Legal Analysis

The graduate describes the legal requirements to address compliance with cybersecurity policies and procedures with an organization.

4045.1.2 : Protection Against Security Incidents

The graduate analyzes applicable laws and policies to legally protect the organization against security incidents.
Introduction

This course addresses the laws, regulations, authorities, and directives that inform the development of operational policies, best practices, and training. These standards assure legal compliance and minimize internal and external threats.

In this task, you will analyze legal constraints and liability concerns that threaten information security within the given organization and develop disaster recovery plans to ensure business continuity.
Scenario

Review the attached “TechFite Case Study” for information on the company being investigated.
You should base your responses on this scenario.

Requirements

Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. The similarity report that is provided when you submit your task can be used as a guide.

You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.

Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).

A. Demonstrate your knowledge of application of the law by doing the following:

  1. Explain how the Computer Fraud and Abuse Act and the Electronic Communications Privacy Act each specifically relate to the criminal activity described in the case study.
  2. Explain how three laws, regulations, or legal cases apply in the justification of legal action based upon negligence described in the case study.
  3. Discuss two instances in which duty of due care was lacking.
  4. Describe how the Sarbanes-Oxley Act (SOX) applies to the case study.

B. Discuss legal theories by doing the following:

  1. Explain how evidence in the case study supports claims of alleged criminal activity in TechFite.
    a. Identify who committed the alleged criminal acts and who were the victims.
    b. Explain how existing cybersecurity policies and procedures failed to prevent the alleged criminal activity.
  2. Explain how evidence in the case study supports claims of alleged acts of negligence in TechFite.
    a. Identify who was negligent and who were the victims.
    b. Explain how existing cybersecurity policies and procedures failed to prevent the negligent practices.

C. Prepare a summary (suggested length of 1–2 paragraphs) directed to senior management that
states the status of TechFite’s legal compliance.

D. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

E. Demonstrate professional communication in the content and presentation of your submission.
File Restrictions

File name may contain only letters, numbers, spaces, and these symbols: ! – _ . * ‘ ( )
File size limit: 200 MB
File types allowed: doc, docx, rtf, xls, xlsx, ppt, pptx, odt, pdf, txt, qt, mov, mpg, avi, mp3, wav, mp4, wma, flv, asf, mpeg, wmv, m4v, svg, tif, tiff, jpeg, jpg, gif, png, zip, rar, tar, 7z

Do you need urgent help with this or a similar assignment? We got you. Simply place your order and leave the rest to our experts.

Order Now

Quality Guaranteed!

Written From Scratch.

We Keep Time!

Scroll to Top