1.Learning Objectives and Outcomes
Assess the compliance requirements of Section 404 and prepare a checklist to ensure Section 404 compliance.
Assignment Requirements
This assignment builds upon the role-play conducted in the Roles section of this lesson. In this assignment, you play the role of an internal auditor. You've been given the task of creating a specific checklist to ensure compliance with Section 404.
You need to review the requirements of Section 404 and create a list identifying compliance requirements. The checklist should include information about reporting requirements, audits, IT security, and any other topics relevant to Section 404 compliance.
The checklist should include information on internal controls over financial reporting (ICFR) controls as well as any known difficulties in complying with Section 404.
Required Resources
None
Submission Requirements
Format: Microsoft Word
Font: Arial 10-point size, Double-space
Citation Style: Follow your school's preferred style guide
Length: No more than 500 words
2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssignTM services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution's policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.
2.Assignment: Office of Management and Budget Breach Notification
Learning Objectives and Outcomes
Examine the elements required by the Office of Management and Budget (OMB) for a breach notification plan for federal agencies and develop a checklist to address the compliance requirements.
Assignment Requirements
In this assignment, you play the role of an inspector general. You've been given the assignment of reviewing the Office of Management and Budget (OMB) breach notification plan requirements and submitting a checklist to senior management regarding the steps necessary to comply. You need to review the breach notification plan requirements and create a checklist to be submitted to senior management.
The checklist should identify all OMB requirements for a breach notification plan, along with an example of actions that could be taken to comply with the requirement.
Required Resources
None
Submission Requirements
Format: Microsoft Word
Font: Arial 10-point size, Double-space
Citation Style: Follow your school's preferred style guide
Length: No more than 500 words
3.Learning Objectives and Outcomes
Assess the compliance requirements of Section 404 and prepare a checklist to ensure Section 404 compliance.
Assignment Requirements
This assignment builds upon the role-play conducted in the Roles section of this lesson. In this assignment, you play the role of an internal auditor. You've been given the task of creating a specific checklist to ensure compliance with Section 404.
You need to review the requirements of Section 404 and create a list identifying compliance requirements. The checklist should include information about reporting requirements, audits, IT security, and any other topics relevant to Section 404 compliance. The checklist should include information on internal controls over financial reporting (ICFR) controls as well as any known difficulties in complying with Section 404.
Required Resources
None
Submission Requirements
Format: Microsoft Word
Font: Arial 10-point size, Double-space
Citation Style: Follow your school's preferred style guide.
4.Learning Objectives and Outcomes
Describe violation of copyright privileges as applied to a scenario.
Assignment Requirements
This assignment builds upon Discussion: Copyright and its Various Owner Rights. In this assignment, you, the original composer and performing artist of a hot new pop song, need to:
Describe the specific intellectual property laws that were violated in your case.
Propose remedies the law provides for the listed violations.
Write a summary of your findings. Prior summarizing, list your major findings from the discussion and this assignment in a bullet-point list. Collate all your findings in the summary keeping in mind the evaluation questions on which you will be graded.
Required Resources
None
Submission Requirements
Format: Microsoft Word
Font: Arial 10-point size, Double-space
Citation Style: Follow your school's preferred style guide
Length: No more than 500 words.
5.Learning Objectives and Outcomes
Analyze online software license agreements and prepare a recommendation regarding the type of license that is appropriate for a new software product.
Assignment Requirements
Imagine that you are a paralegal in a software development firm. You've been given the task of making a recommendation regarding the type of software license agreement that should be used with your company's new product offering. The product will be available for purchase online, and then instant download. It will also be offered via physical media which will be available in retail markets.
In making your recommendation, you should consider all the types of licenses available and consider the delivery method. For each license type considered, provide the rationale behind why you selected or rejected that base license agreement type for your product. Create a report of your recommendation to be presented to senior management and the product lawyer.
Learning Objectives and Outcomes
Analyze a detailed report on data theft and write an executive summary of the findings.
6.Assignment Requirements
To complete this assignment, you need to access the 2014 case study by Verizon on data breaches.
Your tasks for this assignment are:
Review the case study.
Establish a cause-effect analysis on why financial information is so popular with organized criminals.
Collate your findings in the form of an executive summary.
Required Resources
Case study by Verizon on data breaches
Submission Requirements
Format: Microsoft Word
Font: Arial 10-point size, Double-space
Citation Style: Follow your school's preferred style guide
Length: No more than 500 words