Read the prompt below and fill out the attached document

CYB 260 Module Three Worksheet Activity Guidelines and Rubric

Summation of Privacy Laws Part 2

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Overview

This is the second of three activities where we will explore privacy laws that govern personally identifiable information (PII). The table you will be creating will summarize the laws, who they apply to, and who is responsible for ensuring compliance in an organization. It is important that this table is filled in using your own words, as this will help you master the material. Because the descriptions will be in your own words, you are not required to cite the sources. This exercise introduces a small sample of laws that you will add to in subsequent course activities. By the end of Module Four, the completed table will be a great addition to your cyber playbook and will provide a useful reference for Projects One and Two.

Prompt

Complete the Module Three Worksheet, which is linked in the worksheet assignment in Module Three of your course. In the worksheet, fill in the three blank columns for each law. The list below describes the information that is required for your worksheet.

  • Law – See the laws provided in the worksheet.
  • Briefly describe the law. – In under 50 words, describe the law.
  • Whose rights are covered by the law? – Identify the main party covered under the law.
  • Who in an organization is responsible for ensuring compliance with the law? – Identify the entity in the organization who is responsible for ensuring compliance with the law.

What to Submit

Fill in the required information directly in the provided worksheet and submit it as a Word document. Use a file name that includes the course code, the assignment number, and your name—for example, CYB_100_Project_One_Neo_Anderson.docx.

Module Three Worksheet Activity Rubric

Red Flags Rule

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper
Payment Card Industry StandardsCompletes columns for provided law thoroughly and accuratelyCompletes columns for provided law with minor errorsDoes not complete columns for provided law13Children’s Online Privacy Protection Act (COPPA)Completes columns for provided law thoroughly and accuratelyCompletes columns for provided law with minor errorsDoes not complete columns for provided law13Children’s Internet Protection Act (CIPA)Completes columns for provided law thoroughly and accuratelyCompletes columns for provided law with minor errorsDoes not complete columns for provided law13Federal Information Security Management Act (FISMA)Completes columns for provided law thoroughly and accuratelyCompletes columns for provided law with minor errorsDoes not complete columns for provided law13State Data Breach Notification LawsCompletes columns for provided law thoroughly and accuratelyCompletes columns for provided law with minor errorsDoes not complete columns for provided law13U.S. ConstitutionCompletes columns for provided law thoroughly and accuratelyCompletes columns for provided law with minor errorsDoes not complete columns for provided law13Articulation of Response

Criteria Proficient (100%) Needs Improvement (70%) Not Evident (0%) Value
Completes columns for provided law thoroughly and accurately Completes columns for provided law with minor errors Does not complete columns for provided law 13
Submission is free of errors related to grammar, spelling, and organization and is presented in a professional and easy-to-read format Submission has some errors related to grammar, spelling, or organization that negatively impact readability and articulation of main ideas Submission has critical errors related to grammar, spelling, or organization that prevent understanding of ideas 9
Total: 100%

CYB 260 Module Three Worksheet
Complete the table below by filling in the three blank columns for each law.
Law
Red Flags Rule
Payment Card Industry
Standards
Children’s Online Privacy
Protection Act (COPPA)
Children’s Internet
Protection Act (CIPA)
Federal Information
Security Management Act
(FISMA)
State Data Breach
Notification Laws
U.S. Constitution
Briefly describe the law.
Whose rights are covered by the law?
Who in an organization is responsible
for ensuring compliance with the law?

Still stressed with your coursework?
Get quality coursework help from an expert!