CYB 260 Module Three Worksheet Activity Guidelines and Rubric
Summation of Privacy Laws Part 2
Overview
This is the second of three activities where we will explore privacy laws that govern personally identifiable information (PII). The table you will be creating will summarize the laws, who they apply to, and who is responsible for ensuring compliance in an organization. It is important that this table is filled in using your own words, as this will help you master the material. Because the descriptions will be in your own words, you are not required to cite the sources. This exercise introduces a small sample of laws that you will add to in subsequent course activities. By the end of Module Four, the completed table will be a great addition to your cyber playbook and will provide a useful reference for Projects One and Two.
Prompt
Complete the Module Three Worksheet, which is linked in the worksheet assignment in Module Three of your course. In the worksheet, fill in the three blank columns for each law. The list below describes the information that is required for your worksheet.
- Law – See the laws provided in the worksheet.
- Briefly describe the law. – In under 50 words, describe the law.
- Whose rights are covered by the law? – Identify the main party covered under the law.
- Who in an organization is responsible for ensuring compliance with the law? – Identify the entity in the organization who is responsible for ensuring compliance with the law.
What to Submit
Fill in the required information directly in the provided worksheet and submit it as a Word document. Use a file name that includes the course code, the assignment number, and your name—for example, CYB_100_Project_One_Neo_Anderson.docx.
Module Three Worksheet Activity Rubric
Criteria | Proficient (100%) | Needs Improvement (70%) | Not Evident (0%) | Value | |||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Completes columns for provided law thoroughly and accurately | Completes columns for provided law with minor errors | Does not complete columns for provided law | 13 | ||||||||||||||||||||||||
Submission is free of errors related to grammar, spelling, and organization and is presented in a professional and easy-to-read format | Submission has some errors related to grammar, spelling, or organization that negatively impact readability and articulation of main ideas | Submission has critical errors related to grammar, spelling, or organization that prevent understanding of ideas | 9 | ||||||||||||||||||||||||
Total: 100% |
CYB 260 Module Three Worksheet
Complete the table below by filling in the three blank columns for each law.
Law
Red Flags Rule
Payment Card Industry
Standards
Children’s Online Privacy
Protection Act (COPPA)
Children’s Internet
Protection Act (CIPA)
Federal Information
Security Management Act
(FISMA)
State Data Breach
Notification Laws
U.S. Constitution
Briefly describe the law.
Whose rights are covered by the law?
Who in an organization is responsible
for ensuring compliance with the law?