+1-415-670-9189
info@expertsmind.com
Retention policy and litigation hold notices
Course:- Computer Network Security
Reference No.:- EM13255




Assignment Help
Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site
Assignment Help >> Computer Network Security

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute. The following aspects of litigation and document retention are covered:

- Applicability of availability, integrity, and confidentiality (AIC) concepts

- Confidentiality of personal information and contracts

- Applicability of American Legal System in the litigation process involving corporate, public, and private institutions

- IP issues

- Risk analysis and incident response procedures

- Forensic examination

Project Scenario:

You are the Chief Information Officer for Premier College. Recently,your college has received a notice from the Department of Education about an investigation of your college based on the state-specific testing and compliance procedures. The Department of Educationhas sent a Litigation Hold Notice wherein they have asked all college staff and administrators of the college to preserve all relevant documents, records, data, contracts (regardless of its location or medium), and correspondence notes.

To understand the litigation hold notice received from the Department of Education, refer to the document titled "Project: Litigation Hold Notice" (IS3350.U7.TS4.doc) that your instructor has provided for you.

As a reminder, this Litigation Hold preservation obligation supersedes any existing statutory or regulatory document retention period or destructive schedule. The determination of what information may be potentially relevant is based upon content and substance and generally does not depend on the type of medium in which the information exists.

The information requested may exist in various forms, including paper records, hand-written notes, telephone log entries, email, and other electronic communications (including voicemail), word processing documents (including drafts, spreadsheets, databases, and calendars), telephone logs, electronic address books, personal digital assistant (PDA) like Palm Pilots and Blackberries, internet usage files, systems manuals, and network access information in their original format. All Electronically Stored Information (ESI)should be preserved in its originally created, or "native" format, along with related metadata. Relevant backup tapes and all indexes for those tapes should also be preserved. Reasonably accessible information must also be preserved, because such sources will need to be identified under compelling circumstances, and may need to be produced.If you have any doubts as to whether specific information is responsive, err on the side of preserving that information.

Deliverables

After receiving the Litigation Hold Notice, your next task is to do the following:

- Create adocument retention policy for your College that complies with all state and Federal regulations.

- Create a Litigation Hold Notice similar to the one provided to you in the handout titled "Project: Appendix A".

- Create a checklist of procedures that must be followed in order to comply with the Litigation Hold Notice.

- Prepare a summary of all your findings




Put your comment
 
Minimize


Ask Question & Get Answers from Experts
Browse some more (Computer Network Security) Materials
Design a security plan that describes counter-measures that will manage the threats that put the organisation's information assets at risk. The security plan should cover a
When you first started in this field, security was merely checking virus updates and making sure you put patches on your computers to protect the system from intruders. If t
Analyze a well-designed risk management plan to determine how it can prevent risk and control residual risk. Identify what you believe to be the most important step in the r
Business Continuity (BC) planning and Disaster Recovery (DR) planning are main elements in organizational security architectures. Write down the difference between them.
Discuss and explain how to hack the most common Web browser. Also include methods for securing Web browsers. Include at least two different Web browsers in your discussion.
How to encrypt a message using block cipher algorithms we covered in class? What are the similarities and differences between those algorithms and How to encrypt a message u
You cannot use built in functions which directly compute the MST or implement Prim's algorithm - You can assume that the user would not make any error in entering the link cos
Provide an outline of the overall configuration management system that is required to implement the security configuration of the network. Define the process for change manag