The purpose of this assignment is to explore legal and ethical issues

  

Networks, Privacy, and Security PresentationAssessment DescriptionThe purpose of this assignment is to explore legal and ethical issues related to networks, privacy, and security, as well as to research specific types of privacy and security threats and the measures that employee users should take to maintain privacy and security within an organization.Assume you are part of the IT security team in your organization. Research one common employee IT privacy and security issues and ways that employee users can protect themselves and the business from privacy and security breaches and risks. Some common risks to business include:Lack of password managementElectronic storage and transfer of informationPrivilege abuse by employeesUse of unapproved hardware and softwareData mishandlingEquipment misuse (including hardware and systems)Knowledge misuseUnapproved workaroundsSecuring company data and information on personal      employee devices (e.g., cell phones, tablets)Collaboration with third-party service providersSocial engineeringPhishing attacksSummarize your research findings and educate employees about the identified IT privacy and security issues.Create a PowerPoint presentation with a minimum of six slides that addresses the following:Define the employee privacy/security issue and      explain why it could be a risk for an organization.Provide a specific workplace scenario to illustrate      the employee privacy/security issue.Discuss the legal and ethical implications the      privacy/security issue presents for the employee, the company, and the      customer.Describe the negative impact the employee      privacy/security issue could present to the organization in terms of its      overall effect on accounting, finance, marketing, management, economics,      and general business operations.Discuss the ways that employee users can protect      themselves and the business from these types of privacy and security      breaches and risks.Discuss specific policies, strategies, and techniques      that could be employed by the organization and the employee to minimize      the identified employee privacy/security issue.Discuss how to educate employees about the identified      IT privacy and security risks.Include speaker notes at the bottom of each slide.Submit the Microsoft PowerPoint presentation file only. Do not submit any other file format, such as an Adobe PDF file, or you will not earn full credit.Refer to the resource, “Creating Effective PowerPoint Presentations,” located in the Student Success Center, for additional guidance on completing this assignment in the appropriate style.While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.You are required to submit this assignment to LopesWrite. A link to the LopesWrite technical support articles is located in Class Resources if you need assistance. .RubricCollapse All RubricCollapse Allcollapse Legal and Ethical Implications assessmentLegal and Ethical Implications15 pointsCriteria DescriptionLegal and Ethical Implications5. Excellent15 pointsDiscussion of the legal and ethical implications the privacy/security issue presents for the employee, company, and customers is thorough and includes substantial explanation and relevant supporting details.4. Good12.75 pointsDiscussion of the legal and ethical implications the privacy/security issue presents for the employee, company, and customers is complete and includes explanation and relevant supporting details.3. Satisfactory11.25 pointsDiscussion of the legal and ethical implications the privacy/security issue presents for the employee, company, and customers is included but lacks explanation and relevant supporting details.2. Less Than Satisfactory9.75 pointsDiscussion of the legal and ethical implications the privacy/security issue presents for the employee, company, and customers is incomplete or incorrect.1. Unsatisfactory0 pointsDiscussion of the legal and ethical implications the privacy/security issue presents for the employee, company, and customers is not included.collapse Negative Impact assessmentNegative Impact15 pointsCriteria DescriptionNegative Impact5. Excellent15 pointsDescription of the negative impact the employee privacy security issue could present, including discussion of the effect on accounting, finance, marketing, management, economics, and general business operations, is thorough and includes substantial explanation and relevant supporting details.4. Good12.75 pointsDescription of the negative impact the employee privacy security issue could present, including discussion of the effect on accounting, finance, marketing, management, economics, and general business operations, is complete and includes explanation and relevant supporting details.3. Satisfactory11.25 pointsDescription of the negative impact the employee privacy security issue could present, including discussion of the effect on accounting, finance, marketing, management, economics, and general business operations, is included but lacks explanation and relevant supporting details.2. Less Than Satisfactory9.75 pointsDescription of the negative impact the employee privacy security issue could present, including discussion of the effect on accounting, finance, marketing, management, economics, and general business operations, is incomplete or incorrect.1. Unsatisfactory0 pointsDescription of the negative impact the employee privacy security issue could present is not included.collapse Policies, Strategies, and Techniques assessmentPolicies, Strategies, and Techniques15 pointsCriteria DescriptionPolicies, Strategies, and Techniques5. Excellent15 pointsDiscussion of specific policies, strategies, and techniques that could be employed to minimize the employee privacy/security issue is thorough and includes substantial explanation and relevant supporting details.4. Good12.75 pointsDiscussion of specific policies, strategies, and techniques that could be employed to minimize the employee privacy/security issue is complete and includes explanation and relevant supporting details.3. Satisfactory11.25 pointsDiscussion of specific policies, strategies, and techniques that could be employed to minimize the employee privacy/security issue is included but lacks explanation and relevant supporting details.2. Less Than Satisfactory9.75 pointsDiscussion of specific policies, strategies, and techniques that could be employed to minimize the employee privacy/security issue is incomplete or incorrect.1. Unsatisfactory0 pointsDiscussion of specific policies, strategies, and techniques that could be employed to minimize the employee privacy/security issue is not included.collapse Privacy/Security Issue assessmentPrivacy/Security Issue10 pointsCriteria DescriptionPrivacy/Security Issue5. Excellent10 pointsDefinition of the employee privacy/security issue, including explanation of why it could be a risk for an organization, is thorough and includes substantial relevant supporting