Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

LAB #2 Case Study on U.S. Veterans Affairs and Loss of Privacy Information What is the difference between privacy law and information systems security? How

LAB #2 Case Study on U.S. Veterans Affairs and Loss of Privacy Information

What is the difference between privacy law and information systems security? How are they related? Was the employee justified in taking home official data? Why or why not? What are the possible consequences associated with the data loss'/ Regarding the loss of privacy data, was there any data containing protected health information (PHI) making this a Health Insurance Portability and Accountability Act (H!PAA) compliance violation? What action can the agency take against the employee concerned? Would the response of the agency have been different had the data theft occurred at work instead of happening at the employee's residence? Why or why not? Why were the VA data analyst's two supervisors reprimanded and demoted by the VA secretary? Do you think this was justified? Why or why not? What was violated in this data breach? If the database had been encrypted because of VA policy, would this data loss issue even have been an issue? Why or why not? What risk mitigation or security control recommendations would you suggest to prevent this from occurring again? What information systems security and privacy security policies do you think would help mitigate this breach and loss of privacy data? What or who was the weakest link in this chain of security and protection of privacy data? If the VA had performed a security and information assurance audit for compliance, what could the VA do on an annual basis to help mitigate this type of loose policy conformance? True or false: U.S. taxpayers ended up paying for this VA security breach, notifications, and postmortem damage control. Which organization in the U.S. federal government is responsible for perfonning audits on other U.S. federal government agencies? (Hint: It is also known as the "Congressional Watchdog.")

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Strategic Database Technology Management For The Year 2000

Authors: Alan Simon

1st Edition

155860264X, 978-1558602649

More Books

Students also viewed these Databases questions

Question

How would you educate the public about mortgage lending?

Answered: 1 week ago

Question

Explain the purpose of a business plan.

Answered: 1 week ago