Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Part 1: Impact of State Privacy Laws on InfoSec

Within California SB1386, one of the greatest concerns for information security and privacy professionals is language that includes liability related to the personally identifiable information of California residents, regardless of where that data is collected and stored.
Tasty Candy Store is a candy manufacturer in Las Vegas, Nevada. It has a special line of high-priced chocolate liqueur truffles that are a popular favorite of visitors to Las Vegas. Tasty Candy owners saw the potential for expanding their sales by creating a Web site, allowing customers to purchase their favorite sweet treats over the Internet. Their predictions were accurate, and soon the Tasty Candy Web site was busy processing orders from customers all over the world. Their customer base includes a large number of California residents.

Two years after Tasty Candy set up their Web site, the site fell victim to hackers who gained access to all of the credit card and demographic data for all of Tasty Candy's 12,000 customers.

Use the study materials and any additional research needed to fill in knowledge gaps. Then discuss the following:

What are the mitigating factors that would work to the benefit of Tasty Candy in meeting the requirements of SB1386 that pertain to information breach reporting related to California residents?

What are responsibilities of Tasty Candy in terms of reporting this breach of data specific to California residents?

Are there other state or federal regulations that would impact how and when Tasty Candy reported this data breach to the general public or to specific segments of their customer base?

Part 2: SB1386 Compliance Evaluation

Information security and privacy professionals are particularly concerned with language in SB1386 that includes liability related to personally identifiable information of California residents, regardless of where that data is collected and stored.

You are asked to speak at an information security conference on the topic of how commercial Web sites doing business with California residents can ensure they are in compliance with SB1386.

Use the study materials and any additional research needed to fill in knowledge gaps. Then discuss the following:

What benefit might an Internet-based company that sells to California residents enjoy by enforcing the standards and criteria of SB1386?

What challenges might an Internet-based company that sells to California residents experience specific to SB1386?

Respond to an audience member who posits that an Internet-based company's risk of running afoul of SB1386 is too small to spend resources trying to mitigate the risk.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M91791713
  • Price:- $25

Priced at Now at $25, Verified Solution

Have any Question?


Related Questions in Management Information System

Question suppose a computer using direct mapped cache has

Question : Suppose a computer using direct mapped cache has 2G Bytes of main memory and a cache of 512Blocks,where each cache Block has 8words,and word size is 2 Bytes a) How many blocks are in the main memory? b) What i ...

Develop a work breakdown structure for a online retailer to

Develop a work breakdown structure for a Online retailer to include a paragraph about your structure. Include at least three levels in your diagram. Project: Primarily online retailer. The project will require the accoun ...

Question suppose we have the following measurement

Question : Suppose we have the following measurement: Frequency of floating point(FP) operations is 25%, average CPI of FP operations is equal to 4.0. Average CPI of other instructions is equal to 1.33. Calculate the ove ...

A crucial starting point to develop an effective disaster

A crucial starting point to develop an effective disaster recovery plan is to cultivate an efficient Business Impact Analysis (BIA). The BIA evaluates the potential effect of interruptions to an organization's critical b ...

Communication and team decision makingpart 1 sharpening the

Communication and Team Decision Making Part 1: Sharpening the Team Mind: Communication and Collective Intelligence A. What are some of the possible biases and points of error that may arise in team communication systems? ...

Ethics and information managementusing university library

Ethics and Information Management: Using University library and/or other sources, read at least four (4) academically reviewed articles on the ethical issues that may arise in information management. 1. Write a comparati ...

Question social engineering techniques are often used to

Question : Social Engineering techniques are often used to trick users into giving out important information. List two of the recommendations from the OER readings for avoiding social engineering attacks and briefly desc ...

Answer the following question describe a b-tree

Answer the following Question : Describe a B-Tree implementation. Explain the details of a Binary Tree. What are real world examples of tree implementations? Describe the properties of a heap and provide a real world exa ...

In several chapters we have emphasized the importance of

In several chapters, we have emphasized the importance of efficient change management as a key component of the ability to cost-effectively maintain an application. Discuss the various types of changes one should anticip ...

Read assess the risk by zurier from sc magazine for it

Read "Assess the Risk," by Zurier, from SC Magazine: For IT Security Professionals (2015). The first step in the creation of an effective risk-management system is understanding the types of risks an organization may fac ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As