Page 1

STRAYER LEG 500 Assignment 2 The Value of Digital Privacy in an Information Technology Age Click Here to Buy the Tutorial http://www.tutorialrank.com/LEG/STRAYER-LEG-500/product-3150-strayer-leg500-assignment-2-the-value-of-digital-privacy-in-an-information-technology-age For more course tutorials visit www.tutorialrank.com Tutorial Purchased: 3 Times, Rating: A

LEG 500 Assignment 2 The Value of Digital Privacy in an Information Technology Age Research Websites and other technologies that provide private information on U.S. citizens. Write a 3-4 page paper in which you 1. List and describe at least three (3) technologies that allow an individual to research citizens’ private data. 2. Discuss the advantages and disadvantages of public access to this information, both for the researchers and those who are being “ investigated”. 3. Determine what measures citizens can take to protect private information or information they do not want to be disclosed. 4. Discuss a federal law that grants the federal government the legal right to make private information on U.S. citizens available to the public, and whether or not you agree with this law. 5. Determine whether there are “electronic privacy laws” that can prevent others from having access to “private information” as well as how effective they are. The specific course learning outcomes associated with this LEG 500 Assignment are • Analyze employee and consumer privacy under the law. • Use technology and information resources to research issues in law, ethics, and corporate governance. • Write clearly and concisely about law, ethics, and corporate governance using proper writing mechanics. Grading for this LEG 500 Assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric. Points 100 LEG 500 Assignment 2 The Value of Digital Privacy in an Information Technology Age Criteria Unacceptable Below 70% F Fair


70-79% C Proficient 80-89% B Exemplary 90-100% A 1. List and describe at least three (3) technologies that allow an individual to research citizens’ private data. Weight 15% Did not submit or incompletely listed and described at least three (3) technologies that allow an individual to research citizens’ private data. Partially listed and described at least three (3) technologies that allow an individual to research citizens’ private data. Satisfactorily listed and described at least three (3) technologies that allow an individual to research citizens’ private data. Thoroughly listed and described at least three (3) technologies that allow an individual to research citizens’ private data. 2. Discuss the advantages and disadvantages of public access to this information, both for the researchers and those who are being “ investigated”. Weight 20% Did not submit or incompletely discussed the advantages and disadvantages of public access to this information, both for the researchers and those who are being “investigated”. Partially discussed the advantages and disadvantages of public access to this information, both for the researchers and those who are being “ investigated”. Satisfactorily discussed the advantages and disadvantages of public access to this information, both for the researchers and those who are being “ investigated”. Thoroughly discussed the advantages and disadvantages of public access to this information, both for the researchers and those who are being “ investigated”. 3. Determine what measures citizens can take to protect private information or information they do not want to be disclosed. Weight 15% Did not submit or incompletely determined what measures citizens can take to protect private information or information they do not want to be disclosed. Partially determined what measures citizens can take to protect private information or information they do not want to be disclosed. Satisfactorily determined what measures citizens can take to protect private information or information they do not want to be disclosed. Thoroughly determined what measures citizens can take to protect private information or information they do not want to be disclosed. 4. Discuss a federal law that grants the federal government the legal right to make private information on U.S. citizens available to the public and whether or not you agree with this law. Weight 15% Did not submit or incompletely discussed a federal law that grants the federal government the legal right to make private information on U.S. citizens available to the public and whether or not you agree with this law. Partially discussed a federal law that grants the federal government the legal right to make private information on U.S. citizens available to the public and whether or not you agree with this law. Satisfactorily discussed a federal law that grants the federal government the legal right to make private information on U.S. citizens available to the public and whether or not you agree with this law. Thoroughly discussed a federal law that grants the federal government the legal right to make private information on U.S. citizens available to the public and whether or not you agree with this law. 5. Determine whether there are “electronic privacy laws” that can prevent others from having access to “private information” as well as how effective they are. Weight 15% Did not submit or incompletely determined whether there are “electronic privacy laws” that can prevent others from having access to “ private information” as well as how effective they are. Partially determined whether there are “electronic privacy laws” that can


prevent others from having access to “private information” as well as how effective they are. Satisfactorily determined whether there are “electronic privacy laws” that can prevent others from having access to “private information” as well as how effective they are. Thoroughly determined whether there are “electronic privacy laws” that can prevent others from having access to “private information” as well as how effective they are. 6. Clarity, writing mechanics, and formatting requirements Weight 10%

Strayer leg 500 assignment 2 the value of digital privacy in an information technology age  

LEG 500 Assignment 2 The Value of Digital Privacy in an Information Technology Age (Str Course) LEG 500 Assignment 1 Employment-At-Will Doct...

Read more
Read more
Similar to
Popular now
Just for you