Question

As the textbook says, there is no general federal law that requires businesses to disclose to...

As the textbook says, there is no general federal law that requires businesses to disclose to customers when their personal information has been compromised in a cybersecurity breach. Instead, there are different laws in every state. For this assignment, you'll look at Washington's disclosure law:

http://app.leg.wa.gov/RCW/default.aspx?cite=19.255.010 (Links to an external site.)Links to an external site.

If you've never read a law before, this is actually a great one to start with. Like most, the language is rather convoluted, but at least it is short. In comparison, the CISA that was passed last fall is 136 pages out of a longer bill that is over 2000 pages long.

Answer the following ten questions about Washington's disclosure law referenced above. Each question is worth 10 points. Be sure to read the law carefully, not all answers are straightforward.

When a question asks for a “section number”, it means the number in parentheses before the statement where you find the answer to the question. If there's a letter in parentheses before the statement, then that's just a subsection to the previous number. For instance, the statement “Notification to major statewide media.” is really subsection 8(c)(iii), so you would just refer to that as section 8 in your answer.

For some of these questions, the appropriate answer is to simply copy a statement from the law. When you do that, be sure to use quotation marks.

Question 1. What two elements of the CIA triad are referenced in this law, and in what section number(s)?

Question 2. When a disclosure notification is required, in what three methods may notification be provided, and in what section number do you find the answer?

Question 3. If only one Washington resident is affected by the breach, is the business still required to notify that one person?

Question 4. If 1000 Washington residents are affected by the breach, who besides the people affected must be notified, and in what section number do you find the answer?

Question 5. If the only information that is stolen in a breach is a mailing address, is notification required, and in what section number do you find the answer?

Question 6. Is a credit card number considered personal information, and in what section do you find the answer? NOTE: THE ANSWER TO THIS QUESTION IS NOT SIMPLY YES OR NO, IT IS MORE COMPLICATED THAN THAT.

Question 7. Which one of the following three laws are referenced in this law, and in what section number? HIPAA, PCI-DSS, or CISA.

Question 8. How soon after the breach is discovered must the affected individuals be notified, and in what section number do you find the answer?

Question 9. What does “secured” mean in this law, and in what section number do you find the answer.

Question 10. Is notification required if the information stolen is “secured” during the breach, and in what section number do you find the answer?

0 0
Add a comment Improve this question Transcribed image text
Answer #1


Please find the answers below:

Question 1. What two elements of the CIA triad are referenced in this law, and in what section number(s)?

Answer:
Confidentiality and integrity are the two elements of the CIA triad are referenced in this law. They are referenced in section number 4.

--------------------

Question 2. When a disclosure notification is required, in what three methods may notification be provided, and in what section number do you find the answer?

Answer:
Three methods of notification are:
"(a) Written notice;"
"(b) Electronic notice"
"(c) Substitute notice"
We can find the answer under section 8 of this law.

----------------------

Question 3. If only one Washington resident is affected by the breach, is the business still required to notify that one person?

Answer:
Yes, it is required to notify that one person affected by the breach.

--------------------

Question 4. If 1000 Washington residents are affected by the breach, who besides the people affected must be notified, and in what section number do you find the answer?

Answer:
Attorney general must be notified besides the Washington residents. We can find the answer under section 15.

---------------------------

Question 5. If the only information that is stolen in a breach is a mailing address, is notification required, and in what section number do you find the answer?

Answer:
No notification is required if only the mailing address is stolen by an unauthorized person. Mailing address alone is not personally identifiable. Section 5 of the law has the data elements of the personal information. There is no mention of mailing address as personal information. For example, mailing address can be further broken down as Business or Home etc. Many people or colleagues who work for the same company share the same Business mailing address!

---------------------------

Question 6. Is a credit card number considered personal information, and in what section do you find the answer? NOTE: THE ANSWER TO THIS QUESTION IS NOT SIMPLY YES OR NO, IT IS MORE COMPLICATED THAN THAT.

Answer:
Credit card number in combination of any other details like security code, access code , password that allows access to an individual's financial account is considered as personal information. Under section 5(c) we can find the answer.
"credit or debit card number, in combination with any required security code, access code, or password that would permit access to an individual's financial account."

----------------------------

Question 7. Which one of the following three laws are referenced in this law, and in what section number? HIPAA, PCI-DSS, or CISA.

Answer:
HIPAA : health insurance portability and accountability act is referenced by this law in section 10

---------------------

Question 8. How soon after the breach is discovered must the affected individuals be notified, and in what section number do you find the answer?

Answer:
Forty-five calendar days. We can find the answer under section 16.
"(16) Notification to affected consumers and to the attorney general under this section must be made in the most expedient time possible and without unreasonable delay, no more than forty-five calendar days after the breach was discovered, unless at the request of law enforcement as provided in subsection (3) of this section, or due to any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system."

-----------------------


Question 9. What does “secured” mean in this law, and in what section number do you find the answer.

Answer:
We can find the answer in Section 7.""secured" means encrypted in a manner that meets or exceeds the national institute of standards and technology (NIST) standard or is otherwise modified so that the personal information is rendered unreadable, unusable, or undecipherable by an unauthorized person."

--------------------------

Question 10. Is notification required if the information stolen is “secured” during the breach, and in what section number do you find the answer?

Answer:
Section 1 has the answer. No notification is required for secured information unless the confidential process, encryption key, or other means to decipher the secured information is acquired by an unauthorized person . "Any person or business that conducts business in this state and that owns or licenses data that includes personal information shall disclose any breach of the security of the system following discovery or notification of the breach in the security of the data to any resident of this state whose personal information was, or is reasonably believed to have been, acquired by an unauthorized person and the personal information was not secured. Notice is not required if the breach of the security of the system is not reasonably likely to subject consumers to a risk of harm. The breach of secured personal information must be disclosed if the information acquired and accessed is not secured during a security breach or if the confidential process, encryption key, or other means to decipher the secured information was acquired by an unauthorized person."