details.4. Good8.5 pointsDefinition of the employee privacy/security issue, including explanation of why it could be a risk for an organization, is complete and includes relevant supporting details.3. Satisfactory7.5 pointsDefinition of the employee privacy/security issue, including explanation of why it could be a risk for an organization, is included but lacks relevant supporting details.2. Less Than Satisfactory6.5 pointsDefinition of the employee privacy/security issue, including explanation of why it could be a risk for an organization, is incomplete or incorrect.1. Unsatisfactory0 pointsDefinition of the employee privacy/security issue is not included.collapse Workplace Scenario assessmentWorkplace Scenario10 pointsCriteria DescriptionWorkplace Scenario5. Excellent10 pointsA specific workplace scenario illustrating the employee privacy/security issue is thorough and includes substantial explanation.4. Good8.5 pointsA specific workplace scenario illustrating the employee privacy/security issue is complete and includes explanation.3. Satisfactory7.5 pointsA specific workplace scenario illustrating the employee privacy/security issue is included but lacks explanation.2. Less Than Satisfactory6.5 pointsA specific workplace scenario illustrating the employee privacy/security issue is incomplete or incorrect.1. Unsatisfactory0 pointsA specific workplace scenario illustrating the employee privacy/security issue is not included.collapse Presentation of Content assessmentPresentation of Content5 pointsCriteria DescriptionPresentation of Content5. Excellent5 pointsThe content is written clearly and concisely. Ideas universally progress and relate to each other. The project includes motivating questions and advanced organizers. The project gives the audience a clear sense of the main idea. Persuasive, authoritative information from reliable, credible sources is included.4. Good4.25 pointsThe content is written with a logical progression of ideas and supporting information exhibiting a unity, coherence, and cohesiveness. Persuasive information is included from reliable sources.3. Satisfactory3.75 pointsThe presentation slides are generally competent, but ideas may show some inconsistency in organization or in their relationships to each other. Some persuasive information is included.2. Less Than Satisfactory3.25 pointsThe content is vague in conveying a point of view and does not create a strong sense of purpose. Some persuasive information from reliable sources is included. Some persuasive information is included but may be unreliable or lack credibility.1. Unsatisfactory0 pointsThe content lacks a clear point of view and logical sequence of information is unclear. Little or no persuasive information from reliable sources is included.collapse Layout assessmentLayout5 pointsCriteria DescriptionLayout5. Excellent5 pointsThe layout is visually pleasing and contributes to the overall message with appropriate use of headings, subheadings, and white space. Text is appropriate in length for the target audience and to the point. The background and colors enhance the readability of the text.4. Good4.25 pointsThe layout background and text complement each other and enable the content to be easily read. The fonts are easy to read and point size varies appropriately for headings and text.3. Satisfactory3.75 pointsThe layout uses horizontal and vertical white space appropriately. Sometimes the fonts are easy to read, but in a few places the use of fonts, italics, bold, long paragraphs, color, or busy background detracts and does not enhance readability.2. Less Than Satisfactory3.25 pointsThe layout shows some structure but appears cluttered and busy or distracting with large gaps of white space or a distracting background. Overall readability is difficult due to lengthy paragraphs, too many different fonts, dark or busy background, overuse of bold, or lack of appropriate indentations of text.1. Unsatisfactory0 pointsThe layout is cluttered, confusing, and does not use spacing, headings, and subheadings to enhance the readability. The text is extremely difficult to read with long blocks of text, small point size for fonts, and inappropriate contrasting colors. Poor use of headings, subheadings, indentations, or bold formatting is evident.collapse Mechanics of Writing (includes spelling, punctuation, grammar, language use) assessmentMechanics of Writing (includes spelling, punctuation, grammar, language use)5 pointsCriteria DescriptionMechanics of Writing (includes spelling, punctuation, grammar, language use)5. Excellent5 pointsWriter is clearly in command of standard, written, academic English.4. Good4.25 pointsProse is largely free of mechanical errors, although a few may be present. The writer uses a variety of effective sentence structures and figures of speech.3. Satisfactory3.75 pointsSome mechanical errors or typos are present, but they are not overly distracting to the reader. Correct and varied sentence structure and audience-appropriate language are employed.2. Less Than Satisfactory3.25 pointsFrequent and repetitive mechanical errors distract the reader. Inconsistencies in language choice (register) or word choice are present. Sentence structure is correct but not varied.1. Unsatisfactory0 pointsSurface errors are pervasive enough that they impede communication of meaning. Inappropriate word choice or sentence construction is used.collapse Speaker Notes assessmentSpeaker Notes10 pointsCriteria DescriptionSpeaker Notes5. Excellent10 pointsSpeaker notes are thorough and include substantial explanation and justification of computer system selections and relevant supporting details.4. Good8.5 pointsSpeaker notes are complete, justify computer system selections, and include explanation and relevant supporting details.3. Satisfactory7.5 pointsSpeaker notes are included but do not justify computer system selections or lack explanation and relevant supporting details.2. Less Than Satisfactory6.5 pointsSpeaker notes are incomplete or incorrect.1. Unsatisfactory0 pointsSpeaker notes are not included.collapse Documentation of Sources assessmentDocumentation of Sources10 pointsCriteria DescriptionDocumentation of Sources (citations, footnotes, references, bibliography, etc., as appropriate to assignment and style)5. Excellent10 pointsSources are completely and correctly documented, as appropriate to assignment and style, and format is free of error.4. Good8.5 pointsSources are documented, as appropriate to assignment and style, and format is mostly correct.3. Satisfactory7.5 pointsSources are documented, as appropriate to assignment and style, although some formatting errors may be present.2. Less Than Satisfactory6.5 pointsDocumentation of sources is inconsistent or incorrect, as appropriate to assignment and style, with numerous formatting errors.1. Unsatisfactory0 pointsSources are not docum

Don’t use plagiarized sources. Get Your Custom Essay on
The purpose of this assignment is to explore legal and ethical issues
Just from $13/Page