{br} STUCK with your assignment? {br} When is it due? {br} Get FREE assistance. Page Title: {title}{br} Page URL: {url}

Learning Goal: I’m working on a computer science writing question and need the explanation and answer to help me learn.

Legal and Ethical Recommendations Brief

Overview

Data security and data privacy protection are key aspects of the cybersecurity domain. To address the concerns of data security and privacy, a practitioner must account for a number of competing drivers, including regulatory compliance, operational impact, cost, as well as customer and employee satisfaction. As a practitioner, you will be called upon to identify requirements and make recommendations for technology-, policy-, and workforce-related approaches to ensure that appropriate measures are in place to adequately secure data and protect individual privacy in a constantly changing threat environment. In this project, you will recommend an approach to address the legal and ethical aspects of a security-relevant business decision.

In this assignment, you will demonstrate your mastery of the following course competency:

  • Make recommendations regarding legal and ethical issues in cybersecurity appropriate for the organizational environment

Scenario

Your instructor will provide you with the specific scenario for this project in an announcement. This scenario places you back in the role of an executive-level security consultant for the organization. The scenario will provide you additional details surrounding the organizations decisions on the proposal you addressed in Project One. To complete this task, you will prepare a legal and ethical recommendation brief for the internal stakeholder board in order to identify an approach to meeting the privacy protection, data security, and ethical needs of the scenario.

Prompt

Write a brief memorandum to the internal leadership board outlining your recommendations for meeting the needs of the scenario. You must address the critical elements listed below. The codes shown in brackets indicate the course competency to which each critical element is aligned.

  1. Recommend an approach to protecting data privacy. Support your recommendation with evidence from applicable laws or the corporate mission and values.
  2. Recommend an approach to ensuring data security. Support your recommendation with evidence from applicable laws or the corporate mission and values.
  3. Describe how ethical considerations about data use influenced your recommendations for security-enhancing safeguards.

Project Three scenario:

Helios Health Insurance has provided a service level agreement (SLA) that defines the relationship between Fit-vantage and Helios. The student is tasked with recommending implementation of the controls detailed in the SLA. (*THE SCENARIO IS ATTACHED BELOW*)


What to Submit

Your submission should be 1 to 3 pages in length and should use double spacing, 12-point Times New Roman font, and one-inch margins. Sources should be cited according to APA style. Use a file name that includes the course code, the assignment title, and your namefor example, CYB_100_Project_One_Neo_Anderson.docx.

Project Two Rubric

Criteria Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value
Data Privacy Meets Proficient criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner Recommends an approach to protecting data privacy, including support from applicable laws or the corporate mission and values Addresses Proficient criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 30
Data Security Meets Proficient criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner Recommends an approach to ensuring data security, including support from applicable laws or the corporate mission and values Addresses Proficient criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 30
Ethical Considerations Meets Proficient criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner Describes how ethical considerations about data use influenced the recommendations for security-enhancing safeguards Addresses Proficient criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 30
Articulation of Response Submission is free of errors related to grammar, spelling, and organization and is presented in a professional and easy-to-read format Submission has no major errors related to grammar, spelling, or organization Submission has some errors related to grammar, spelling, or organization that negatively impact readability and articulation of main ideas Submission has critical errors related to grammar, spelling, or organization that prevent understanding of ideas 10
Total: 100%
Our customer support team is here to answer your questions. Ask us anything!
WeCreativez WhatsApp Support
Support Executive
Frank
Available
WeCreativez WhatsApp Support
Support Supervisor
Brian
Available