Preview

Unit 6 Assignment 1: Analysis

Good Essays
Open Document
Open Document
577 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 6 Assignment 1: Analysis
Unit 6 Assignment 1: Analysis of the Breach Notification Law Letter

Unit 6 Assignment 1: Analysis of the Breach Notification Law Letter
On April 17, 2011 PlayStation Network (PSN) was breached by an unauthorized source. Sony believed that the source exposed personal and password information – and possibly credit cards – of an estimated 77 million people. This is considered one of tech’s history’s worst security failures (Cooney, 2011). Due to this breach, Sony has broken many laws. The most critical laws that Sony “allegedly” broke were California SB 1386, California Law 1798.81.5, and California Law 1798.29.
California Law SB 1386 states;
“This bill would require state agencies and businesses that maintain computer data systems that contain personal information to disclose, as specified, any breach of the security of the systems, as defined, to any person whose personal information was, or may have been, accessed by an unauthorized person. This bill would also make a statement of legislative findings and declarations regarding privacy and financial security (SB 1386 Senate Bill – AMENDED, 2000).”
…show more content…
Personal information is defined in this section as a person 's first name, or first initial, last name, social security number, driver 's license or California identification card numbers, account number, credit or debit card number, and medical information (Civil Code Section 1789.80-1798.84). Medical information is defined as any individually identifiable information, in electronic or physical form, regarding the individual 's medical history or medical treatment or diagnosis by a health care professional (Civil Code Section 1789.80-1798.84). Personal information does not include publicly available information that is lawfully made available to the general public from federal, state, or local government records (Civil Code Section

You May Also Find These Documents Helpful

  • Good Essays

    Grady and Monroe are each paid a weekly salary allowance of $950. The doll shop is located in a state that requires unemployment compensation contributions of employers of one or more individuals. The company is subject to state contributions at a rate of 3.1% for wages not in excess of $8,100. Compute each of the following amounts based upon the 41st weekly payroll period for the week ending October 19, 2010:…

    • 541 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Equation 4 represents the intersection area between two circles whether the circumference of each circle passes through the centre of the other one and vice versa. Equation 5 is used to the area between two circles. With Equation 6, we formulate the difference between a quarter circle area and a half of A1 area.…

    • 88 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Samuel Aggor CSC 1100 3/3/16 Assignment 5 Problem 1 a. Output: 3.94 b. Output: 6.67 c. Output: 15.00 d. Output: -35.00 e. Output: 0 Problem 2 a. Output: 62 b. Output: 20160 c. Output: 20 213837312 d. Output: 1 Problem 3 a. Func1 has two parameters. Func1 is an integer function. b. Func2 has three parameters. Func2 is a double function.…

    • 188 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The free group with two generators a and b is composed of all finite strings that are formed from the four symbols a, a−1, b and b−1 given that no a is directly next to an a−1 and no b is directly next to a b−1. Two such strings can be concatenated and converted into a string of this type by repeatedly replacing the "forbidden" substrings with the empty string. For example: abab−1a−1 concatenated with abab−1a yields abab−1a−1abab−1a, which contains the substring a−1a underlined in the example, and so the “forbidden” string gets cancelled and reduced to abab−1bab−1a, which again contains the substring b−1b underlined in the example, which then gets reduced to abaab−1a. It can be checked that the group formed from the set of those strings with…

    • 493 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    No the supervisor isn't right because Mark and Jean can fill the pool less than ten hours.…

    • 104 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 5 Assignment 2

    • 1305 Words
    • 4 Pages

    1. Which of the following types of LANs was a competitor of Ethernet LANs from the earliest days of wired LANs in the 1980s and into the 1990s? c. Token Ring…

    • 1305 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 6 Exercise 1

    • 122 Words
    • 1 Page

    In order to create user accounts for the existing employees in the acquired company following these steps. First create an excel spreadsheet with the name, user id and password for each employee. Then use this formula to generate a command to enter in the command prompt: ="dsadd user cn=" & CHAR(34) & A8 & ",ou=sales,dc=tony,dc=com" & CHAR(34) & " -samid " & B8 & " -pwd " & C8…

    • 122 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Solution: The update also removes the ability for this codec to be loaded when browsing the Internet with any other applications. By only allowing applications to use the Indeo codec when the media content is from the local system or from the intranet zone, and by preventing Internet Explorer and Windows Media Player from launching the codec at all, this update removes the most common remote attack vectors but still allows games or other applications that leverage the codec…

    • 272 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Remember that the customer is a single person and should feel that the company is making a genuine attempt to protect them.…

    • 254 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Technology has rapidly advanced, affecting standards on privacy, telecommunications, and criminal law. Every day, we encounter unexpected consequences of data flows that could not have happened a few years ago.…

    • 786 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Engl 200 Unit 2 Analysis

    • 799 Words
    • 4 Pages

    Many campuses have issues between smokers and non-smokers; Kansas State University does not escape this. Many people on campus are bothered by smoking and smokers. This has led to a call for further smoking restrictions. In 2010 Joshua Madden wrote an editorial in the Kansas State Collegian against more restrictions on smokers. In the article, Madden argues that further restrictions against smokers are unnecessary since the effects of secondhand smoke outdoors are negligible, since smoking is a lifestyle choice similar to eating fatty foods K-State should not regulate it, and smoking is limited enough at K-State to add further limits. Further restrictions on smoking on campus are necessary because outdoor secondhand smoke is still very harmful, unlike eating fatty foods, smoking effects the health of others, and the places one can smoke on campus are not truly restricted or enforced. In my opinion, Kansas State should define smoking areas, and move them away from high traffic areas.…

    • 799 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Analysis 1.1

    • 653 Words
    • 2 Pages

    The history of the right to bear arms, this has been an American tradition since colonist set foot on North American soil. Mass murders have been cause by guns does this mean we should only allow our military to have guns? I believe in the constitution we have the right to bear arms. It was written in the constitution for a reason. Without guns it makes our country weak. I’m not talking about just our military having them I’m talking about citizens not being able to have guns.…

    • 653 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    The dean of the Western College of Business must plan the school’s course offerings for the fall semester.…

    • 148 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Gina Fox has started her own company, Foxy Shirts, which manufactures imprinted shirts for special occasions. Since she has just begun this operation, she rents the equipment from a local printing shop when necessary. The cost of using the equipment is $350. The materials used in one shirt cost $8, and Gina can sell these for $15 each.…

    • 702 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    ILS ASSIGNMENT I

    • 721 Words
    • 2 Pages

    There are various access tools available for information retrieval in both prints and electronic formats. These include OPACS databases and so on. In this essay I am going to focus on OPAC. Online public access catalogue (often abbreviated as OPAC or simply library catalogue) is an online database of materials held by a library or group of libraries .it is used principally to locate books and other material available in the library. At university of Zimbabwe they use the millennium library system .to search for information or books at OPAC, university of Zimbabwe library one has to click the search OPAC then choose on the available search points such as keywords, author, title, journal, and call number search.…

    • 721 Words
    • 2 Pages
    Good Essays