Prepare a checklist to ensure section 404 compliance

Assignment Help Management Information Sys
Reference no: EM131587008

1.Learning Objectives and Outcomes

Assess the compliance requirements of Section 404 and prepare a checklist to ensure Section 404 compliance.

Assignment Requirements

This assignment builds upon the role-play conducted in the Roles section of this lesson. In this assignment, you play the role of an internal auditor. You've been given the task of creating a specific checklist to ensure compliance with Section 404.

You need to review the requirements of Section 404 and create a list identifying compliance requirements. The checklist should include information about reporting requirements, audits, IT security, and any other topics relevant to Section 404 compliance.

The checklist should include information on internal controls over financial reporting (ICFR) controls as well as any known difficulties in complying with Section 404.

Required Resources

None

Submission Requirements

Format: Microsoft Word

Font: Arial 10-point size, Double-space

Citation Style: Follow your school's preferred style guide

Length: No more than 500 words

2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssignTM services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution's policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

2.Assignment: Office of Management and Budget Breach Notification

Learning Objectives and Outcomes

Examine the elements required by the Office of Management and Budget (OMB) for a breach notification plan for federal agencies and develop a checklist to address the compliance requirements.

Assignment Requirements

In this assignment, you play the role of an inspector general. You've been given the assignment of reviewing the Office of Management and Budget (OMB) breach notification plan requirements and submitting a checklist to senior management regarding the steps necessary to comply. You need to review the breach notification plan requirements and create a checklist to be submitted to senior management.

The checklist should identify all OMB requirements for a breach notification plan, along with an example of actions that could be taken to comply with the requirement.

Required Resources

None

Submission Requirements

Format: Microsoft Word

Font: Arial 10-point size, Double-space

Citation Style: Follow your school's preferred style guide

Length: No more than 500 words

3.Learning Objectives and Outcomes

Assess the compliance requirements of Section 404 and prepare a checklist to ensure Section 404 compliance.

Assignment Requirements

This assignment builds upon the role-play conducted in the Roles section of this lesson. In this assignment, you play the role of an internal auditor. You've been given the task of creating a specific checklist to ensure compliance with Section 404.

You need to review the requirements of Section 404 and create a list identifying compliance requirements. The checklist should include information about reporting requirements, audits, IT security, and any other topics relevant to Section 404 compliance. The checklist should include information on internal controls over financial reporting (ICFR) controls as well as any known difficulties in complying with Section 404.

Required Resources

None

Submission Requirements

Format: Microsoft Word

Font: Arial 10-point size, Double-space

Citation Style: Follow your school's preferred style guide.

4.Learning Objectives and Outcomes

Describe violation of copyright privileges as applied to a scenario.

Assignment Requirements

This assignment builds upon Discussion: Copyright and its Various Owner Rights. In this assignment, you, the original composer and performing artist of a hot new pop song, need to:

Describe the specific intellectual property laws that were violated in your case.

Propose remedies the law provides for the listed violations.

Write a summary of your findings. Prior summarizing, list your major findings from the discussion and this assignment in a bullet-point list. Collate all your findings in the summary keeping in mind the evaluation questions on which you will be graded.

Required Resources

None

Submission Requirements

Format: Microsoft Word

Font: Arial 10-point size, Double-space

Citation Style: Follow your school's preferred style guide

Length: No more than 500 words.

5.Learning Objectives and Outcomes

Analyze online software license agreements and prepare a recommendation regarding the type of license that is appropriate for a new software product.

Assignment Requirements

Imagine that you are a paralegal in a software development firm. You've been given the task of making a recommendation regarding the type of software license agreement that should be used with your company's new product offering. The product will be available for purchase online, and then instant download. It will also be offered via physical media which will be available in retail markets.

In making your recommendation, you should consider all the types of licenses available and consider the delivery method. For each license type considered, provide the rationale behind why you selected or rejected that base license agreement type for your product. Create a report of your recommendation to be presented to senior management and the product lawyer.

