Prepare a checklist to ensure section 404 compliance

Assignment Help Management Information Sys
Reference no: EM131587008

1.Learning Objectives and Outcomes

Assess the compliance requirements of Section 404 and prepare a checklist to ensure Section 404 compliance.

Assignment Requirements

This assignment builds upon the role-play conducted in the Roles section of this lesson. In this assignment, you play the role of an internal auditor. You've been given the task of creating a specific checklist to ensure compliance with Section 404.

You need to review the requirements of Section 404 and create a list identifying compliance requirements. The checklist should include information about reporting requirements, audits, IT security, and any other topics relevant to Section 404 compliance.

The checklist should include information on internal controls over financial reporting (ICFR) controls as well as any known difficulties in complying with Section 404.

Required Resources

None

Submission Requirements

Format: Microsoft Word

Font: Arial 10-point size, Double-space

Citation Style: Follow your school's preferred style guide

Length: No more than 500 words

2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssignTM services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution's policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

2.Assignment: Office of Management and Budget Breach Notification

Learning Objectives and Outcomes

Examine the elements required by the Office of Management and Budget (OMB) for a breach notification plan for federal agencies and develop a checklist to address the compliance requirements.

Assignment Requirements

In this assignment, you play the role of an inspector general. You've been given the assignment of reviewing the Office of Management and Budget (OMB) breach notification plan requirements and submitting a checklist to senior management regarding the steps necessary to comply. You need to review the breach notification plan requirements and create a checklist to be submitted to senior management.

The checklist should identify all OMB requirements for a breach notification plan, along with an example of actions that could be taken to comply with the requirement.

Required Resources

None

Submission Requirements

Format: Microsoft Word

Font: Arial 10-point size, Double-space

Citation Style: Follow your school's preferred style guide

Length: No more than 500 words

3.Learning Objectives and Outcomes

Assess the compliance requirements of Section 404 and prepare a checklist to ensure Section 404 compliance.

Assignment Requirements

This assignment builds upon the role-play conducted in the Roles section of this lesson. In this assignment, you play the role of an internal auditor. You've been given the task of creating a specific checklist to ensure compliance with Section 404.

You need to review the requirements of Section 404 and create a list identifying compliance requirements. The checklist should include information about reporting requirements, audits, IT security, and any other topics relevant to Section 404 compliance. The checklist should include information on internal controls over financial reporting (ICFR) controls as well as any known difficulties in complying with Section 404.

Required Resources

None

Submission Requirements

Format: Microsoft Word

Font: Arial 10-point size, Double-space

Citation Style: Follow your school's preferred style guide.

4.Learning Objectives and Outcomes

Describe violation of copyright privileges as applied to a scenario.

Assignment Requirements

This assignment builds upon Discussion: Copyright and its Various Owner Rights. In this assignment, you, the original composer and performing artist of a hot new pop song, need to:

Describe the specific intellectual property laws that were violated in your case.

Propose remedies the law provides for the listed violations.

Write a summary of your findings. Prior summarizing, list your major findings from the discussion and this assignment in a bullet-point list. Collate all your findings in the summary keeping in mind the evaluation questions on which you will be graded.

Required Resources

None

Submission Requirements

Format: Microsoft Word

Font: Arial 10-point size, Double-space

Citation Style: Follow your school's preferred style guide

Length: No more than 500 words.

5.Learning Objectives and Outcomes

Analyze online software license agreements and prepare a recommendation regarding the type of license that is appropriate for a new software product.

Assignment Requirements

Imagine that you are a paralegal in a software development firm. You've been given the task of making a recommendation regarding the type of software license agreement that should be used with your company's new product offering. The product will be available for purchase online, and then instant download. It will also be offered via physical media which will be available in retail markets.

In making your recommendation, you should consider all the types of licenses available and consider the delivery method. For each license type considered, provide the rationale behind why you selected or rejected that base license agreement type for your product. Create a report of your recommendation to be presented to senior management and the product lawyer.

Learning Objectives and Outcomes

Analyze a detailed report on data theft and write an executive summary of the findings.

6.Assignment Requirements

To complete this assignment, you need to access the 2014 case study by Verizon on data breaches.

Your tasks for this assignment are:

Review the case study.

Establish a cause-effect analysis on why financial information is so popular with organized criminals.

Collate your findings in the form of an executive summary.

Required Resources

Case study by Verizon on data breaches

Submission Requirements

Format: Microsoft Word

Font: Arial 10-point size, Double-space

Citation Style: Follow your school's preferred style guide

Length: No more than 500 words

Reference no: EM131587008

Questions Cloud

Active monetary and fiscal policy : This week requires the student to address six unresolved issues in macroeconomics, each of which is central to current political debates.
How many nonnegative solutions are there to the equation : Consider the function f to be defined on the set of finite graphs G and let f(G) = |V(G)|. What is the range of f?
How depression affects the brain : How depression affects the brain, How depression affects males and Females differently
The government reduces the minimum nominal wage : a) The government reduces the minimum nominal wage. b) The government increases Temporary Assistance to Needy Families (TANF) payments, government transfers.
Prepare a checklist to ensure section 404 compliance : Assess the compliance requirements of Section 404 and prepare a checklist to ensure Section 404 compliance.
How many edges does a k-regular graph with n vertices have : At the Delicious Pie Bakery, there are 18 banana-containing pies, 23 chocolate-containing pies, 12 peanut-butter-containing pies.
Course project - data in arrays : In this portion of the Course Project we will be working array You can think of a class as the closet and arrays are where you store what goes in the closet.
Describe the antecedent influences on gestalt psychology : Describe the antecedent influences on Gestalt psychology, Describe some of the principles of perceptual organization
Draw a binary decision tree for sorting playing cards : How many ways are there to distribute 5 past-their-prime vegetables (a squash, a crown of broccoli, a tomato, a clump of Swiss chard, and a large radish).

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd