Examine digital threats in the context of information security and compliance.
· List the applicable laws and policies related to cyber defense and describe the major components of each pertaining to the storage and transmission of data.
· Describe their responsibilities related to the handling of data as it pertains to legal, ethical and/or agency auditing issues.
· Interpret jurisdictional laws and regulations as they relate to intellectual property, privacy, and criminal proceedings.
· Describe how the type of legal dispute (civil, criminal, private) affects the evidence used to resolve it.
· Assess an organization’s compliance with regulatory requirements and ethical standards.
Recent Comments