Answered step by step
Verified Expert Solution
Link Copied!
Question
1 Approved Answer

On Friday morning, as the Dean of Technology Services, you are called into a meeting to discuss a data security breach involving a list of

On Friday morning, as the Dean of Technology Services, you are called into a meeting to discuss a data security breach involving a list of financial aid students. The Provost, the Dean of Alumni Services and Dean of Financial Aid are also present at the meeting. The data breach concerns a list that contains student's full name, social security number, and financial aid eligibility. The following events occurred:

  1. A staff member in the Alumni Services Office emails the Director of Financial Aid and requests two work-study students. He unknowingly attaches an e-mail distribution list that contains all alumni e-mail IDs.
  2. The Director of Financial Aid attaches a file, selects Reply All, and sends the e-mail back to the staff member. The file contains a list of 57 students who are eligible for work-study financial aid. This file contains student's full name, social security number, and the amount of financial aid.
  3. The staff member notices that the reply was sent to all alumni. However, he did not see any problems, and went home without notifying anyone.
  4. Some alumni saw the e-mail, and deleted the e-mail without reading it.
  5. Some read the e-mail and opened the attachment.
  6. Several alumni e-mailed college administration during the night to find out why they were on the distribution list.
  7. One alumnus who works for the Department of Education's Family Policy Compliance Office opened the email and immediately forwarded the email to the Provost, the Dean of Alumni Services, and Dean of Financial Aid. The alumnus is upset that students' privacy and confidentiality were compromised and further stated this is in violation of (the regulatory mandate was intentionally omitted here).

After reviewing the scenario, produce a paper that answers both of the following questions:

  1. Identify and briefly explain the regulatory mandate the scenario is violating. Justify your response by identifying the events (i.e., the number of the event) that are in clear violation of the mandate.
  2. According to Turban et al. (p. 132), what are some security controls that the organization can implement to avoid a similar incident in the future? Discuss three controls that are most important in your opinion.

Step by Step Solution

3.38 Rating (151 Votes )

There are 3 Steps involved in it

Step: 1

1 Regulatory Mandate Violation The scenario described appears to be violating the Family Educational ... blur-text-image
Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Behavioral Corporate Finance Concepts And Cases For Teaching Behavioral Finance

Authors: Hersh Shefrin

2nd Edition

1259277207, 1259277208, 9781259358425, 978-1259254864, 9781259277207

More Books

Students explore these related Law questions