CK CYB 260 Module Three Activity Worksheet
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
260
Subject
Law
Date
Jan 9, 2024
Type
docx
Pages
3
Uploaded by ChiefAntelopeMaster249
CYB 260 Module Three Worksheet
Complete the table below by filling in the three blank columns for each law.
Law
Briefly describe the law.
Whose rights are covered by the law?
Who in an organization is responsible
for ensuring compliance with the law?
Red Flags Rule
Requires financial institutions and
certain creditors to develop programs
identifying and mitigating identity theft
risks. Part of the Fair and Accurate Credit
Transactions Act (FACTA) of 2003.
This rule focuses on protecting
consumers from the risks and damages
associated with identity theft. It aims to
ensure that personal and financial data
are handled securely and with vigilance
against identity theft.
Typically falls to the compliance
department, a chief compliance officer,
or other designated officials responsible
for overseeing fraud and identity theft
prevention programs.
Payment Card Industry
Standards
A set of security standards designed to
ensure that all entities that store,
process, or transmit credit card
information maintain a secure
environment. Established by the
Payment Card Industry Security
Standards Council.
This standard primarily safeguards
cardholder data. It protects personal and
financial information associated with
payment cards to prevent misuse, fraud,
and data breaches.
Typically falls to the IT department,
specifically the information security
team. However, it also involves a cross-
functional effort, often requiring
coordination with legal, compliance, and
operational departments.
Children’s Online Privacy
Protection Act (COPPA)
COPPA imposes certain requirements on
operators of websites or online services
that are either directed at children
under the age of 13 or knowingly collect
personal information from children
under 13. It also requires website
operators to post clear privacy policies,
provide direct notice to parents, and
maintain the confidentiality, security,
and integrity of the personal information
collected.
COPPA is specifically designed to protect
the privacy and safety of children under
13 years of age in the digital space. It
safeguards children's personal
information on websites and online
services, including social networks,
games, and mobile apps.
This responsibility falls on the operators
of websites and online services that
target children or collect data from
children, including content providers,
app developers, and online marketing
departments.
Law
Briefly describe the law.
Whose rights are covered by the law?
Who in an organization is responsible
for ensuring compliance with the law?
Children’s Internet
Protection Act (CIPA)
Requires schools and libraries that
receive federal funding through the E-
rate program to implement internet
safety policies and to use technology
protection measures (such as filters) to
block or filter internet access to certain
visual depictions.
CIPA is focused on protecting children in
schools and libraries from exposure to
inappropriate content on the internet. It
safeguards minors from harmful
materials and online interactions,
providing a safe online educational
environment.
Typically the responsibility of the
administrators of schools and libraries
that benefit from the E-rate program.
This includes school principals, library
directors, and IT staff who are
responsible for implementing filtering
technology and enforcing the internet
safety policy.
Federal Information
Security Management Act
(FISMA)
FISMA is a United States federal law part
of the Electronic Government Act of
2002. It requires federal agencies to
develop, document, and implement an
agency-wide program to provide
information security for the information
and information systems that support
the operations of the agency, including
those managed by another agency,
contractor, or other source.
FISMA is not about individual rights but
rather about protecting the nation's
critical information infrastructure. It
ensures the security, integrity, and
availability of federal information
systems and data.
Typically falls on the heads of each
federal agency. Within each agency,
Chief Information Officers (CIOs), Chief
Information Security Officers (CISOs),
and IT security staff play key roles in
implementing, managing, and
maintaining the required security
programs and ensuring compliance.
State Data Breach
Notification Laws
These laws, which vary by state within
the United States, require organizations
to notify individuals of breaches that
involve personally identifiable
information. The specifics of these laws,
including what constitutes a breach, the
timeframe for notification, and the
method of notification, can differ
significantly from state to state.
These laws protect the rights of
individuals to be informed about
unauthorized access to their personal
and sensitive information. They aim to
empower individuals to take proactive
measures in the event of data breaches
that might compromise their personal
data.
Typically overseen by the legal and
compliance departments within an
organization. Additionally, IT
departments, particularly those involved
in data security and information
management, play a crucial role in
executing the processes in accordance
with state laws.
Law
Briefly describe the law.
Whose rights are covered by the law?
Who in an organization is responsible
for ensuring compliance with the law?
U.S. Constitution
The Constitution of the United States is
the supreme law of the United States
and lays the foundation for the structure
and principles of the federal
government. It consists of a preamble,
seven articles, and 27 amendments. The
Constitution outlines the powers of the
government, the rights of the states, and
the essential freedoms and rights of
individuals. Specific amendments, such
as the First (freedom of speech, religion,
press, assembly, and petition) and
Fourth (protection against unreasonable
searches and seizures), are particularly
significant for issues related to privacy
and personal rights.
Covers a broad range of rights and
liberties, including but not limited to
freedom of speech, religion, press,
assembly, and the right to a fair trial. It
also encompasses rights related to
privacy and protection against
unreasonable government intrusion.
The responsibility to uphold and
interpret the U.S. Constitution primarily
lies with the federal government,
including Congress, the President, and
the Federal Courts, particularly the
Supreme Court. All branches of the
government are bound to operate within
the parameters set by the Constitution.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help