What the Key differences between PIPEDA and the Privacy Act

Assignment Help Computer Network Security
Reference no: EM132159668

Security & Laws Assignment -

Objectives -

This assignment is intended to expose you to some of the legal information that will be covered during the course. You are not expected to be experts in the field.

Do not simply cut & paste your answers, use your own words!

This is a term assignment: And it will take a while to do.

Answer the questions in the Blackboard quiz. Make sure you answer the questions below using your own words & explanation.

Q1. Under Canadian Law & Statutes, what are the tangible differences between CyberCrime, Computer Crime and Telecommunications Crime, in broad terms?

Q2. Which one of the 4 Canadian legal statutes listed below does not deal directly with Cyber, Computer & Telecommunications Crimes? Justify your answer.

  • Criminal Code of Canada
  • Privacy Act
  • Personal Information Protection and Electronic Documents Act
  • Copyright Act

Q3. According to CSEC, what are the COMSEC (Computer Security, Section 3) components? Just list them.

Q4. What are the RCMP's 10 recommended tips/steps for Cyber Security? (Just list the actual steps, not the details of how or why)

Using the Criminal Code link given above, referring specifically to Section 342.1, 342.2, 430(1.1), and Section 326, answer the questions below.

N.B.: The DoJ search engine isn't always as helpful as it could be, might be worth acquiring the "Full Document for Printing" and searching through it as well.

Q5. What is currently the maximum penalty in Canada for selling a device which is used primarily to fraudulently obtain a computer service?

Q6. True or False: Packet sniffing is a crime in Canada? Justify your answer.

Q7. A hacker who destroys data or denies access to data could be charged with which of the following crimes - Theft, Mischief, Hacking or Fraud? Pick one only. Justify your answer with the appropriate Criminal Code.

Using the Canadian Copyright Act links, referring specifically to Sections 42 and 80, answer the questions below.

Q8. In Canada, the maximum fine (in Canadian $) for an indictable offence related to distribution of Copyright material currently is: (Don't quote the whole section or even part of a section, just give the actual maximum fine for the offence using numbers, not words example: $1 or $9,500)

Q9. In Canada, is making a copy of a CD/DVD you purchased an offence? Justify your answer.

Q10. Is making a copy of a music CD on loan to you from a friend an offence in Canada? Justify your answer.

Using the Privacy related links provided, answer the questions below.

Q11. What Federal laws/statutes protect the privacy of individuals in Canada? Just list the name of the laws/statutes.

Q12. What are the 10 principles of fair information practices included in PIPEDA to protect personal information businesses have collected from individuals? Just list the 10 principles.

Q13. What are some of the key differences between PIPEDA and the Privacy Act? List at least 2 key differences between them.

Q14. Are private/public organizations in Quebec subjected to PIPEDA? Justify your answer.

Q15. What kinds of personal information are protected by PIPEDA? Three examples are fine.

Q16. What kinds of information are NOT protected by PIPEDA? Three examples are fine.

Q17. What 3 specific main elements are needed by Territorial/Provincial privacy laws in order obtain a ruling of "substantially similar" to PIPEDA from the Office of the Privacy Commissioner? Just list the three elements.

Attachment:- Assignment File.rar

Verified Expert

This assignment has been helpful in pointing out the overall provinces and cyber crime protection acts in Canada. From the first question to the fourth, this study has been helpful in evaluating several laws related to cyber security, telecommunication acts in Canada and how they are efficient. On the other hand, the criminal code law related section in this study has been helpful in developing and clearing out knowledge regarding the provinces and specifications of laws. The Copyright Laws in Canada and in which part they should be used has been vividly clear out in this study with examples. additionally, PIPEDA and the Privacy Act and their various use have been analyzed with specifications in this study.

Reference no: EM132159668

Questions Cloud

Regarding insurers and risk managers internal data : What is correct regarding insurers' and risk managers' internal data? A predictive approach to data analytics involves.
Is the population mean contained in the confidence interval : Is the population mean contained in the confidence interval? Be sure to justify your explanation
In what courses do you feel you received effective exposure : In what courses do you feel you received an effective exposure to content that helped to raise your awareness of multicultural issues and diversity?
Potentially apply for what kind of a patent : If a food manufacturer were to develop a new ornamental garlic roasting dish shaped and painted to look like a large garlic, the manufacturer could potentially
What the Key differences between PIPEDA and the Privacy Act : CST8230 Security & Laws Assignment - What are some of the key differences between PIPEDA and the Privacy Act? List at least 2 key differences between them
Numerous factors affect productivity : Numerous factors affect Productivity. Typically they can be categorized into methods, capital, quality, technology, and management.
What the theory argues is the correct way : How is "good" determined: Explain in one or two sentences what the theory argues is the correct way to determine what is right.
Six sigma quality-management techniques : Describe the similarities and differences between TQM and Six Sigma quality-management techniques.
How well the movie portrayed a disorder : The paper should relate the content of the popular presentation to concepts in class in a thoughtful fashion. I want a demonstration that you are thinking.

Reviews

len2159668

11/4/2018 9:28:27 PM

Deliverables - Since the answers are going to mostly come from the sources above, it is acceptable to not list the sources above – but only if those are the sources you used. However, if you obtain information from any other sites, you are required to submit the list of sources for each answer you submit in the document. Governments do randomly change links sometimes, no need to quote a new link. Answer the questions in the Blackboard quiz. The due date is specified in the quiz. Many of the questions ask for an opinion of law. Whether or not you answer “yes” or “no” or “whatever you think”, you may get full marks.

len2159668

11/4/2018 9:28:21 PM

What is needed for full marks is an answer that shows: You understood the question, You did the neccessary reading and research, You composed an answer which supports your opinion. Some questions have a right answer. All other answers are wrong. Read the questions in this document to get the full context and emphasis of the question and direction as to the type of answer required. The Blackboard questions will just have the question without emphasis or direction. Make sure you answer the questions below using your own words & explanation. Do NOT just cut-n-paste the answers – you may lose marks.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd