Computer Programming
Case Study #1: Are Privacy Impact Assessments (PIA) useful as a policy tool?Case Scenario:A client has asked your cybersecurity consulting firmto provide it with a 2 to 3 page white paper which discusses the usefulness of Privacy Impact Assessments(PIA) as a policy tool. The purpose of this white paper is to informattendees at an inter-agency workshop on writing Privacy Impact Assessments for their IT investments. Theseassessments are required by the E-GovernmentAct of 2002 (See https://www.whitehouse.gov/omb/memoranda_m03-22)and must be submitted to the Office of Management and Budget (OMB) each year byagencies as part of their E-GovernmentAct compliance reports. OMB, in turn, forwards a summary of these reportsto Congress as part of the administrations E-GovernmentAct Implementation Report (see https://www.whitehouse.gov/sites/default/files/omb/assets/egov_docs/final_fy14_e-gov_act_report_02_27_2015.pdf).Research:1.Read / Review the Week 1 readings.2.Research the requirements in federal law toprotect the privacy of individuals. Here are some sources that you may finduseful:a.AlternativesExist for Enhancing Protection of Personally Identifiable Information (GAO-08-536)http://www.gao.gov/new.items/d08536.pdfb.Guide toProtecting the Confidentiality of Personally Identifiable Information (PII) (NISTSP-800-122) http://csrc.nist.gov/publications/nistpubs/800-122/sp800-122.pdf3.Research how PrivacyImpact Assessments are used by privacyadvocates and other members of the public who lobby lawmakers or otherwiseseek to influence public policy. Here are some sources to get you started:a.http://www.constitutionproject.org/documents/privacy-advocates-say-fbi-facial-recognition-system-could-threaten-civil-liberties/b.https://epic.org/privacy/surveillance/spotlight/1006/c.https://www.aclu.org/aclu-opposition-hr-3523-cyber-intelligence-sharing-and-protection-act-20114. Findthree or more additional sources which provide information about best practicerecommendations for ensuring the privacy of information processed by or storedin an organizations IT systems and databases. These additional sources caninclude analyst reports and/or news stories about recent attacks / threats,data breaches, cybercrime, cyber terrorism, etc. which impacted the privacy ofindividuals whose information was stored in federal IT systems and databases.Write:Write a two to three pagesummary of your research. At a minimum, your summary must include thefollowing:1. Anintroduction or overview of privacy whichprovides definitions and addresses the laws, regulations, and policies whichrequire federal IT managers to protect the privacy of individuals whoseinformation is processed or stored in federal IT systems. This introductionshould be suitable for an executive audience.2. Aseparate section which addresses the contents of Privacy Impact Assessments andhow they are currently used by the federal government and members of society. 3.An analysis of whether or not privacy impact assessments provideuseful information to privacy advocates, lawmakers, and others who develop orinfluence privacy policies and laws in the United States. Federal Officials whoparticipate in the policy making process include: OMB Staff, White House Staff,Congressional Committees and their staff members, Members of Congress(Representatives & Senators). Your whitepaper should use standard terms and definitions for cybersecurity and privacy.The following sources are recommended:NICCS Glossary http://niccs.us-cert.gov/glossary Guidelineson Security and Privacy in Public Cloud Computing http://csrc.nist.gov/publications/nistpubs/800-144/SP800-144.pdfSubmit For Grading & Discussion1. Submityour case study in MS Word format (.docx or .doc file) using the Case Study #1Assignment in your assignment folder. (Attach the file.)2. Postyour case study for discussion with your classmates. First, create a new topicin the Case Study #1 Discussion Forum. Then, paste the contents of your CaseStudy #1 document directly into that message. (Do not attach the file.) 3. Lastposting or no posting for discussion will be penalized heavily so it is in yourbest interests to post your case study before the assigned due date.Formatting Instructions1. Usestandard APA formatting for the MS Word document that you submit to yourassignment folder. Formatting requirements and examples are found under Course Resources> APA Resources.2. Usethe Paste from Word paste option in the LEO editor when posting your CaseStudy to the Case Study #1 Discussion forum.Additional Information1. Youare expected to write grammatically correct English in every assignment thatyou submit for grading. Do not turn in any work without (a) using spell check,(b) using grammar check, (c) verifying that your punctuation is correct and (d)reviewing your work for correct word usage and correctly structured sentencesand paragraphs. These items are graded under Professionalism and constitute 20%of the assignment grade. 2. Youare expected to credit your sources using in-text citations and reference listentries. Both your citations and your reference list entries must comply withAPA 6th edition Style requirements. Failure to credit your sources will resultin penalties as provided for under the universitys Academic Integrity policy.
THIS QUESTION IS UNSOLVED!
Request a custom answer for this question