Legal Regulations Compliance and Investigation

User Generated

nxhzne

Other

Description

This is Group 8 project ( please read the attached document fully and then scroll down to group 8 section)


This Group will research and discuss the sixth and final “control objective” and its numerous requirement:

6. Maintain an Information Security Policy

a. Maintain a policy that addresses information security for all personnel

Add additional information and address the above questions related to PCI DSS in general words.

In general scenario, please explain information security policy related to PCI DSS

After learning about the history and context, and having Groups Three through Eight discuss the PCI substantively, we now can become thoughtful analysts. The last section of the work will compare, contrast, and opine about PCI DSS.

We need to cover how merchant/small business maintain information security under the Payment Card Industry Data Security Standard (PCI DSS).

Few Real-time examples.

8 to 10 pages (No plagiarism)

Proper APA with citation (5 to 6) in alphabetic order.

PPT 8 slides.

Unformatted Attachment Preview

ISOL 633 Spring MAIN 2019 Residency Project – PCI DSS The Project This team-based Residency Project is comprised of two components: a research paper, which accounts for 20% of the overall course grade, and a presentation which accounts for 10% of the overall course grade. The challenge of this Project includes demonstrating that the team acquired a sophisticated level of knowledge about one of the mains components of the system of PCI DSS. Each team’s efforts should be able to be successfully applied to the knowledge gained by its fellow student teams toward an overall, comprehensive understanding of these crucial governing principles collectively known as the Payment Card Industry Data Security Standard. Unless logically inapplicable, such as when writing about historical facts, use the current version of the guidelines: PCI DSS 3.2. Each team is charged with researching, discussing, and presenting results about one of eight components of the PCI DSS system: Group One: Historical background of PCI DSS, such as the history of payments in the U.S., the introduction of the Payment Card Industry Security Standards Council, and other general points of knowledge that help to set the tone for the Project. We need the context from this Group. Group Two: Just as our textbook chapters typically begin, Group One’s history lesson is expanded here by describing some of the challenges that the three main stakeholders of payment card systems—i.e., payment card companies (Visa, MasterCard, et al), merchants and vendors (small, large, online, brick-and-mortar), and consumers—face vis-à-vis technologies, business challenges, and legal challenges within the PCI domain. With some background and context coupled to the challenges that are evident, it is time to explore the PCI DSS requirements. When you carefully and fully learn the next six Groups’ work you will be able to understand the guidelines and compliance therewith. Group Three: This Group will research and discuss the first “control objective” and its numerous requirements: 1. Build and Maintain a Secure Network and Systems a. Install and maintain a firewall configuration to protect cardholder data b. Do not use vendor-supplied defaults for system passwords and other security parameters Group Four: This Group will research and discuss the second “control objective” and its numerous requirements: 2. Protect Cardholder Data a. Protect stored cardholder data b. Encrypt transmission of cardholder data across open, public networks 1 Group Five: This Group will research and discuss the third “control objective” and its numerous requirements: 3. Maintain a Vulnerability Management Program a. Protect all systems against malware and regularly update anti-virus software or programs b. Develop and maintain secure systems and applications Group Six: This Group will research and discuss the fourth “control objective” and its numerous requirements: 4. Implement Strong Access Control Measures a. Restrict access to cardholder data by business need-to-know b. Identify and authenticate access to system components c. Restrict physical access to cardholder data Group Seven: This Group will research and discuss the fifth “control objective” and its numerous requirements: 5. Regularly Monitor and Test Networks a. Track and monitor all access to network resources and cardholder data b. Regularly test security systems and processes Group Eight: This Group will research and discuss the sixth and final “control objective” and its numerous requirement: 6. Maintain an Information Security Policy a. Maintain a policy that addresses information security for all personnel After learning about the history and context, and having Groups Three through Eight discuss the PCI substantively, we now can become thoughtful analysts. The last section of the work will compare, contrast, and opine about PCI DSS. Group Nine: There are fewer better ways to help understand these complex guidelines, from a practical perspective, than to learn about how “real world” stakeholders have dealt with them. Thus, the audience needs to learn about some case studies. Research and discuss at least three actual scenarios in which a PCI stakeholder has dealt with, or failed to comply with, PCI DSS. Tell us some stories. Make sure to include at least three subjects: (1) an online retailer; (2) a small, local business (such as a barber shop, bookstore, or restaurant); and (3) a law firm, large or small. You may choose more than three subjects, but do not expand so much so that you are unable to tell a full story about your chosen subjects. Group Ten: Next comes some analysis. This Group examine and discuss PCI DSS in a limited, albeit complementary, way. Look specifically at Kentucky’s laws, regulations, and business practices in order to examine PCI DSS from a state-level perspective. Are there other Kentucky laws that govern payment cards? What Kentucky laws implicate PCI DSS? What are some things that Kentucky business leaders need to be aware of when they accept payment cards at their establishments? 2 Group Eleven: In further analyzing PCI DSS, and without necessarily homing in on Kentucky stakeholders, what other American laws or regulations might relate to, implicate, or otherwise find a nexus with PCI DSS? Here, the audience needs to understand, as you will, that PCI DSS does not operate in a vacuum. Rather, like most of what we’ll learn in ISOL 633, there are numerous laws, regulations, and other governing principles that interact with PCI DSS to form an overall governance model. Group Twelve: This enviable Group gets the opportunity to examine and explain two PCI DSS concepts. First, tell us what’s wrong with PCI DSS. Has it become outdated or irrelevant in some way, or is it lagging behind modern technologies? Secondly, what is on the horizon for PCI DSS stakeholders, especially for the merchants and vendors? The Research Please utilize the University’s wealth of library resources, as well as alternative scholarly or legal resources as appropriate. While it is not prohibited to use other, non-scholarly resources, the key to compiling a cogent, informed Residency Project in our course is to focus on peer-reviewed, scholarly articles and the laws, regulations, and legal cases that surround PCI DSS. The balance should weigh heavily toward those resources, although some other magazine, newspaper, or website sources may help you. • • • • • • Peer-reviewed sources Law Review Scientific journals Scholarly Journals EBSCO ProQuest UC Library IS Guide • • • • • • Acceptable Sources Court cases Legal Restatements News articles News magazines Professional magazines Articles from experts in the field of study • • • • • Unacceptable Sources Wikipedia Open Source General blogs Vendor White papers Social Media Posts The Writing The research paper that you produce must be in APA style, as discussed. Style affects all components of the paper from margins and font choice to overall structure to references citations, including proper citation of laws and court cases. In addition to using the APA style to guide your work, your team should also keep in mind the scoring rubric that is provided at iLearn. The more that your work answers the call of that rubric, the higher your score will be. It is important to write well both in academia and in your professional lives. This is not only because communicating well is part of being a professional, but also because poorly written work detracts from the value of the work. Readers, intentionally or not, equate badly grammar, pore speling, and other English righting mistakes with incomplete research or unpersuasive 3 arguments. Perhaps that is in error—i.e., it is not actually the case that all poorly written work is dispensable—though that effect cannot be ignored. The paper should be written according to APA rules, and is to be between five and 10 total pages. Fewer than five pages will result in proportionate deductions, and pages beyond 10 will not be considered. Your team must submit both the paper and the PPT in iLearn no later than Sunday, March 10, by 2:00 p.m. Residency Project scores will be recorded no later than Wednesday, March 20. The Presentation On Sunday, March 10, your team will conduct a presentation of your research to the class. All team members must participate. Each team will have approximately 15 minutes. It is highly recommended that a rehearsal or practice run is accomplished before the formal presentation. As you know, when a presenter begins by fumbling with the technology, or otherwise appearing unprofessional, much like poor writing, the message loses its value. Your team should reflect your subject matter expertise about the PCI DSS component assigned, and be prepared to answer questions. 4
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Payment Card Industry Data Security Standard (PCI DSS) Outline
1. Information Security Policy Relation to PCI DSS
2. Policy That Addresses Information Security for All Personnel
3. Intellectual Property Law
4. Black’s Law Definition
5. IP Examination
6. Patents
7. Trademarks
8. Trade Secrets
9. Copyrights
10. Conclusion


PAYMENT CARD
INDUSTRY DATA
SECURITY
STANDARD (PCI
DSS)
Name

INFORMATION SECURITY POLICY
RELATION TO PCI DSS

Payment Card Industry Data Security Standard (PCI DSS) is an information
security standard.
The aim of PCI DSS is increasing control of data related to the cardholders as
a way of reducing credit card fraud.
PCI DSS has been faced with various security breaches resulting in the need
to improve the information technology standards.
The construction and maintenance of a secure network and system are done
due to various requirements, for security purposes.