-----------------------------------

Hope this is helpful. Let me know if you need more information on this.

Add a comment
Know the answer?
Add Answer to:
As the textbook says, there is no general federal law that requires businesses to disclose to...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • n the Ohio case Biddle v. Warren General Hospital, a number of patients brought a lawsuit...

    n the Ohio case Biddle v. Warren General Hospital, a number of patients brought a lawsuit against Warren General Hospital and a law firm, alleging the hospital unlawfully disclosed patients’ confidential medical information so that the law firm could search for potential Supplemental Security Income (SSI) eligibility for the payment of the patients’ unpaid medical bills. The Supreme Court of Ohio, through the opinion of Justice Resnick, held that (1.) an independent tort exists for the unauthorized, unprivileged disclosure to...

  • Law

    employees regarding the risk of cybercrime attacks.”Nedbank clients were in shock on Thursday morning, after it was reported that 1.7 million customers may have had their data breached. Nedbank client's identity numbers, addresses and contact details may have been breached after a "data security incident" at a direct marketing company. According to a statement, Nedbank said they have investigated a data security issue that occurred at the premises of a third-party service provider, namely Computer Facilities. Computer Facilities is a...

  • plz answer the question for business entity law below: Question 22 (this question has two parts- answer both parts)...

    plz answer the question for business entity law below: Question 22 (this question has two parts- answer both parts) (a) Rexico Ltd is a scientific instruments manufacturing company which has been operating for about 5 years. The board has decided it needs more funds, approximately $8milion, to fund an expansion into Asia. It is considering an offering of either shares or debentures. The company has existing ordinary shareholders, no debenture holders and a credit facility from What Bank secured by...

  • Classical Roman civil law was based on _____. Group of answer choices Procedural requirements Analysis of...

    Classical Roman civil law was based on _____. Group of answer choices Procedural requirements Analysis of the local tribunes A stock of concepts of legal significance Preferences of the individual judge Question 21 pts Informed consent specifically refers to a patient’s right of _____. Group of answer choices Free investigation Self-recognition Information gathering Self-determination Question 31 pts Escola v. Coca Cola Bottling Co. focused on _____. Group of answer choices Medical malpractice Battery Products liability Judicial malfeasance Question 41 pts...

  • Each experiment requires us to measure the force on the wire, however we do not have...

    Each experiment requires us to measure the force on the wire, however we do not have a direct way to do so. Using our knowledge of Newton’s Laws, we can infer the magnitude of the force. Question 4. Assuming the current and magnetic field are as shown in Fig. 2, use the right-hand rule to determine the direction of the predicted force of the magnet on the wire. [INEED HELP WITH NUMBER 5. I ALREADY DID NUMBER 4] Question 5....

  • Assignment Overview This writing assignment requires you to have a general idea of a researchable topic...

    Assignment Overview This writing assignment requires you to have a general idea of a researchable topic related to the field of business. You will create a knowledge list, an expansive compilation of questions, an inquiry question, and a research proposal that you will likely address later through your final research paper. Deliverables 2- page paper (12 point font) written in a word processing program (such as MS Word). Activity Details Perform the following tasks: Step 1: Create a knowledge list...

  • Obtain a copy of the annual report of Avon Products, Inc. for the most recent year....

    Obtain a copy of the annual report of Avon Products, Inc. for the most recent year. You can find the annual report at the company's website (www.avon.com (Links to an external site.)) in the investor information section or at the Securities and Exchange Commission's website (www.sec.gov (Links to an external site.)). using EDGAR (Electronic Data Gathering Analysis and Retrieval). Form 10-K, which includes the annual report is required to be filed on EDGAR. Search or scroll within the annual report...

  • Q1) Answer all Multiple Choice questions.i) Newton’s 1st law is:A. PHYSICALLY INDEPENDENT of the...

    Q1) Answer all Multiple Choice questions.i) Newton’s 1st law is:A. PHYSICALLY INDEPENDENT of the other two laws of motion and CANNOT be dispensed with as an axiom of Newtonian physics.B. PHYSICALLY INDEPENDENT of the other two laws of motion, but nonetheless it CAN be dispensed with as an axiom of Newtonian physics.C. Actually a SPECIAL CASE of the 2ND LAW. The case when the net force is zero. Therefore, logically we need only two laws of motion. Perhaps for clarity...

  • Please read the article and answer about questions. You and the Law Business and law are...

    Please read the article and answer about questions. You and the Law Business and law are inseparable. For B-Money, the two predictably merged when he was negotiat- ing a deal for his tracks. At other times, the merger is unpredictable, like when your business faces an unexpected auto accident, product recall, or government regulation change. In either type of situation, when business owners know the law, they can better protect themselves and sometimes even avoid the problems completely. This chapter...

  • Boyle's Law PROCEDURE - HOW THE EXPERIMENT WAS DONE 1. Students used the apparatus above to...

    Boyle's Law PROCEDURE - HOW THE EXPERIMENT WAS DONE 1. Students used the apparatus above to generate the data for this experiment. 2. Volume and pressure data from the experiment were recorded in the table that follows DATA AND CALCULATIONS Volume pressure Constant, k (ml) (Pa) P/V or P.V 5.8 175.9 7.8 131.4 9.8 105.1 11.887.0 13.8 74.4 15.8 165.1 17.8 57.6 PROCESSING THE DATA-DATA FROM THE EXPERIMENT IS GIVEN IN THE TABLE ABOVE. 1. If the volume is roughly...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT