An HU Investment Firm employee who had signed a non-disclosure agreement at the time of hire was identified as posting corporate protected information on the internet which has led to a loss of corporate income and trust of the companies that the corporation represents and does business with. The corporation has taken the incident to a Law firm in an attempt to lead to prosecution against the employee who has since been fired. Write a Summary Report to the Prosecutor based on the case scenario and your work in previous units. 1. Applicable laws and policies that relate to cyber defense 2. Describe the major components of each pertaining to the storage and transmission of data. 3. Describe the responsibilities related to the handling of data as it pertains to legal, ethical and/or agency auditing issues. 4. Describe how the type of legal dispute (civil, criminal, private) affects the evidence used to resolve it. 5. Support your report with documents that you have created previously, such as the Risk Assessment Report and the Mitigation Plan. (Attached) Remember to use a professional writing style and support your statements with logical evidence. Include APA citations within your paper as well as an APA formatted references list.

Summary Report

Case Scenario: An HU Investment Firm employee, who had signed a non-disclosure agreement, violated company policies by posting corporate protected information on the internet. This act has resulted in a loss of corporate income and damaged the trust of the companies that the corporation represents and does business with. The corporation has engaged a Law firm with the intention of prosecuting the former employee, who has subsequently been dismissed from their position.

1. Applicable laws and policies that relate to cyber defense:
Cyber defense involves ensuring the security and integrity of digital assets and data. Several laws and policies are relevant to this case, including:

a) The Computer Fraud and Abuse Act (CFAA): This federal law prohibits unauthorized access to computers and computer systems, as well as the transmission of malicious code or viruses. The former employee’s actions of posting protected information without authorization may be in violation of the CFAA.

b) The Digital Millennium Copyright Act (DMCA): This law provides provisions for copyright protection in the digital realm. The former employee’s unauthorized disclosure of protected corporate information may be considered a copyright violation.

c) Trade Secret Laws: Trade secrets, such as confidential business information, are protected by both federal and state laws. The former employee’s breach of the company’s non-disclosure agreement may be deemed a violation of these laws.

2. Major components of the storage and transmission of data:
The storage and transmission of data involve several key components:

a) Encryption: Data encryption is the process of converting information into a code that can only be deciphered with the appropriate decryption key. Encryption ensures that sensitive data remains unreadable even if intercepted during transmission.

b) Firewalls: Firewalls monitor and control network traffic, preventing unauthorized access to protected networks. They serve as a barrier between internal systems and external threats.

c) Access Controls: Access controls involve the implementation of authentication mechanisms, such as passwords or biometrics, to restrict access to data to authorized individuals only.

d) Data Backup and Recovery: Regular backups of data ensure that it can be restored in the event of accidental deletion, system failures, or security breaches.

3. Responsibilities related to handling data:
Handling data entails legal, ethical, and agency auditing obligations. These responsibilities include:

a) Legal Obligations: Organizations must comply with applicable laws and regulations regarding data protection, privacy, and intellectual property rights. Failure to do so may result in legal consequences.

b) Ethical Obligations: Individuals handling data should adhere to ethical standards and respect privacy rights. They should refrain from using data for personal gain or disclosing it without proper authorization.

c) Agency Auditing Obligations: Government agencies and regulatory bodies may conduct audits to ensure compliance with data protection regulations. Organizations must provide evidence of their adherence to these regulations.

4. Type of legal dispute and its effect on evidence:
The type of legal dispute (civil, criminal, private) affects the evidence used to resolve it. In criminal cases, the burden of proof lies with the prosecution, who must provide evidence beyond a reasonable doubt. In civil cases, the burden of proof is less stringent, requiring a preponderance of evidence. Private disputes may involve contractual considerations and rely on contractual agreements and evidence of breach.

5. Support with previously created documents:
The Risk Assessment Report and the Mitigation Plan, both previously created, provide valuable insights into the potential risks faced by organizations in the context of cyber defense. These reports can inform the prosecutor about the company’s efforts to prevent data breaches and the measures taken to mitigate such risks.

In conclusion, this Summary Report outlines the applicable laws and policies related to cyber defense, describes the major components of data storage and transmission, discusses responsibilities related to data handling, explains how the type of legal dispute affects evidence, and suggests supporting documents for reference. Prosecuting the former employee in this case will send a strong message about the importance of safeguarding corporate data and protecting against unauthorized disclosure.

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.


Click Here to Make an Order Click Here to Hire a Writer