POLICY THAT ADDRESSES
INFORMATION SECURITY FOR ALL
PERSONNEL

The PCI program is a safety policy which covers the way an organization
addresses the Payment Card Industry Data Security Standard (PCI DSS)
requirements.
An organization is expected to create the procedures that the policy will
follow in addressing the concerns of PCI DSS.
The company has to conduct security awareness, where PCI DSS requires a
security awareness program to be made.

INTELLECTUAL PROPERTY LAW

The council in charge of PCI DSS has adopted the Intellectual Rights Policy
which helps in minimization of the possibility of inadvertent infringement of
the intellectual property rights by third parties or the implementation of any
Council Standards.
It applies to the organizations joining the Council, where an agreement is
made so that every participant is bound by the policy.
The members have to be controlled by one member, and everything has to
conform to the established rules.
Licensing commitment has to be done by all participants with the provision
of a license and making a covenant where no Necessary Claims shall be
asserted.

BLACK’S LAW DEFINITION

The service provider is required to comply with certain laws, regulation,
specifications, and guidelines related to the business process.
When regulatory compliance has been violated, the results include legal
punishment such as federal fines.
Payment Card Industry Data Security Standard regulatory compliance law is
used by the organizations dealing with cardholders data.
These rules and guidelines in companies dealing with cardholder data are
essential in the provision of guidance to help the organizations in achieving
their business goals.

IP EXAMINATION

One of the requirements of Payment Card Industry Data Security Standard is
ensuring that the IP address of the company is protected to make sure that it
cannot be tracked or accessed by unauthorized people.
Cybersecurity technology has advanced allowing people with malicious people
to access the IP address of people from different places, thus accessing
personal information.
Payment Card Industry is facing the same issue with fraudsters being able to
hack the companies’ information despite their physical location.
Government initiatives and regulation implemented cannot be able to achieve
data protection for the cards.

PATENTS

Patent rights are achieved after a legal agreement known as the License
Agreement is made with the PCI Security Standards Council.
The patent is awarded to the copyright owner as stated under the Agreement,
thus making the person liable.
When the license has been provided, the owner is not allowed to modify or
sublicense the material.
When someone decides to implement the license, they have to define the
element that is required to be changed, the necessary claims necessary
infringement and end user.

TRADEMARKS

Trademarks are logos used by companies for recognition purposes.
The trademarks are unique as there are no two companies that can be
recognized with the same sign.
The different cards are made in a way that they can be recognized with their
logo.
The sign used by the MasterCard is different from that for a visa.

TRADE SECRETS

PCI DSS requires service providers and merchants to maintain their trade
secrets.
It means that all sensitive data has to be protected at all cost.
Hackers aim at the attacking the systems which are poorly protected so that
they can access payment data, make fraud cases card payment and with the
current technologies it has been made easier.
There are penalties of not maintaining trade secrets such as liability to foreign
investigations.

COPYRIGHTS

Copyright described the legal rights that have been assigned for some years by
the original owner for application purposes.
The Payment Card Industry has been allowed to use the data security
standards.
It means that the service providers have the right to use the security policies
to ensure that all requirements of protecting the card data are done.

CONCLUSION

Fraud involving cards has been on the rise.
It is due to the sophistication in technologies allowing the hackers to access
the sites that are not secure and accessing personal information. Payment Card
Industry Data Security Standard has however helped to reduce the issue.
It has resulted in the formation of compliance that service providers should
follow to ensure securing of cardholders as well as securing the network sites
to avoid external attacks.

REFERE...


Anonymous
Great! 10/10 would recommend using Studypool to help you study.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags