IT 412 IT412 Final Project / Cyberlaw and Ethics

IT 412 IT412 Final Project / Cyberlaw and Ethics

soffix

  • $19.99


IT 412 Final Project / Cyberlaw and Ethics 

Overview
There are two components to the final project for this course. The first component is a risk analysis paper. The second component is a risk mitigation plan

presentation to stakeholders that illustrates an organization’s regulatory position related to a given scenario. This project is divided into two milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final submissions. These milestones will be submitted in Modules Three and Five. The final product will be submitted in Module Seven.

In this assignment, you will demonstrate your mastery of the following course outcomes:

  •   Evaluate federal, regional, and state cyberlaws and ethics regulations for their impact on organizations’ IT and computing policies and operations

  •   Assess personal and professional ethical violations for the extent to which they impact IT and computing within organizations

  •   Recommend policies and strategies that align with cyberlaw and ethics guidelines for facilitating compliance and addressing non-adherence

  •   Utilize cyberlaw and ethics guidelines in creating IT-specific codes of ethics for mitigating stakeholder and organizational risk

    Scenario

    ABC Healthcare is a startup company with 50 employees. The company’s computer network is shown in Figure 1 below. The healthcare data server contains the company's records, including copies of patient health records with personally identifiable data, patient billing, company financials, and forms.

    You have been hired as the IT network security officer, reporting directly to the chief information officer (CIO). Currently, there is a network administrator who has very limited experience and worked as a desktop technician prior to joining ABC. This network administrator helped set up the existing network. In addition, ABC plans to hire a desktop technician and a website developer/programmer who will report directly to the CIO.

    There are no policies or guidelines for employees’ usage of the computers and network. Network setup was done by various vendors, and all of the programs use default usernames and passwords. Wireless access has been set up for staff using wireless laptops. The same wireless access point also provides clients access to the internet. Some staff members bring in their own computers and connect them to the network. Employees use the work systems for personal web browsing and to check personal email accounts.

    As part of network security, management set up a video monitoring system throughout the office. Employees are not notified of any monitoring. There is a copier/printer in the front office that is used by employees. Currently, all unused copies are left next to the copier for recycling. 


We Also Recommend


Sale

Unavailable

Sold Out