Regulations dealing with IT Security for Goodwill of North Georgia

User Generated

gnbbsyf

Computer Science

Security Compliance

Colorado Technical University

Description

Select a company or any existing business. This can be the company you currently work for. If you cannot find information about the security infrastructure of a company, you may make up the details as realistic as possible. Over the next few weeks you will utilize this company for the main project.

Your company wishes to ensure that know and understand they various regulatory acts they are required comply with and understand. This first assignment will allow you to establish the Key Assignment Template that will be used throughout the class for all Individual Project Submissions.

First, you will start by providing an overview of the company you have chosen. Be sure to describe its current security infrastructure.

Second, explore the regulations applicable for Security Compliance. You will:

  • Describe 5 different Federal Regulations your company needs to understand and have compliance
  • Describe 2 different State Regulations your company needs to understand and have compliance
  • Discuss how each of these regulations are applicable to the company

The template document should follow this format:

  • Security Compliance Project Document Shell
  • Use Microsoft Word
  • Title Page
    • Course number and name
    • Project name
    • Student name
    • Date
  • Table of Contents
    • Use auto-generated TOC.
    • Separate page
    • Maximum of three levels deep
    • Be sure to update the fields of the TOC so it is up-to-date before submitting your project.
  • Section Headings (create each heading on a new page with TBD as content except for sections listed under New Content below)
    • Section 1- Company Overview
    • Section 2 – Federal and State Regulations, Directives, and Acts
    • Section 3 - Compliance Plan
    • Section 4 – Acceptable Use Policy
    • Section 5 – Certification and Accreditation
    • Section 6 - Preparing for Certification

Each Week you will add to this document and submit for grading, as a preview each Section will contain the following:

  • Section 1 – Company Overview
  • Section 2 – Federal and State Regulations, Directives, and Acts
    • Identify and describe 5 Federal Regulations
    • Identify and describe 2 State Regulations
    • Describe how each apply to the specific company
  • Section 3 - Compliance Plan
    • Describe Policies, Standards, Processes and Guidelines
    • Discuss the relationship between Controls and Audits
    • The Sarbanes-Oxley Act
    • The different implications Regulations have on Government and non-Government entities
  • Section 4 – Acceptable Use Policy
    • Global Regulations
    • Safe Harbor
    • Work Councils
    • Acceptable Use Policy and Enforcement Ethics
  • Section 5 – Certification and Accreditation
    • Certification and Accreditation
    • Certification and Accreditation Frameworks
  • Section 6 - Preparing for Certification
    • DIACAP
    • ISO27002

Add the discussion about the Company Overview and the Federal and State regulations to the sections titled: Company Overview and Federal and State Regulations, Directives, and Acts.

Name the document CSS441__IP1.doc

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hey! Kindly consult me if you need any clarification. Thank you

Running head: GOODWILL SECURITY

Goodwill Security
Student Name
Institutional Affiliation

Section 1 – Company Overview

1

GOODWILL SECURITY

2

The company, Goodwill of North Georgia deals with the operation of stores, donation
centers, career centers and also offers diverse employment and job training services across North
Georgia. It has also another organization called Goodwill Industries of North Georgia, that has
speciality in managing facilities and protective services.
Goodwill of North Georgia seeks to provide employability services to the unemployed
struggling to find work, people who want a change of careers and ones who seek to start in
entrepreneurship. With the it’s support, the people are empowered for employment challenges
that come as a result of physical, emotional and developmental limitations, among other
challenges. Goodwill donates household goods, clothes and even books in stores across North
Georgia and the proceeds are used to support the mission of employing people.
Goodwill has an integrated security infrastructure that consists of video cameras, monitored
alarms, access control systems, endpoint protection devices that include mobile devises, web
filtering, email protection, remote access solutions and training on end-user security awareness


Video cameras(CCTV) are installed in every corner of a room and outside the premises
all round used to stream in live feeds to the security team’s smartphone, desktop or tablet
to help them keep track of everyone’s activities including any suspicious activity in any
part of the company.



The monitored alarms are used to detect and identify specific areas breached in the
organization. They do this by emitting audible noises that can be heard by anyone in the
organization especially the security personnel.



The access control systems are used to restrict entry to special areas in the organization.
The company uses photo identification systems and access cards depending on the areas

GOODWILL SECURITY

3

or sections being accessed. The security team ensures that they are well placed and
working to ensure the employees and clients are protected from such tragedies.
Section 2 – Federal and State Regulations, Directives, and Acts on Security Compliance
The laws and regulations of the federal government give industry guidelines on the
significant security and privacy...


Anonymous
I was struggling with this subject, and this helped me a ton!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags