Identify specific cyber laws and ethics regulations that


Guidelines: use of 2-3 sources, 4-6 pages in length with double spacing, 12-point Times New Roman font, one-inch margins, and discipline-appropriate citations.

The following critical elements must be addressed:

1. Describe the information technology structureof the organization in the given scenario.

2. Identify specific cyberlaws and ethics regulationsthat pertain to the organization and its computing operations in the scenario.

3. Organizational ethics violations

• Classify unethical behaviors with respect to whether they are personal or professionalin nature, being sure to support your position with specific examples.

• Assess the impactof the unethical behaviors on IT and computing within the organization.

ABC Healthcare is fall under the Health Insurance Portability and Accountability Act (HIPAA) this is my tips.

Scenario

ABC Healthcare is a startup company with 50 employees. The company's computer network is shown in Figure 1 below. The healthcare data server contains the company's records, including copies of patient health records with personally identifiable data, patient billing, company financials, and forms.

You have been hired as the IT network security officer, reporting directly to the chief information officer (CIO). Currently, there is a network administrator who has very limited experience and worked as a desktop technician prior to joining ABC. This network administrator helped set up the existing network. In addition, ABC plans to hire a desktop technician and a website developer/programmer who will report directly to the CIO.

There are no policies or guidelines for employees' usage of the computers and network. Network setup was done by various vendors, and all of the programs use default usernames and passwords. Wireless access has been set up for staff using wireless laptops. The same wireless access point also provides clients access to the internet. Some staff members bring in their own computers and connect them to the network. Employees use the work systems for personal web browsing and to check personal email accounts.

As part of network security, management set up a video monitoring system throughout the office. Employees are not notified of any monitoring. There is a copier/printer in the front office that is used by employees. Currently, all unused copies are left next to the copier for recycling.

Solution Preview :

Prepared by a verified Expert
Computer Engineering: Identify specific cyber laws and ethics regulations that
Reference No:- TGS02516339

Now Priced at $10 (50% Discount)

Recommended (97%)

Rated (4.9/5)