Learning Objectives and Outcomes

Analyze a detailed report on data theft and write an executive summary of the findings.

6.Assignment Requirements

To complete this assignment, you need to access the 2014 case study by Verizon on data breaches.

Your tasks for this assignment are:

Review the case study.

Establish a cause-effect analysis on why financial information is so popular with organized criminals.

Collate your findings in the form of an executive summary.

Required Resources

Case study by Verizon on data breaches

Submission Requirements

Format: Microsoft Word

Font: Arial 10-point size, Double-space

Citation Style: Follow your school's preferred style guide

Length: No more than 500 words

Reference no: EM131587008

Questions Cloud

Active monetary and fiscal policy : This week requires the student to address six unresolved issues in macroeconomics, each of which is central to current political debates.
How many nonnegative solutions are there to the equation : Consider the function f to be defined on the set of finite graphs G and let f(G) = |V(G)|. What is the range of f?
How depression affects the brain : How depression affects the brain, How depression affects males and Females differently
The government reduces the minimum nominal wage : a) The government reduces the minimum nominal wage. b) The government increases Temporary Assistance to Needy Families (TANF) payments, government transfers.
Prepare a checklist to ensure section 404 compliance : Assess the compliance requirements of Section 404 and prepare a checklist to ensure Section 404 compliance.
How many edges does a k-regular graph with n vertices have : At the Delicious Pie Bakery, there are 18 banana-containing pies, 23 chocolate-containing pies, 12 peanut-butter-containing pies.
Course project - data in arrays : In this portion of the Course Project we will be working array You can think of a class as the closet and arrays are where you store what goes in the closet.
Describe the antecedent influences on gestalt psychology : Describe the antecedent influences on Gestalt psychology, Describe some of the principles of perceptual organization
Draw a binary decision tree for sorting playing cards : How many ways are there to distribute 5 past-their-prime vegetables (a squash, a crown of broccoli, a tomato, a clump of Swiss chard, and a large radish).

Reviews

Write a Review

 

Management Information Sys Questions & Answers

  How is e-commerce different from traditional retailing

How is e-commerce different from traditional retailing? What are some distinguishing features of digital markets and digital goods? What is your experience in purchasing online? Do you prefer to shop online or via a traditional outlet? Why

  What are the possible causes for the existence of the issue

Include information about the organization and the issue you have identified or for which you were consulted. Number of Employees: Identify the number of employees to be trained and their current skill levels. Locations of Employees: Identify where t..

  Discuss some of the pros and cons of software as a service

Software as a Service (SaaS): Discuss some of the pros and cons of using software as a service.

  The importance of security awareness training

Find an online article (or resource) regarding the importance of security awareness training.

  How a political strategy used to motivate adoption of system

Discuss the factors that may inhibit the acceptance of this new system by the pilots, photographers, and hangar staff.

  Identify the components of ribs ''n slaw''s supply chain

Thom DuBois new Ribs 'n Slaw restaurant: identify components of the supply chain

  Discuss your experience of human-computer interface

discuss your experience of human-computer interface. This paper should cover but not limited to topics such as what features you find are most user friendly.

  Sketch the resulting waveform at the transmitter output

Sketch the resulting waveform at the transmitter output.- show that in the absence of noise the original binary sequence is reconstructed at the receiver output.

  How globalization affect burtons target distribution system

How does globalization affect Burton's target distribution system?- How does Burton use the Internet to improve the efficiency of its distribution system?

  Explain in your own words using tables from project document

Assume that you have not read this lecture and you have created your project (tables). Do you think your tables in your project are normalized? Explain how this session helped your project? What are your thoughts on normalization?

  Collaboration software and the asp modelthis solution

collaboration software and the asp modelthis solution addresses two specific questions for the learner. first this

  Write a paper which provides description of the practices

Business environments have changed dramatically over the last 10 years, with an increasing amount of business transactions performed "in the cloud", utilizing e-commerce and e-business applications. Security of customer and corporate data becomes ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd