Reference no: EM133059747
The Information Systems Security Impact Phase
You will evaluate the status of the security and its infrastructure for your case study from the perspective of professional and industry best practices, for example, CERT, SANS, (ISC)2, and existing national security and privacy acts, such as: the Health Insurance Portability and Accountability Act (HIPAA), the Computer Fraud and Abuse Act, the Electronic Communications Privacy Act (ECPA), the PATRIOT Act, the Gramm-Leach-Bliley Act (GLBA), the Sarbanes-Oxley Act (SOX), the Payment Card Industry Data Security Standard (PCI-DSS), or the Family Educational Rights and Privacy Act (FERPA). Depending on your case study some of the above regulations may or may not directly apply.
Research security and privacy acts that are pertinent to your case study in the South University Online Library and on the Internet by using the following keywords:
Health Insurance Portability and Accountability Act
Computer Fraud and Abuse Act
Electronic Communications Privacy Act
USA PATRIOT Act
USA PATRIOT Improvement and Reauthorization Act of 2005
Public Law 107-56
Gramm-Leach-Bliley Act
Sarbanes-Oxley Act
Payment Card Industry Data Security Standard
Family Educational Rights and Privacy Act (FERPA)
On the basis of your research, discuss the impacts of your case study analysis from the the security and privacy acts such as the ones listed above.