Information Security Legal Considerations, homework help

  • Imagine your company asks you to train your team on key legal issues related to information security so that they will know what to do when different types of violations occur. You need to create a handout for the attendees so that they have something to refer to when the training is done, and they are back at their desks. As you construct your handout, include headings and subheadings as appropriate to make it easy for your audience to find key information.Create a handout covering key legal considerations related to information security, addressing the following:
    • Analyze the legal implications for officers of public companies in a regulated industry if they fail to secure information assets in their company from known threats and vulnerabilities.
    • Differentiate between policy violations and law breaking
    • Describe the appropriate response procedure following a reported information security related policy violation.
    • Describe the appropriate response procedures following a reported information security related criminal violation.

    The bullet points above outline the topics that are to be addressed in this assessment, and the scoring rubric informs the level of detail required at each of the competency levels covered in the rubric.

    Additional Requirements

    • Written communication: Written communication is free of errors that detract from the overall message.
    • APA formatting: Resources and citations are formatted according to APA (6th edition) style and formatting.
    • Page length: 4–5 double-spaced pages, not including the references page.
    • Font and font size: Times New Roman, 12 point.
Criteria Non-performance Basic Proficient Distinguished
Analyze the legal implications for officers of public companies in a regulated industry if they fail to secure information assets in their company from known threats and vulnerabilities.
Does not analyze the legal implications for officers of public companies in a regulated industry if they fail to secure information assets in their company from known threats and vulnerabilities. Analyzes incompletely or inaccurately the legal implications for officers of public companies in a regulated industry if they fail to secure information assets in their company from known threats and vulnerabilities. Analyzes the legal implications for officers of public companies in a regulated industry if they fail to secure information assets in their company from known threats and vulnerabilities. Analyze the legal implications for officers of public companies in a regulated industry if they fail to secure information assets in their company from known threats and vulnerabilities, including the use of supporting examples.
Differentiate between policy violations and law breaking.
Does not differentiate between policy violations and law breaking. Differentiates incompletely or inaccurately between policy violations and law breaking. Differentiates between policy violations and law breaking. Differentiates between policy violations and law breaking, including the use of supporting examples.
Describe the appropriate response procedure following a reported information security related policy violation.
Does not describe the appropriate response procedure following a reported information security related policy violation. Describes incompletely or inaccurately the appropriate response procedure following a reported information security related policy violation. Describes the appropriate response procedure following a reported information security related policy violation. Describes the appropriate response procedure following a reported information security related policy violation, including the use of supporting examples.
Describe the appropriate response procedures following a reported information security related criminal violation.
Does not describe the appropriate response procedures following a reported information security related criminal violation. Describes incompletely or inaccurately the appropriate response procedures following a reported information security related criminal violation. Describes the appropriate response procedures following a reported information security related criminal violation. Describes the appropriate response procedures following a reported information security related criminal violation, including the use of supporting examples.
Exhibit proficiency in writing and use of APA 6th edition.
Does not exhibit proficiency in writing and use of APA 6th edition. Exhibits a low level of proficiency in writing and use of APA 6th edition. Exhibits proficiency in writing and use of APA 6th edition. Exhibits a high level of proficiency in writing and use of APA 6th edition.
 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.