a scenario.

Assignment Requirements

This assignment builds upon Discussion: Copyright and its Various Owner Rights. In this assignment, you, the original composer and performing artist of a hot new pop song, need to:

Describe the specific intellectual property laws that were violated in your case.

Propose remedies the law provides for the listed violations.

Write a summary of your findings. Prior summarizing, list your major findings from the discussion and this assignment in a bullet-point list. Collate all your findings in the summary keeping in mind the evaluation questions on which you will be graded.

Required Resources

None

Submission Requirements

Format: Microsoft Word

Font: Arial 10-point size, Double-space

Citation Style: Follow your school's preferred style guide

Length: No more than 500 words.

5.Learning Objectives and Outcomes

Analyze online software license agreements and prepare a recommendation regarding the type of license that is appropriate for a new software product.

Assignment Requirements

Imagine that you are a paralegal in a software development firm. You've been given the task of making a recommendation regarding the type of software license agreement that should be used with your company's new product offering. The product will be available for purchase online, and then instant download. It will also be offered via physical media which will be available in retail markets.

In making your recommendation, you should consider all the types of licenses available and consider the delivery method. For each license type considered, provide the rationale behind why you selected or rejected that base license agreement type for your product. Create a report of your recommendation to be presented to senior management and the product lawyer.

Learning Objectives and Outcomes

Analyze a detailed report on data theft and write an executive summary of the findings.

6.Assignment Requirements

To complete this assignment, you need to access the 2014 case study by Verizon on data breaches.

Your tasks for this assignment are:

Review the case study.

Establish a cause-effect analysis on why financial information is so popular with organized criminals.

Collate your findings in the form of an executive summary.

Required Resources

Case study by Verizon on data breaches

Submission Requirements

Format: Microsoft Word

Font: Arial 10-point size, Double-space

Citation Style: Follow your school's preferred style guide

Length: No more than 500 words

Reference no: EM131587008

Questions Cloud

Active monetary and fiscal policy : This week requires the student to address six unresolved issues in macroeconomics, each of which is central to current political debates.
How many nonnegative solutions are there to the equation : Consider the function f to be defined on the set of finite graphs G and let f(G) = |V(G)|. What is the range of f?
How depression affects the brain : How depression affects the brain, How depression affects males and Females differently
The government reduces the minimum nominal wage : a) The government reduces the minimum nominal wage. b) The government increases Temporary Assistance to Needy Families (TANF) payments, government transfers.
Prepare a checklist to ensure section 404 compliance : Assess the compliance requirements of Section 404 and prepare a checklist to ensure Section 404 compliance.
How many edges does a k-regular graph with n vertices have : At the Delicious Pie Bakery, there are 18 banana-containing pies, 23 chocolate-containing pies, 12 peanut-butter-containing pies.
Course project - data in arrays : In this portion of the Course Project we will be working array You can think of a class as the closet and arrays are where you store what goes in the closet.
Describe the antecedent influences on gestalt psychology : Describe the antecedent influences on Gestalt psychology, Describe some of the principles of perceptual organization
Draw a binary decision tree for sorting playing cards : How many ways are there to distribute 5 past-their-prime vegetables (a squash, a crown of broccoli, a tomato, a clump of Swiss chard, and a large radish).

Reviews

Write a Review

Management Information Sys Questions & Answers

  Structured approach to decision makingin no more than 1750

structured approach to decision makingin no more than 1750 words i would like a report ofa explain and analyze the 5

  Types of forecasting

We have spent quite a bit of time studying the types of forecasting including producing some useful computer based models. For this individual project, find a "peer reviewed" article that involves the use of one or more forecasting techniques

  Construct a cumulative frequency distribution of this data

The number of families who used the Minneapolis YWCA day care service was recorded over a 30-day period.- Construct a cumulative frequency distribution of this data.

  Overview of the server-side and client-side hardware

In this essay, you will provide an overview of the server-side and client-side hardware and software requirements of Naval Aviation Logistics Command Management

  How does a dictionary attack work? just an illustration

How does a dictionary attack work? just an illustration, short and precise

  Discuss how you would use security restriction policies

Discuss how the Windows® firewall differs from a hardware firewall. When would you not want to use a Windows®-based firewall?

  Show the responsibilities of an operations manager

Operations Manager - Improving Processes Using Technology - One of the responsibilities of an operations manager is to improve processes used to produce products.

  Compare and contrast agile development approaches

This is one of the classic case studies on the manner in which an organization adopts agile project management and makes the organization more competitive and successful. It highlights the best practices and critical success factors that contribut..

  Identify the internal and external stakeholders

Identify the Internal and External Stakeholders.Discuss how internal or external stakeholders have influenced the situation in a positive or negative way?How will you consider stakeholders in your solution to the problem?How will you motivate individ..

  A purpose statement for the code of ethics

A purpose statement for the code of ethics, including why it is needed and why it is beneficial to both the organization and the employees

  Calculate the information capacity of the channel

Calculate the information capacity of the channel.-  Calculate the maximum symbol rate for which error-free transmission over the channel is possible.

  Who are the key stakeholders involved in particular area

Scenario When promoted to the new vice president of BOLDFlash's Mobile Division, specializing in high-tech storage components for electronic devices, Roger Cahill understood very clearly that his top priority was to get the struggling division bac..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd