What are responsibilities of tasty candy

Assignment Help Management Information Sys
Reference no: EM131067334

Part 1: Impact of State Privacy Laws on InfoSec

Within California SB1386, one of the greatest concerns for information security and privacy professionals is language that includes liability related to the personally identifiable information of California residents, regardless of where that data is collected and stored.
Tasty Candy Store is a candy manufacturer in Las Vegas, Nevada. It has a special line of high-priced chocolate liqueur truffles that are a popular favorite of visitors to Las Vegas. Tasty Candy owners saw the potential for expanding their sales by creating a Web site, allowing customers to purchase their favorite sweet treats over the Internet. Their predictions were accurate, and soon the Tasty Candy Web site was busy processing orders from customers all over the world. Their customer base includes a large number of California residents.

Two years after Tasty Candy set up their Web site, the site fell victim to hackers who gained access to all of the credit card and demographic data for all of Tasty Candy's 12,000 customers.

Use the study materials and any additional research needed to fill in knowledge gaps. Then discuss the following:

What are the mitigating factors that would work to the benefit of Tasty Candy in meeting the requirements of SB1386 that pertain to information breach reporting related to California residents?

What are responsibilities of Tasty Candy in terms of reporting this breach of data specific to California residents?

Are there other state or federal regulations that would impact how and when Tasty Candy reported this data breach to the general public or to specific segments of their customer base?

Part 2: SB1386 Compliance Evaluation

Information security and privacy professionals are particularly concerned with language in SB1386 that includes liability related to personally identifiable information of California residents, regardless of where that data is collected and stored.

You are asked to speak at an information security conference on the topic of how commercial Web sites doing business with California residents can ensure they are in compliance with SB1386.

Use the study materials and any additional research needed to fill in knowledge gaps. Then discuss the following:

What benefit might an Internet-based company that sells to California residents enjoy by enforcing the standards and criteria of SB1386?

What challenges might an Internet-based company that sells to California residents experience specific to SB1386?

Respond to an audience member who posits that an Internet-based company's risk of running afoul of SB1386 is too small to spend resources trying to mitigate the risk.

Reference no: EM131067334

Questions Cloud

Proposed acquisition of a new production machine : Riverview Company is evaluating the proposed acquisition of a new production machine. The machine's base price is $200,000, and installation costs would amount to $28,000. Also, $10,000 in net working capital would be required at installation. The ma..
What is the accounting break-even point : Night Shades, Inc. ( NSI), manufactures biotech sunglasses. The variable materials cost is $ 10.48 per unit, and the variable labor cost is $ 6.89 per unit. a. What is the variable cost per unit? What are the total costs for the year? c. If the selli..
Change the radio frequencies : Cordless telephones often have a switch that allows you to change the radio frequencies that they use to communicate with their base unit. Why is this feature more important in cities than it is in rural areas?
What are responsibilities of tasty candy : What benefit might an Internet-based company that sells to California residents enjoy by enforcing the standards and criteria of SB1386? What challenges might an Internet-based company that sells to California residents experience specific to SB1386..
Aggression and violence in the media : Briefly describe at least one episode of a television show in which you observed aggression or violence - Identify the context in which the character(s) demonstrated aggression or violence.
Compute the percentage total return : Suppose a stock had an initial price of $ 72 per share, paid a dividend of $ 1.20 per share during the year, and had an ending share price of $ 79. Compute the percentage total return.
Total relevant cost for buying and making the product : Han Products manufactures 21.000 units of part S-6 each year for use on its production line At this level of activity the cost per unit for part S.6 is
What is the company pretax and aftertax cost of debt : Mudvayne, Inc., is trying to determine its cost of debt. The fi rm has a debt issue outstanding with 18 years to maturity that is quoted at 107 percent of face value. The issue makes semiannual payments and has an embedded cost of 6 percent annually...

Reviews

Write a Review

Management Information Sys Questions & Answers

  Discuss the basic concepts of simple systems

The purpose of the Discussion Board is to allow students to learn through sharing ideas and experiences as they relate to course content and the DB question. Discuss the basic concepts of simple systems

  Business problem in the realm of information systems

Describe a business problem in the realm of information systems, information technology, or electronic commerce at your work. The objective of this section is to clearly IDENTIFY the problem and explain WHY it is a problem.

  What is the difference in how to assign these non-labor cost

What are labor COSTS in MS project? How do we assign labor COSTS to a task in MS Project? Describe AND provide a screen shot of the steps. lease write all your response in a single MS Word document covering all questions and exercises, and paste (..

  What are the competitive advantages built

What are the competitive advantages built into the you? Imagine you are producing/developing yourself as product, link it to you core competencies:

  Contrast traditional outsourcing with the software

Compare and contrast traditional outsourcing with the Software as a Service. Under what conditions do you think a company should choose SaaS over traditional outsourcing? Explain your views

  Information technology and payroll and order entry

Information Technology - Payroll and Order Entry - It explains if payroll and order entry are types of transaction processing systems. Batch, online, and hybrid systems are also discussed.

  Demonstrate an understanding of existing and emerging

this assignment consists of three 4 sections a written project plan revised business requirements document project plan

  Who are your stakeholders for this project what

who are your stakeholders for this project? what characteristics do you look for when identifying a project

  What mobile devices are and why mobile systems are important

Explain what mobile devices are and why mobile systems are important. Give examples of mobile devices, and, if applicable, name a mobile device you use and why you use it.

  Determine three challenges associated with using vendors

Many organizations use information technology vendors to develop company solutions. Determine at least three (3) challenges associated with using vendors. Analyze the relationship between competitive advantage and vendor relationship management ov..

  Determine the security controls and policies

Describe the business challenges associated with the domain you selected. Determine the security controls and policies needed to overcome these challenges

  Disruptive technology in the education industry in general

Is the Internet a disruptive technology in the education industry in general? And for Ivey's School of Information Management in particular?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd