Assessment1.docx

A.  Demonstrate your knowledge of application of the law by doing the following:

1.  Explain how the Computer Fraud and Abuse Act and the Electronic Communications Privacy Act each specifically relate to the criminal activity described in the case study. ( 1 Paragraph)

2.  Explain how three laws, regulations, or legal cases apply in the justification of legal action based upon negligence described in the case study. ( 1 and half Paragraph)

3.  Discuss two instances in which duty of due care was lacking. ( 1 Paragraph each for two instances)

4.  Describe how the Sarbanes-Oxley Act (SOX) applies to the case study. ( 1 Paragraph)

 

B.  Discuss legal theories by doing the following:

1.  Explain how evidence in the case study supports claims of alleged criminal activity in TechFite. ( 1 Paragraph)

a.  Identify who committed the alleged criminal acts and who were the victims. ( 1 Paragraph)

b.  Explain how existing cybersecurity policies and procedures failed to prevent the alleged criminal activity. ( 1 Paragraph)

2.  Explain how evidence in the case study supports claims of alleged acts of negligence in TechFite. ( 1 Paragraph)

a.  Identify who was negligent and who were the victims. ( 1 Paragraph)

b.  Explain how existing cybersecurity policies and procedures failed to prevent the negligent practices. ( 1 Paragraph)