Impact of state privacy laws on infosec

Assignment Help Basic Computer Science
Reference no: EM131514282

Impact of State Privacy Laws on InfoSec

  • Within California SB1386, one of the greatest concerns for information security and privacy professionals is language that includes liability related to the personally identifiable information of California residents, regardless of where that data is collected and stored.
  • Tasty Candy Store is a candy manufacturer in Las Vegas, Nevada. It has a special line of high-priced chocolate liqueur truffles that are a popular favorite of visitors to Las Vegas. Tasty Candy owners saw the potential for expanding their sales by creating a Web site, allowing customers to purchase their favorite sweet treats over the Internet. Their predictions were accurate, and soon the Tasty Candy Web site was busy processing orders from customers all over the world. Their customer base includes a large number of California residents.
  • Two years after Tasty Candy set up their Web site, the site fell victim to hackers who gained access to all of the credit card and demographic data for all of Tasty Candy's 12,000 customers.
  • Use the study materials and any additional research needed to fill in knowledge gaps. Then discuss the following:
  • What are the mitigating factors that would work to the benefit of Tasty Candy in meeting the requirements of SB1386 that pertain to information breach reporting related to California residents?
  • What are responsibilities of Tasty Candy in terms of reporting this breach of data specific to California residents?
  • Are there other state or federal regulations that would impact how and when Tasty Candy reported this data breach to the general public or to specific segments of their customer base?

Reference no: EM131514282

Questions Cloud

Components of the computers to ensure : As you continue to review the functionality of various operating systems, you also have to look at various components of the computers.
Performed services for patient who had dental plan insurance : Performed services for patients who had dental plan insurance. At January 31, $817 of such services were performed but not yet recorded.
Determining the compliance evaluation : Information security and privacy professionals are particularly concerned with language in SB1386 that includes liability related to personally identifiable.
Implement strategies to support children : Implement strategies to support children or young people who require additional support - Support behaviour of children and young people
Impact of state privacy laws on infosec : Within California SB1386, one of the greatest concerns for information security and privacy professionals is language that includes liability related.
How might you frame certain decisions to benefit : As a marketer, how might you frame certain decisions to benefit from the disparities that arise in one's cognitive accounting?
Transmedia production : The final project can be any form of newer media. This generally means it can be almost anything except a traditional linear narrative drama or documentary.
Describe the role of statistics in business decision-making : Contrast quantitative data and qualitative data. Use two peer reviewed references. Describe the role of statistics in business decision-making.
Benefits and challenges of cloud computing : What are some of the benefits and challenges of cloud computing based on your research?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd