SOL633 unit 5 Arizona Data and Security Breach Notification Law

User Generated

xx1011

Computer Science

Description

I need 10 slides of ppt excluding title and references.

Please send additional detailed information for each slide in a separate document, so that I can record it with my voice and attach to each slide.

Please go through the instructions in the PDF and do not miss any point mentioned in it.

Unformatted Attachment Preview

Case Study: Lab #6 – Identifying the Scope of Your State’s (location’s) Data and Security Breach Notification Law Currently, 47 states, the District of Columbia, Guam, Puerto Rico, and the Virgin Islands have data and security breach notification laws that define what organizations must do if they have had data or security breached that impact citizen privacy data. The National Conference of State Legislatures (NCSL) Web site tracks and organizes telecommunication and information technology state legislation. Review the NCSL Web site and data and security breach notification laws for each state listed at http://www.ncsl.org/Issues/Research/TelecommunicationsInformationTechnol ogy/SecurityBreachNotificationLaws/tabid/13489/Default.aspx You are a cybersecurity manager at ABC organization. Your Chief Information Security Officer (CISO) comes to your office and asks if you are familiar with this site and how it might affect the way ABC does business in the different states where ABC is licensed to do business. He has asked you to create a presentation for a meeting to introduce the executives of the organization to this site and report on the organizations responsibilities for breach notification for the region where you are the cybersecurity manager. Locate your state in the list on the NCSL website above. If you live outside of the United States locate a similar law for where you are a resident. Source: http://www.ncsl.org Examinettp://www.ncsl.org/Issues/Research/TelecommunicationsInformation Technology/SecurityBreachNotificationLaws/tabid/13489/Default.aspx Create a PowerPoint® narration (voice) report of at least 10 slides based on your findings in the NCSL website for your state (not including the cover page and reference page). If you do not own a copy of Microsoft PowerPoint use a comparable slide software or Google Slides (free and accessible from Google.com). If your tool does not offer the ability to put audio on the slides utilize another tool to record the audio portion, i.e., VLC Media or another tool that will allow you to record .mp3 file format that transitions with the slides. In the presentation, address the following: 1. Relate state government data security breach notification laws to individual privacy. 2. Explain why state governments have data security breach notification law. 3. Find your state or location’s data and security breach and notification law and explain the following in your presentation: History of the law ABC’s responsibility for breach notification What is ABC’s liability for failing to follow this law 4. Assess the scope and depth of privacy protection rights of a citizen in your particular state or location. Make sure to provide a reference slide that provides APA citations of any sources used in the PowerPoint presentation. This slide does not require narration. Oral Parameters/Expectations: 1. At least 10 slides in length, with each slide having a narration in Standard English explaining the key ideas in each slide. 2. The oral presentation should have a highly developed and sustained viewpoint and purpose. 3. The oral communication should be highly ordered, logical and unified. 4. The oral delivery technique, including word choice and oral expressiveness, displays exceptional content, organization, and style, while leading the audience to a dynamic and supported conclusion. 5. Free of grammatical errors. 6. No evidence of plagiarism. 7. Ensure that the narration provides clear enunciation, a professional tone, and is free of background noise. 8. The slide presentation must be professional and utilize a professional background and design. Written Requirements Your PowerPoint narration presentation should be 10 or more slides in length. Be sure to use appropriate APA format and cite your Reading or other sources that you used in your presentation. The presentation should contain sufficient information to adequately answer the questions and contain no spelling, grammar, or APA errors. Remember that the slides will contain summary information of what you provide in your narration. Points deducted from grade for each writing, spelling, or grammar error are at your instructor’s discretion. Also review the university policy on plagiarism. If you have any questions, please contact your professor. Directions for Submitting Your Lab Place your presentation in the drobox for Unit 5 Lesson 6 Lab.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached is the complete work along with its outline and voice over notes. Feel free to ask for any corrections or clarification. Thank you! 😊

Surname 1
Presentation outline

Name
Course
Professor
February 8, 2019

Surname 2
Presentation outline
Presentation outline
Title slide-------------------------------------------------------------------------------------------slide 1
Introduction----------------------------------------------------------------------------------------slide 2
State government data security breach notification laws and individual privacy--------slide 3
Why data security breach notification law? -------------------------------------------------- slide 4
History of Arizona’s data protection law------------------------------------------------------slides 5, 6
ABC’s responsibility for breach notification------------------------------------------------slides 7, 8, 9
ABC’s liability for failing to adhere to the breach notification law-----------------------slide 10
Privacy protection rights of citizens of Arizona---------------------------------------------slide 11
Conclusion----------------------------------------------------------------------------------------slide 12
Reference slide ----------------------------------------------------------------------------------slide 13


SECURITY BREACH
NOTIFICATION
LAWS: ARIZONA
NAME
COURSE

PROFESSOR
FEBRUARY 8, 2019

INTRODUCTION
• Arizona, just like the rest of the states in the USA, created and implemented security data
breach notification laws.

• These laws have gone through several amendments over the years in a bid to make them
better and more effective.
• Security breach notification laws are vital as they provide the basic protocol to be
followed in the occurrence of a data breach in an entity.

• Arizona’s security breach notification laws are found in chapter 45 (trade and commerce)
under section 48 (personal information protection act).

STATE GOVERNMENT DATA SECURITY BREACH
NOTIFICATION LAWS AND INDIVIDUAL PRIVACY
• The state government data security breach notification laws provide private entities and
government agencies with the actions expected of them following a data breach.
• Data security breach notification laws state the requirement to send out a notice concerning
the breach to the relevant individuals, including the form in which it should be sent.
• Individual privacy is a right that protects the privacy of all people from unlawful access by the
government.

• In the event the security of personal data is breached, individual privacy of individual is
compromised.

WHY DATA SECURITY BREACH NOTIFICATION
LAW?
• They are important in ensuring that the relevant parties are briefed effectively concerning
the data security breach.

• The affected entity or government agency is now be able to solicit help with the
investigation.
• They help ensure that all entity transactions are lawful.
• This law helps protect the right to privacy of the citizens of Arizona.

HISTORY OF ARIZONA'S DATA PROTECTION LAW
• The most recent amendment of the Arizona security breach notification laws was done
on April 11, 2018.

• One of the changes made included the delay time allowed before the entity sends out
notices concerning the data security breach. The delay time was undefined in the 2015
amendment but it was shifted to 45 days.
• The definition of personal information was also slightly adjusted.

• The circumstances of involving the legal system were also stated. A notice should be sent
to them if the situation at hand presents substantial economic loss for involved parties.

HISTORY OF ARIZONA’S DATA PROTECTION
LAW…
• Another amendment stated that if a security breach affects more than 1000 ...


Anonymous
Great content here. Definitely a returning customer.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags