Tuesday, February 28, 2017

Social task #3

My task was to get someone to share their homework with me. 

I explained to them that I have been working tons, and I left my syllabus and layout for this assignment at home, could they send me theirs so I use their format as an example.  No problem and they sent it.

Here it is. 

The downside of this is that someone could copy it.  The upside of it is, someone could use it to learn from it.


 1-Mass Eye and Ear Infirmary (MEEI) was required to pay because the laptop that was stolen had no security measures to prevent theft. The laptop should have been anchored to its location and encryption software in place in order to protect patient medical files. This action violated the Health Insurance Portability and Accountability Act of 1996 (HIPAA).  (Source: https://wayback.archive-it.org/3926/20150121155313/http://www.hhs.gov/news/press/2012pres/09/20120917a.html)

2- The Supreme Court ruled that peer to peer grading did not violate FERPA because the grades on the papers that were corrected were not considered education records until the teacher had recorded them on his grade book. (Source: https://www.law.cornell.edu/supct/html/00-1073.ZO.html)

3-A college or university can release the name of a student that complains regarding his instructor to the instructor’s supervisor because a student complaint is not considered by FERPA to be a student’s  educational record  but a teacher record since the complaint was about the teacher and didn’t reveal any personal or educational information regarding the student. (source:http://opinions.1dca.org/written/opinions2012/07-19-2012/11-3049.pdf)

4-The purpose of the new act is the Federal Information Security Management Act is to assign responsibilities within each government agency for reviewing information security programs and keeping security risks at an acceptable level. The nine steps are as follows:

  1. Categorize the information to be protected.
  2. Select minimum baseline controls.
  3. Refine controls using a risk assessment procedure.
  4. Document the controls in the system security plan.
  5. Implement security controls in appropriate information systems.
  6. Assess the effectiveness of the security controls once they have been implemented.
  7. Determine agency-level risk to the mission or business case.
  8. Authorize the information system for processing.
  9. Monitor the security controls on a continuous basis.



5-The Sarbanes-Oxley Act of 2002 (SOX) impacted JP Morgan because they attempted to illegally hide their corporate losses in order to maintain investors and continue receiving investments. JP Morgan was forced to pay 200Million dollars in order to settle the charges by the Securities and Exchange Commission (SEC).

This illegal act was also committed by companies such as Enron before the subsequent company collapse in which many investors who believed the company had a solid financial portfolio took major loses as the company stock collapsed. The SOX Act protects whistleblowers by establishing company procedures where employees may be able to whistle blow. It also required attorneys to blow the whistle on their clients under certain circumstances. (Source: http://www.whistleblowers.org/index.php?option=com_content&task=view&id=27) and (https://www.sec.gov/news/press/2013/2013-187.htm)

I told my classmate that and in all truth this truly happened.  I left my charging cord and sylabus in the hotel where I was staying, and all my homework is saved on that computer.  I could do this assignment because I knew the task, I just needed to get the person to send me their work. 

No comments:

Post a Comment