Running head: UNDERSTANDING FISMA
SAINT LEO UNIVERSITY
Information security is a strategy comprised of the processes, tools and policies necessary
to prevent, d
7. The Gramm-Leach-Bliley Act (GLB Act or GLBA), otherwise called the Financial
Modernization Act of 1999, is a government law ordered in the United States to control
the ways that monetary foundations manage the private data of people. The Act comprises
Lab #3 Case Study on PCI DSS NonCompliance: CardSystems Solutions
Course Name: IS3350 Security Issues in Legal Context
Student Name: Marie M. Lopez
Instructor Name: Mr. Brickan
Lab D u e D a t e : July 8, 2015
Lab Assessment Questions
Answer the followi
What is the difference between privacy law and information systems security? How are
The difference between privacy law and information systems security is that you need to apply
security to ensure that there is privacy. In information te
1. Which US government agency acts as the legal enforcement entity for businesses and
organizations involved in commerce?
2. Which US government agency acts as the legal enforcement entity regarding HIPAA
compliance and HIPAA violations?
3. List t
The Gramm-Leach-Bliley Act
The Gramm-Leach-Bliley Act (GLBA), is a government law ordered in the United States
to control the ways that monetary foundations manage the private data of people. The Act
comprises of three segm
Select an article or an amendment from the U.S. constitution and describe what powers,
authority, or rights it establishes. Provide examples.
I chose to select the Fourth Amendment for this discussion. I think doing so will help
Discuss one of the five sections of the Sarbanes-Oxley Act at http:/www.soxlaw.com.
Section 302: Corporate Responsibility for Financial Reports
This section is of the Sarbanes-Oxley Act 'Corporate Responsibility for Financial
Reports'. Section 302 require
How would an organization demonstrate responsible stewardship in the collection,
maintenance, and distribution of personal information?
When it comes to information systems and storage respect and integrity are key.
Those with access to sensitive and pers
Lab 6 Report
While there is no national data privacy law in the United States, and with growing risk of private
information being under attack, the states governments have created their own data and security
breach notification laws. Current
Aug 31, 2016
The Fourth Amendment of the U.S. Constitution provides, "the right of the people to be
secure in their persons, houses, papers, and effects, against unreasonable searches and seizures,
If you believe that a HIPAA-covered entity or its business associate violated your (or
someone else's) health information privacy rights or committed another violation of the
Privacy, Security, or Breach Notification Rules, you may file a complaint with t
Aug 27, 2016
A data analyst from Montgomery County, Maryland took a laptop and a personal external hard
drive to is home. He was given permission to take home the laptop and a personal external hard
Lab Report 5
EFF stands for Electronic Frontier Foundation. It is unprofitable organization that started
in 1990. EFF team consist of lawyers, policy analysts, activists, and technologists. Their goal is
to defend freedom in the netw
Discuss the elements of contract law and explain the importance of terms of service
agreements for online providers. Give an example.
Contract Law is an agreement creating obligations enforceable by law. The requisite
elements that must be established to