4045.1.1: Compliance Legal Requirements
The graduate describes the legal requirements to address compliance with cybersecurity policies and procedures with an organization.
4045.1.2: Protection Against Security Incidents
The graduate analyzes applicable laws and policies to legally protect the organization against security incidents.
This course addresses the laws, regulations, authorities, and directives that inform the development of operational policies, best practices, and training. These standards assure legal compliance and minimize internal and external threats.
In this task, you will analyze legal constraints and liability concerns that threaten information security within the given organization and develop disaster recovery plans to ensure business continuity.
See the attached “TechFite Case Study” for information on the company being investigated. You should base your responses on this scenario.
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. An originality report is provided when you submit your task that can be used as a guide.
You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.
A. Demonstrate your knowledge of application of the law by doing the following:
- Explain how the Computer Fraud and Abuse Act and the Electronic Communications Privacy Act each specifically relate to the criminal activity described in the case study.
- Explain how three laws, regulations, or legal cases apply in the justification of legal action based upon negligence described in the case study.
- Discuss two instances in which duty of due care was lacking.
- Describe how the Sarbanes-Oxley Act (SOX) applies to the case study.
B. Discuss legal theories by doing the following:
- Explain how evidence in the case study supports claims of alleged criminal activity in TechFite.
a. Identify who committed the alleged criminal acts and who were the victims.
b. Explain how existing cybersecurity policies and procedures failed to prevent the alleged criminal activity.
- Explain how evidence in the case study supports claims of alleged acts of negligence in TechFite.
a. Identify who was negligent and who were the victims.
b. Explain how existing cybersecurity policies and procedures failed to prevent the negligent practices.
C. Prepare a multimedia presentation with notes (e.g., Microsoft PowerPoint, Apple Keynote) (suggested length of 3–5 slides) to s
Investigation of the contenders is important to outline the careful online life system. The contenders and their quality of the different online networking gathering can affect the market technique of the business. Along these lines, it is vital to investigate the contender for planning a compelling procedure. There is a more prominent possibility that the immediate contenders of the organizations will utilize Facebook pages for advancement, in this manner searching for their pages and the offers made by them is fundamental for making the following stride (Ray). In the book The Next Generation of Businesses Engagement Dave Evans cites " 'it's not really terrible when you do that,'"(4). concurring with Ray. Taking a gander at what different organizations are doing make you mindful of the odds and choices for your organization to succeed more than the contenders (Evans). Looking for around and attempting diverse strategies that different organizations utilized before is one of the basic and viable approaches to build up an independent company. 3.3 Developing Message for Customers: The following stage in the improvement of internet based life methodology is making an incredible message for the client. The message must be planned as understanding the intended interest group with the goal that it could have a higher intrigue. In the meantime, the message for the clients must lock in. In the present time, different diverse methods of making the messages can be used. These incorporate recordings, composed, visual or sound substance. The substance made for publicizing the item or administrations on the internet based life should be inventive, compact and successful to leave an effect on the crowd. Making studies in the applications that give this apparatus is a useful route for building up a message (Evans). Twitter for instance, it gives the study device to free for all clients whether it is a business account or an individual record. The apparatus itself demonstrates the result of the study after the clients partake. Rivals (Different perspectives): Rivals may guarantee that online networking is definitely not an accommodating apparatus for independent companies to showcase and publicize their items. As per the exploration work led by Hensel and Deis, the utilization of web-based social networking showcasing isn't as compelling for independent companies as it is exhibited. Guaranteeing that internet based life the board requires a specialist in the field, the individual who might know about dealing with the devices accessible alongside taking care of the steady inclination for the partners just as the contenders. They trust that so as to have the necessities of this perspective to internet based life showcasing, a prepared individual is required. I concur with Hensel and Deis about having an involvement in utilizing internet based life however in this day and age there are kids who are in the age of six utilizing the media legitimately. Also the expense of contracting the individual 'specialists' for web based life advertising, arrangement of preparing for adjusting to the way of life of the association and the move in mechanical utilization of the association from the customary to the online discussion results in mind-boggling expenses, which is hard to bring about by independent companies. I am not a prepared individual nor am I a specialist. In 2014, I opened a little attire shop that I took care of myself. I had the shop open for couple a very long time with assortment of merchandise that buyers>GET ANSWER