Background: In class, we discussed important cyber laws such as the Computer Fraud and Abuse Act of 1984, HIPAA, and Sarbanes-Oxley. These important guidelines guide our actions as cybersecurity professionals. Unlike federal law, state cybersecurity laws vary widely. What is legal in one state may not be legal in another. Our textbook briefly lists the differences between Vermont and New York law. The purpose of this assignment is to help you understand the nuances of state law and how it impacts cybersecurity professionals.
General information:
This is a group task. Join the group and get involved! Don’t be a social slacker who just watches. Be sure to listen and adjust your grade accordingly. An important part of grading this assignment is to critically analyze the group. It is not enough to state the facts. You need to analyze what the similarities and differences mean for your work as a cybersecurity professional.
I. For each member of the group, identify at least one key area of cyber law (criminal law, civil law, etc.) that concerns him as a security professional. These may be of a security-related or data protection nature.
a Identify the two states whose laws you want to compare. This analysis only considers the laws of these two states. Example: Virginia and Maryland
B. Laws:
Find laws appropriate for important areas from your two states. Please note that there may be multiple laws in each area that need to be considered. For example: Key areas could include “Misuse of Computer Systems,” “Theft of Intellectual Property,” “Reporting Violations,” and “Cyberstalking.” There are many “key areas” that can be assessed, but it may take some work to clearly define them. (Note: If you can’t find a law that addresses this in either state, find another important area to research.)
C. Analysis:
Examine the laws and determine whether they are similar or different. The analysis should consider
1) applicability,
2) prescribed penalties,
3) whether new technology is taken into account,
4) deterrent value, and
5) ability to cure victims, but in relation to Other factors you may consider may also be considered.
You can also include ideas from other sources, but keep in mind that you must cite those sources properly.
D. Discuss:
Consider the impact of each law from a cybersecurity professional’s perspective. How does this impact your organization? Are there any mandatory disclosures? Is the collection of certain evidentiary data prohibited? Do I need to contact the police if there is a violation? Are there specific evidence processing requirements that I must comply with if I want to prosecute? This is certainly This is not a comprehensive list. We ask that you use your own judgment to decide which issues are worth discussing under each law. e. Recommendations: Suggest changes based on your knowledge. As a cybersecurity professional, you may be asked to make recommendations to the organization’s leadership as well as to the community. What recommendations would you make to cyber legislators to improve each piece of legislation you consider?
Helpful tips:
Create a separate row for each legal act in each table. You can include multiple lines if you need to discuss multiple laws that cover a single important area. Some critical area tables may have only one row, while other critical area tables may have multiple rows.
Use shading to distinguish the laws of one state from the laws of another state.
Select your paper details and see how much our professional writing services will cost.
Our custom human-written papers from top essay writers are always free from plagiarism.
Your data and payment info stay secured every time you get our help from an essay writer.
Your money is safe with us. If your plans change, you can get it sent back to your card.
We offer more than just hand-crafted papers customized for you. Here are more of our greatest perks.
Get instant answers to the questions that students ask most often.
See full FAQ