What are responsibilities of tasty candy

Assignment Help Management Information Sys
Reference no: EM131067334

Part 1: Impact of State Privacy Laws on InfoSec

Within California SB1386, one of the greatest concerns for information security and privacy professionals is language that includes liability related to the personally identifiable information of California residents, regardless of where that data is collected and stored.
Tasty Candy Store is a candy manufacturer in Las Vegas, Nevada. It has a special line of high-priced chocolate liqueur truffles that are a popular favorite of visitors to Las Vegas. Tasty Candy owners saw the potential for expanding their sales by creating a Web site, allowing customers to purchase their favorite sweet treats over the Internet. Their predictions were accurate, and soon the Tasty Candy Web site was busy processing orders from customers all over the world. Their customer base includes a large number of California residents.

Two years after Tasty Candy set up their Web site, the site fell victim to hackers who gained access to all of the credit card and demographic data for all of Tasty Candy's 12,000 customers.

Use the study materials and any additional research needed to fill in knowledge gaps. Then discuss the following:

What are the mitigating factors that would work to the benefit of Tasty Candy in meeting the requirements of SB1386 that pertain to information breach reporting related to California residents?

What are responsibilities of Tasty Candy in terms of reporting this breach of data specific to California residents?

Are there other state or federal regulations that would impact how and when Tasty Candy reported this data breach to the general public or to specific segments of their customer base?

Part 2: SB1386 Compliance Evaluation

Information security and privacy professionals are particularly concerned with language in SB1386 that includes liability related to personally identifiable information of California residents, regardless of where that data is collected and stored.

You are asked to speak at an information security conference on the topic of how commercial Web sites doing business with California residents can ensure they are in compliance with SB1386.

Use the study materials and any additional research needed to fill in knowledge gaps. Then discuss the following:

What benefit might an Internet-based company that sells to California residents enjoy by enforcing the standards and criteria of SB1386?

What challenges might an Internet-based company that sells to California residents experience specific to SB1386?

Respond to an audience member who posits that an Internet-based company's risk of running afoul of SB1386 is too small to spend resources trying to mitigate the risk.

Reference no: EM131067334

Questions Cloud

Proposed acquisition of a new production machine : Riverview Company is evaluating the proposed acquisition of a new production machine. The machine's base price is $200,000, and installation costs would amount to $28,000. Also, $10,000 in net working capital would be required at installation. The ma..
What is the accounting break-even point : Night Shades, Inc. ( NSI), manufactures biotech sunglasses. The variable materials cost is $ 10.48 per unit, and the variable labor cost is $ 6.89 per unit. a. What is the variable cost per unit? What are the total costs for the year? c. If the selli..
Change the radio frequencies : Cordless telephones often have a switch that allows you to change the radio frequencies that they use to communicate with their base unit. Why is this feature more important in cities than it is in rural areas?
What are responsibilities of tasty candy : What benefit might an Internet-based company that sells to California residents enjoy by enforcing the standards and criteria of SB1386? What challenges might an Internet-based company that sells to California residents experience specific to SB1386..
Aggression and violence in the media : Briefly describe at least one episode of a television show in which you observed aggression or violence - Identify the context in which the character(s) demonstrated aggression or violence.
Compute the percentage total return : Suppose a stock had an initial price of $ 72 per share, paid a dividend of $ 1.20 per share during the year, and had an ending share price of $ 79. Compute the percentage total return.
Total relevant cost for buying and making the product : Han Products manufactures 21.000 units of part S-6 each year for use on its production line At this level of activity the cost per unit for part S.6 is
What is the company pretax and aftertax cost of debt : Mudvayne, Inc., is trying to determine its cost of debt. The fi rm has a debt issue outstanding with 18 years to maturity that is quoted at 107 percent of face value. The issue makes semiannual payments and has an embedded cost of 6 percent annually...

Reviews

Write a Review

Management Information Sys Questions & Answers

  Describe events and your experience on weekly basis

Describe events and your experience on weekly basis (weeks 1-10 based on the Tutorial-Workshops Part B) - What did I do/hear/see?

  Internet and the technology

Internet and the Technology - how it will make our personal or professional lives better?

  Forward and reverse supply chain managementexplain in

forward and reverse supply chain managementexplain in detail how and why a company should manage both forward and

  Iso description and analysisinternational standards

iso description and analysisinternational standards organization questionsfind out more about iso 9000 from the web. 1.

  Computer security softwareby using computer security

computer security softwareby using computer security software and hacker tools to protect company systems employees

  Iso 9000 and the supply chaindescribe iso 9000 and its role

iso 9000 and the supply chaindescribe iso 9000 and its role in supply chains. search the internet for an example of a

  Explain the risks that businesses get exposed

CIS 560 - Determine whether employees should be allowed to bring personal wireless devices (such as the Apple iPad or the Motorola Xoom) to the workplace and access the Internet via the company's network to conduct business functions.

  Software information assurancedeliverable length 6-8

software information assurancedeliverable length 6-8 paragraphsdetails congratulations you are one of the worlds finest

  Information systems ituneswe are currently learning

information systems ituneswe are currently learning information systems and itunes is used as an example.1 who should

  Project quality and compliance

Project Quality and Compliance

  Global trends in business-to-business e-commerce

What are some global trends in business-to-business e-commerce? What is its long-term impact on competitive advantage in the international marketplace

  Evaluation of security technologies and methodologies

Write a 3- to 5-page evaluation of security technologies and methodologies used to mitigate information management risks. An evaluation is generally based on specific criteria and standards

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd