I explained to them that I have been working tons, and I left my syllabus and layout for this assignment at home, could they send me theirs so I use their format as an example. No problem and they sent it.
Here it is.
The downside of this is that someone could copy it. The upside of it is, someone could use it to learn from it.
1-Mass Eye and Ear Infirmary (MEEI) was required to pay
because the laptop that was stolen had no security measures to prevent theft.
The laptop should have been anchored to its location and encryption software in
place in order to protect patient medical files. This action violated the
Health Insurance Portability and Accountability Act of 1996 (HIPAA). (Source:
https://wayback.archive-it.org/3926/20150121155313/http://www.hhs.gov/news/press/2012pres/09/20120917a.html)
2- The Supreme Court ruled that peer to peer grading did not
violate FERPA because the grades on the papers that were corrected were not
considered education records until the teacher had recorded them on his grade
book. (Source: https://www.law.cornell.edu/supct/html/00-1073.ZO.html)
3-A college or university can release the name of a student
that complains regarding his instructor to the instructor’s supervisor because
a student complaint is not considered by FERPA to be a student’s educational record but a teacher record since the complaint was
about the teacher and didn’t reveal any personal or educational information
regarding the student. (source:http://opinions.1dca.org/written/opinions2012/07-19-2012/11-3049.pdf)
4-The purpose of the new act is the Federal Information
Security Management Act is to assign responsibilities within each government
agency for reviewing information security programs and keeping security risks
at an acceptable level. The nine steps are as follows:
- Categorize the information to be protected.
- Select minimum baseline controls.
- Refine controls using a risk assessment procedure.
- Document the controls in the system security plan.
- Implement security controls in appropriate information systems.
- Assess the effectiveness of the security controls once they have been implemented.
- Determine agency-level risk to the mission or business case.
- Authorize the information system for processing.
- Monitor the security controls on a continuous basis.
5-The Sarbanes-Oxley Act of 2002 (SOX)
impacted JP Morgan because they attempted to illegally hide their corporate
losses in order to maintain investors and continue receiving investments. JP
Morgan was forced to pay 200Million dollars in order to settle the charges by
the Securities and Exchange Commission (SEC).
This illegal act was also committed by
companies such as Enron before the subsequent company collapse in which many
investors who believed the company had a solid financial portfolio took major
loses as the company stock collapsed. The SOX Act protects whistleblowers by
establishing company procedures where employees may be able to whistle blow. It
also required attorneys to blow the whistle on their clients under certain
circumstances. (Source: http://www.whistleblowers.org/index.php?option=com_content&task=view&id=27) and (https://www.sec.gov/news/press/2013/2013-187.htm)