What are responsibilities of tasty candy

Assignment Help Management Information Sys
Reference no: EM131067334

Part 1: Impact of State Privacy Laws on InfoSec

Within California SB1386, one of the greatest concerns for information security and privacy professionals is language that includes liability related to the personally identifiable information of California residents, regardless of where that data is collected and stored.
Tasty Candy Store is a candy manufacturer in Las Vegas, Nevada. It has a special line of high-priced chocolate liqueur truffles that are a popular favorite of visitors to Las Vegas. Tasty Candy owners saw the potential for expanding their sales by creating a Web site, allowing customers to purchase their favorite sweet treats over the Internet. Their predictions were accurate, and soon the Tasty Candy Web site was busy processing orders from customers all over the world. Their customer base includes a large number of California residents.

Two years after Tasty Candy set up their Web site, the site fell victim to hackers who gained access to all of the credit card and demographic data for all of Tasty Candy's 12,000 customers.

Use the study materials and any additional research needed to fill in knowledge gaps. Then discuss the following:

What are the mitigating factors that would work to the benefit of Tasty Candy in meeting the requirements of SB1386 that pertain to information breach reporting related to California residents?

What are responsibilities of Tasty Candy in terms of reporting this breach of data specific to California residents?

Are there other state or federal regulations that would impact how and when Tasty Candy reported this data breach to the general public or to specific segments of their customer base?

Part 2: SB1386 Compliance Evaluation

Information security and privacy professionals are particularly concerned with language in SB1386 that includes liability related to personally identifiable information of California residents, regardless of where that data is collected and stored.

You are asked to speak at an information security conference on the topic of how commercial Web sites doing business with California residents can ensure they are in compliance with SB1386.

Use the study materials and any additional research needed to fill in knowledge gaps. Then discuss the following:

What benefit might an Internet-based company that sells to California residents enjoy by enforcing the standards and criteria of SB1386?

What challenges might an Internet-based company that sells to California residents experience specific to SB1386?

Respond to an audience member who posits that an Internet-based company's risk of running afoul of SB1386 is too small to spend resources trying to mitigate the risk.

Reference no: EM131067334

Questions Cloud

Proposed acquisition of a new production machine : Riverview Company is evaluating the proposed acquisition of a new production machine. The machine's base price is $200,000, and installation costs would amount to $28,000. Also, $10,000 in net working capital would be required at installation. The ma..
What is the accounting break-even point : Night Shades, Inc. ( NSI), manufactures biotech sunglasses. The variable materials cost is $ 10.48 per unit, and the variable labor cost is $ 6.89 per unit. a. What is the variable cost per unit? What are the total costs for the year? c. If the selli..
Change the radio frequencies : Cordless telephones often have a switch that allows you to change the radio frequencies that they use to communicate with their base unit. Why is this feature more important in cities than it is in rural areas?
What are responsibilities of tasty candy : What benefit might an Internet-based company that sells to California residents enjoy by enforcing the standards and criteria of SB1386? What challenges might an Internet-based company that sells to California residents experience specific to SB1386..
Aggression and violence in the media : Briefly describe at least one episode of a television show in which you observed aggression or violence - Identify the context in which the character(s) demonstrated aggression or violence.
Compute the percentage total return : Suppose a stock had an initial price of $ 72 per share, paid a dividend of $ 1.20 per share during the year, and had an ending share price of $ 79. Compute the percentage total return.
Total relevant cost for buying and making the product : Han Products manufactures 21.000 units of part S-6 each year for use on its production line At this level of activity the cost per unit for part S.6 is
What is the company pretax and aftertax cost of debt : Mudvayne, Inc., is trying to determine its cost of debt. The fi rm has a debt issue outstanding with 18 years to maturity that is quoted at 107 percent of face value. The issue makes semiannual payments and has an embedded cost of 6 percent annually...

Reviews

Write a Review

Management Information Sys Questions & Answers

  How to create crm system flow

How to create crm system flow

  Technology and the it field

IT field and Technology - Is there proof to support that IT is becoming a dying profession

  Principles for policy and standards development

Select two principles for policy and standards development (accountability, awareness, ethics, multidisciplinary, proportionality, integration, defense-in-depth, timeliness, reassessment, democracy, internal control, adversary, least privilege, co..

  You have recently been hired to improve the quality of

you have recently been hired to improve the quality of services at a healthcare organization. your supervisor would

  Description of information systemsgive a specific example

description of information systemsgive a specific example of how a company illustrates the three key principles of good

  Why it projects failnumerous research findings indicate

why it projects failnumerous research findings indicate that approximately 80 of it projects are considered failures -

  Limiting characteristics of todays computing systemsfor

limiting characteristics of todays computing systemsfor most business information processing what are some the critical

  Information and organization

Information and Organization - communication and information are critical to the effective operation of an organization,

  Explain the role of software in project management

Explain the role of software in project management and Discuss how project management techniques can be used to improve the completion of projects

  Show the impact of technology on business

Impact of technology on business -  Identify non-software technology that might be useful to each industry

  Dissemination of pr information globally

Identify three examples of how technology has assisted in the dissemination of PR information globally

  Prototypes are sometimes used in the development process

prototypes are sometimes used in the development process and some end up as the actual solutionsprototypes are

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd