Navigate to https://www.pcworld.com/article/126093/article.html Discuss the case study and answer the following questions: What laws have been violated? What do you think contributed to the problems that could lead to a violation of these laws? What are the implications to the individual and organization of these violations? What are some security controls and mitigation strategies for handling future violations? (Name three to five.) How does privacy law differ from information systems security?
The post What laws have been violated? first appeared on Template.