Information Security Legal Considerations, homework help

Other

  • Imagine your company asks you to train your team on key legal issues related to information security so that they will know what to do when different types of violations occur. You need to create a handout for the attendees so that they have something to refer to when the training is done, and they are back at their desks. As you construct your handout, include headings and subheadings as appropriate to make it easy for your audience to find key information.Create a handout covering key legal considerations related to information security, addressing the following:
    • Analyze the legal implications for officers of public companies in a regulated industry if they fail to secure information assets in their company from known threats and vulnerabilities.
    • Differentiate between policy violations and law breaking
    • Describe the appropriate response procedure following a reported information security related policy violation.
    • Describe the appropriate response procedures following a reported information security related criminal violation.

    The bullet points above outline the topics that are to be addressed in this assessment, and the scoring rubric informs the level of detail required at each of the competency levels covered in the rubric.

    Additional Requirements

    • Written communication: Written communication is free of errors that detract from the overall message.
    • APA formatting: Resources and citations are formatted according to APA (6th edition) style and formatting.
    • Page length: 4–5 double-spaced pages, not including the references page.
    • Font and font size: Times New Roman, 12 point.
Criteria Non-performance Basic Proficient Distinguished
Analyze the legal implications for officers of public companies in a regulated industry if they fail to secure information assets in their company from known threats and vulnerabilities.
Does not analyze the legal implications for officers of public companies in a regulated industry if they fail to secure information assets in their company from known threats and vulnerabilities. Analyzes incompletely or inaccurately the legal implications for officers of public companies in a regulated industry if they fail to secure information assets in their company from known threats and vulnerabilities. Analyzes the legal implications for officers of public companies in a regulated industry if they fail to secure information assets in their company from known threats and vulnerabilities. Analyze the legal implications for officers of public companies in a regulated industry if they fail to secure information assets in their company from known threats and vulnerabilities, including the use of supporting examples.
Differentiate between policy violations and law breaking.
Does not differentiate between policy violations and law breaking. Differentiates incompletely or inaccurately between policy violations and law breaking. Differentiates between policy violations and law breaking. Differentiates between policy violations and law breaking, including the use of supporting examples.
Describe the appropriate response procedure following a reported information security related policy violation.
Does not describe the appropriate response procedure following a reported information security related policy violation. Describes incompletely or inaccurately the appropriate response procedure following a reported information security related policy violation. Describes the appropriate response procedure following a reported information security related policy violation. Describes the appropriate response procedure following a reported information security related policy violation, including the use of supporting examples.
Describe the appropriate response procedures following a reported information security related criminal violation.
Does not describe the appropriate response procedures following a reported information security related criminal violation. Describes incompletely or inaccurately the appropriate response procedures following a reported information security related criminal violation. Describes the appropriate response procedures following a reported information security related criminal violation. Describes the appropriate response procedures following a reported information security related criminal violation, including the use of supporting examples.
Exhibit proficiency in writing and use of APA 6th edition.
Does not exhibit proficiency in writing and use of APA 6th edition. Exhibits a low level of proficiency in writing and use of APA 6th edition. Exhibits proficiency in writing and use of APA 6th edition. Exhibits a high level of proficiency in writing and use of APA 6th edition.
#write essay #research paper #blog writing #article writing #academic writer #reflective paper #essay pro #types of essays #write my essay #reflective essay #paper writer #essay writing service #essay writer free #essay helper #write my paper #assignment writer #write my essay for me #write an essay for me #uk essay #thesis writer #dissertation writing services #writing a research paper #academic essay #dissertation help #easy essay #do my essay #paper writing service #buy essay #essay writing help #essay service #dissertation writing #online essay writer #write my paper for me #types of essay writing #essay writing website #write my essay for free #reflective report #type my essay #thesis writing services #write paper for me #research paper writing service #essay paper #professional essay writers #write my essay online #essay help online #write my research paper #dissertation writing help #websites that write papers for you for free #write my essay for me cheap #pay someone to write my paper #pay someone to write my research paper #Essaywriting #Academicwriting #Assignmenthelp #Nursingassignment #Nursinghomework #Psychologyassignment #Physicsassignment #Philosophyassignment #Religionassignment #History #Writing #writingtips #Students #universityassignment #onlinewriting #savvyessaywriters #onlineprowriters #assignmentcollection #excelsiorwriters #writinghub #study #exclusivewritings #myassignmentgeek #expertwriters #art #transcription #grammer #college #highschool #StudentsHelpingStudents #studentshirt #StudentShoe #StudentShoes #studentshoponline #studentshopping #studentshouse #StudentShoutout #studentshowcase2017 #StudentsHub #studentsieuczy #StudentsIn #studentsinberlin #studentsinbusiness #StudentsInDubai #studentsininternational