LEG 500 Assignment 2 The Value of Digital Privacy in an Information Technology Age/uophelp
- No tags were found...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>LEG</strong> <strong>500</strong> <strong>Assignment</strong> 2 <strong>The</strong> <strong>Value</strong> <strong>of</strong> <strong>Digital</strong> <strong>Privacy</strong> <strong>in</strong> <strong>an</strong> <strong>Information</strong><br />
<strong>Technology</strong> <strong>Age</strong><br />
Click Here to Buy the Tutorial<br />
http://www.<strong>uophelp</strong>.com/<strong>LEG</strong>-<strong>500</strong>-/product-6709-<strong>LEG</strong>-<strong>500</strong>-<strong>Assignment</strong>-2-<strong>The</strong>-<br />
<strong>Value</strong>-<strong>of</strong>-<strong>Digital</strong>-<strong>Privacy</strong>-<strong>in</strong>-<strong>an</strong>-<strong>Information</strong>-<strong>Technology</strong>-<strong>Age</strong><br />
For more course tutorials visit<br />
www.<strong>uophelp</strong>.com<br />
Research Websites <strong>an</strong>d other technologies that provide private <strong>in</strong>formation on U.S. citizens.<br />
Write a 3-4 page paper <strong>in</strong> which you<br />
1. List <strong>an</strong>d describe at least three (3) technologies that allow <strong>an</strong> <strong>in</strong>dividual to research<br />
citizens’ private data.<br />
2. Discuss the adv<strong>an</strong>tages <strong>an</strong>d disadv<strong>an</strong>tages <strong>of</strong> public access to this <strong>in</strong>formation, both for<br />
the researchers <strong>an</strong>d those who are be<strong>in</strong>g “ <strong>in</strong>vestigated”.<br />
3. Determ<strong>in</strong>e what measures citizens c<strong>an</strong> take to protect private <strong>in</strong>formation or <strong>in</strong>formation<br />
they do not w<strong>an</strong>t to be disclosed.<br />
4. Discuss a federal law that gr<strong>an</strong>ts the federal government the legal right to make private<br />
<strong>in</strong>formation on U.S. citizens available to the public, <strong>an</strong>d whether or not you agree with<br />
this law.<br />
5. Determ<strong>in</strong>e whether there are “electronic privacy laws” that c<strong>an</strong> prevent others from<br />
hav<strong>in</strong>g access to “private <strong>in</strong>formation” as well as how effective they are.<br />
<strong>The</strong> specific course learn<strong>in</strong>g outcomes associated with this <strong>LEG</strong> <strong>500</strong> <strong>Assignment</strong> are<br />
<br />
<br />
Analyze employee <strong>an</strong>d consumer privacy under the law.<br />
Use technology <strong>an</strong>d <strong>in</strong>formation resources to research issues <strong>in</strong> law, ethics, <strong>an</strong>d corporate<br />
govern<strong>an</strong>ce.
Write clearly <strong>an</strong>d concisely about law, ethics, <strong>an</strong>d corporate govern<strong>an</strong>ce us<strong>in</strong>g proper<br />
writ<strong>in</strong>g mech<strong>an</strong>ics.<br />
Grad<strong>in</strong>g for this <strong>LEG</strong> <strong>500</strong> <strong>Assignment</strong> will be based on <strong>an</strong>swer quality, logic / org<strong>an</strong>ization <strong>of</strong><br />
the paper, <strong>an</strong>d l<strong>an</strong>guage <strong>an</strong>d writ<strong>in</strong>g skills, us<strong>in</strong>g the follow<strong>in</strong>g rubric.<br />
Po<strong>in</strong>ts 100<br />
Criteria<br />
<strong>LEG</strong> <strong>500</strong><br />
<strong>Assignment</strong> 2 <strong>The</strong><br />
<strong>Value</strong> <strong>of</strong> <strong>Digital</strong><br />
<strong>Privacy</strong> <strong>in</strong> <strong>an</strong><br />
<strong>Information</strong><br />
<strong>Technology</strong> <strong>Age</strong><br />
Unacceptable Fair<br />
Below 70% F<br />
1. List <strong>an</strong>d<br />
describe at least Did not submit or<br />
three (3) <strong>in</strong>completely listed<br />
technologies that <strong>an</strong>d described at<br />
allow <strong>an</strong> least three (3)<br />
70-79% C<br />
Pr<strong>of</strong>icient<br />
80-89% B<br />
Exemplary<br />
90-100% A<br />
Satisfactorily<br />
Partially listed<br />
Thoroughly listed<br />
listed <strong>an</strong>d<br />
<strong>an</strong>d described at<br />
<strong>an</strong>d described at<br />
described at least<br />
least three (3)<br />
least three (3)<br />
three (3)<br />
technologies that<br />
technologies that<br />
technologies that<br />
<strong>in</strong>dividual to technologies that allow <strong>an</strong><br />
allow <strong>an</strong><br />
allow <strong>an</strong><br />
research citizens’ allow <strong>an</strong> <strong>in</strong>dividual <strong>in</strong>dividual to<br />
<strong>in</strong>dividual to<br />
<strong>in</strong>dividual to<br />
private data. to research citizens’ research citizens’<br />
research citizens’<br />
research citizens’<br />
private data. private data.<br />
private data.<br />
private data.<br />
Weight 15%<br />
2. Discuss the<br />
Did not submit or<br />
Satisfactorily Thoroughly<br />
adv<strong>an</strong>tages <strong>an</strong>d<br />
Partially discussed<br />
<strong>in</strong>completely<br />
discussed the discussed the<br />
disadv<strong>an</strong>tages <strong>of</strong><br />
the adv<strong>an</strong>tages<br />
discussed the<br />
adv<strong>an</strong>tages <strong>an</strong>d adv<strong>an</strong>tages <strong>an</strong>d<br />
public access to<br />
<strong>an</strong>d disadv<strong>an</strong>tages<br />
adv<strong>an</strong>tages <strong>an</strong>d<br />
disadv<strong>an</strong>tages <strong>of</strong> disadv<strong>an</strong>tages <strong>of</strong><br />
this <strong>in</strong>formation,<br />
<strong>of</strong> public access to<br />
disadv<strong>an</strong>tages <strong>of</strong><br />
public access to public access to<br />
both for the<br />
this <strong>in</strong>formation,<br />
public access to this<br />
this <strong>in</strong>formation, this <strong>in</strong>formation,<br />
researchers <strong>an</strong>d<br />
both for the<br />
<strong>in</strong>formation, both<br />
both for the both for the<br />
those who are<br />
researchers <strong>an</strong>d<br />
researchers <strong>an</strong>d researchers <strong>an</strong>d<br />
be<strong>in</strong>g<br />
“ <strong>in</strong>vestigated”.<br />
for the researchers<br />
<strong>an</strong>d those who are<br />
be<strong>in</strong>g<br />
Weight 20%<br />
“<strong>in</strong>vestigated”.<br />
3. Determ<strong>in</strong>e Did not submit or Partially<br />
what measures <strong>in</strong>completely determ<strong>in</strong>ed<br />
citizens c<strong>an</strong> take determ<strong>in</strong>ed what<br />
to protect private measures citizens<br />
<strong>in</strong>formation or c<strong>an</strong> take to protect<br />
those who are<br />
be<strong>in</strong>g<br />
“ <strong>in</strong>vestigated”.<br />
measures citizens<br />
c<strong>an</strong> take to protect<br />
private<br />
those who are<br />
be<strong>in</strong>g<br />
“ <strong>in</strong>vestigated”.<br />
those who are<br />
be<strong>in</strong>g<br />
“ <strong>in</strong>vestigated”.<br />
Satisfactorily Thoroughly<br />
what determ<strong>in</strong>ed what determ<strong>in</strong>ed what<br />
measures citizens measures citizens<br />
c<strong>an</strong> take to protect c<strong>an</strong> take to protect<br />
private<br />
private
<strong>in</strong>formation they<br />
do not w<strong>an</strong>t to be<br />
disclosed.<br />
private <strong>in</strong>formation<br />
or <strong>in</strong>formation they<br />
do not w<strong>an</strong>t to be<br />
disclosed.<br />
<strong>in</strong>formation<br />
<strong>in</strong>formation<br />
do not w<strong>an</strong>t to be<br />
disclosed.<br />
or <strong>in</strong>formation<br />
they <strong>in</strong>formation<br />
do not w<strong>an</strong>t to be<br />
disclosed.<br />
or <strong>in</strong>formation<br />
they <strong>in</strong>formation<br />
or<br />
they<br />
do not w<strong>an</strong>t to be<br />
disclosed.<br />
Weight 15%<br />
4. Discuss a<br />
Satisfactorily Thoroughly<br />
federal law that<br />
Partially discussed<br />
Did not submit or<br />
discussed a discussed a<br />
gr<strong>an</strong>ts the federal<br />
a federal law that<br />
<strong>in</strong>completely<br />
federal law that federal law that<br />
government the<br />
gr<strong>an</strong>ts the federal<br />
discussed a federal<br />
gr<strong>an</strong>ts the federal gr<strong>an</strong>ts the federal<br />
legal right to<br />
government the<br />
law that gr<strong>an</strong>ts the<br />
government the government the<br />
make private<br />
legal right to<br />
federal government<br />
legal right to make legal right to<br />
<strong>in</strong>formation on<br />
make private<br />
the legal right to<br />
private<br />
make private<br />
U.S. citizens<br />
<strong>in</strong>formation on<br />
make private<br />
<strong>in</strong>formation on <strong>in</strong>formation on<br />
available to the<br />
U.S. citizens<br />
<strong>in</strong>formation on U.S.<br />
U.S. citizens U.S. citizens<br />
public <strong>an</strong>d<br />
available to the<br />
citizens available to<br />
available to the available to the<br />
whether or not<br />
public <strong>an</strong>d<br />
the public <strong>an</strong>d<br />
public <strong>an</strong>d public <strong>an</strong>d<br />
you agree with<br />
whether or not<br />
whether or not you<br />
whether or not whether or not<br />
this law.<br />
you agree with<br />
agree with this law.<br />
you agree with you agree with<br />
this law.<br />
this law. this law.<br />
Weight 15%<br />
5. Determ<strong>in</strong>e<br />
whether there are<br />
“electronic<br />
privacy laws” that<br />
c<strong>an</strong> prevent others<br />
Did not submit or<br />
<strong>in</strong>completely<br />
determ<strong>in</strong>ed whether<br />
there are<br />
“electronic privacy<br />
from hav<strong>in</strong>g laws” that c<strong>an</strong><br />
c<strong>an</strong> prevent others c<strong>an</strong> prevent others c<strong>an</strong> prevent others<br />
access to “private prevent others from<br />
from hav<strong>in</strong>g from hav<strong>in</strong>g from hav<strong>in</strong>g<br />
<strong>in</strong>formation” as hav<strong>in</strong>g access to<br />
access to “private access to “private access to “private<br />
well as how “ private<br />
<strong>in</strong>formation” as <strong>in</strong>formation” as <strong>in</strong>formation” as<br />
effective they are. <strong>in</strong>formation” as<br />
Weight 15%<br />
6. Clarity, writ<strong>in</strong>g<br />
mech<strong>an</strong>ics, <strong>an</strong>d<br />
formatt<strong>in</strong>g<br />
requirements<br />
Weight 10%<br />
well as how<br />
effective they are.<br />
Partially<br />
determ<strong>in</strong>ed<br />
whether there are<br />
“electronic<br />
privacy laws” that<br />
well as how<br />
effective they are.<br />
Satisfactorily<br />
determ<strong>in</strong>ed<br />
whether there are<br />
“electronic<br />
privacy laws” that<br />
well as how<br />
effective they are.<br />
Thoroughly<br />
determ<strong>in</strong>ed<br />
whether there are<br />
“electronic<br />
privacy laws” that<br />
well as how<br />
effective they are.