tag:blogger.com,1999:blog-26566699208703149272024-03-21T00:03:01.367-07:00William Slater's CYBR 510 BlogWilliam Favre Slater, IIIhttp://www.blogger.com/profile/05247248094266294971noreply@blogger.comBlogger10125tag:blogger.com,1999:blog-2656669920870314927.post-76820504150236861612011-12-21T12:50:00.000-08:002011-12-21T12:53:23.959-08:00Post 010 - CYBR 510<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjU39JsuB7u4LH3ff5x3iig29VM2laBXa6qWwlaOUmQAEm4qSjJ8D_U0144bDiTU_h9TL-tlpIyDCPDndXxGvo6-bLJzcNITXlPv_8NTH1UZLcVmA6FHCsXbHV-2qfwIXsDHMUmCtJ5VAQ/s1600/Roman_Numeral_Turquoise_04.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjU39JsuB7u4LH3ff5x3iig29VM2laBXa6qWwlaOUmQAEm4qSjJ8D_U0144bDiTU_h9TL-tlpIyDCPDndXxGvo6-bLJzcNITXlPv_8NTH1UZLcVmA6FHCsXbHV-2qfwIXsDHMUmCtJ5VAQ/s1600/Roman_Numeral_Turquoise_04.jpg" /></a></div>
<div style="text-align: center;">
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVDKqXVUDks21jQ7tJbuNwk49b3w48qAARYS4G78Xaqr60sKsSUzdVHtOXyUz6EzTx_mLe30F3CVf078lt3_AsJ5I5sxXUreN0G8gjvzHsGX-YyZcUqc5TfQIzwuO23sBqteOaPc6qXhM/s1600/IT_Security_Learning_Continuum_.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVDKqXVUDks21jQ7tJbuNwk49b3w48qAARYS4G78Xaqr60sKsSUzdVHtOXyUz6EzTx_mLe30F3CVf078lt3_AsJ5I5sxXUreN0G8gjvzHsGX-YyZcUqc5TfQIzwuO23sBqteOaPc6qXhM/s640/IT_Security_Learning_Continuum_.jpg" width="498" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<span style="font-size: x-small;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<span style="font-family: 'Trebuchet MS', sans-serif; font-size: x-small;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<span style="font-family: 'Trebuchet MS', sans-serif; font-size: x-small;">Source: NIST SP 800-50</span></div>
<br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif; font-size: x-large;"><b> Week Four Assignments</b></span><br />
<br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">Week 4 Summary</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">Theme for the Week-Training and Development for High Performance</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">This week:</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>Why and how to train</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>Computer aided training</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>Measureing effectiveness</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">Learning Objectives:</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>Distinguish the effectiveness of training methods in an organization.</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>Evaluate training case studies.</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>Compare and contrast the benefits of training in a security program.<span class="Apple-tab-span" style="white-space: pre;"> </span></span><br />
<br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">Readings</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">Week 4 Reading Assignments</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span> Security Operations Management, Chapter 4</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>Security Operations Management - Appendix C- Task Force Report<span class="Apple-tab-span" style="white-space: pre;"> </span></span><br />
<br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">Week 4 Discussion Post</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">On Week 4 Forum, post your response to one of the following questions:</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>Explain how important training is for security personnel. Discuss the similarities and differences between security training and law enforcement training. This is your opinion and viewpoints on the importance of security training. You can provide examples and analogies to back up your point.</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>Explain how security personnel training can be evaluated. How do you measure the effectiveness of the training? What are the inherent limitations in measuring the effectiveness of training?</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>How has the Information Age affected content and delivery of training programs?</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>What are the strengths of the case history method for training? What are its weaknesses?</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>What are the differences and similarities between training, education, and awareness? Provide scenarios for each.</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>Compare and contrast two training techniques. Provide specific examples where each is effective and ineffective.</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">Your answer should be 2-3 paragraphs in length with proper attention given to spelling and grammar. Try not to repeat a question answered by another student. You can use the textbook and supplemental reading, but you should also include at least one Internet site or outside reference that provides information on your topic. Once you have submitted your initial post, read each of your classmates' initial posts and respond to at least four of them (by Friday, Jan 6). You should be posting on multiple days. In your response, provide your comments and any additional information you might have. Remember to cite your sources.</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">Directions: Each student must respond to a minimum of four other students’ threaded discussion postings in a “substantive and meaningful” manner. Do not simply agree or disagree – provide a quality response that reflects critical thinking. To foster learning, “professional and constructive” criticism is encouraged when responding to your classmates.</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">The weekly discussion questions, to allow time for students to respond, must be answered by 11:59 p.m. on Sunday of each week. Please see the discussion evaluation section in the syllabus for detailed expectations and directions of how your discussion board postings and overall participation is evaluated. </span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">Reminders: Each student must respond to the weekly questions. Discussion postings should reflect some new or original information – do not just regurgitate data or opinion posted by previous students. The quality of your effort will be considered when grading discussion postings.</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">This assignment is worth 100 points total.<span class="Apple-tab-span" style="white-space: pre;"> </span></span><br />
<br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">Correcting Poor Work Case Study</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">Week 4 Written Assignments</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">In one Word document, complete the following:</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>View the “Correcting Poor Work” case study. The link is located above.</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>Once you view all three scenarios, discuss which scenario did you see Joel properly correcting Tim’s poor work? Why did you pick that scenario?</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>What were Joel’s behaviors? Please give your opinion of how correcting poor work should be taken care of as well as how you would approach correcting a subordinate’s poor work. </span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>If you have encountered this type of situation, please relate this in your work.</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">Reminders: Students are required to submit assignments with a name, course name/number and page numbers on your assignments. Please double space your work, and re-state the question. Grading is facilitated when the assignment submission is well structured, and the questions (opposed to your answers) have been bolded. File Naming Convention: Students are required to submit assignments with their last name, followed by the week’s assignment; e.g. smith1.2. Microsoft Word documents only. Late submitters will be penalized.</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">Weekly written assignments will be due by 11:59 p.m. on Sunday at the end of each week. Specific assignments will be posted each week throughout the course. Your grade will be predicated on the quality of your thinking and writing - NOT the length of your writing. Too many words are usually a sign of poor editing, and too few words are a sign of poor analysis. </span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">This assignment is worth 100 points total.</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">Week 4 Journal</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">Each student will complete “weekly” entries into a well-organized journal that reflects how the weekly coursework (reading and assignment) and discussion has impacted their personal and professional lives. Essentially, the journal - akin to a personal diary, should capture the meaningful and significant aspects of the course which generated student analysis and thought. Your weekly journal entry will be due by 11:59 p.m. on Sunday at the end of each week. </span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">This assignment is worth 100 points total.<span class="Apple-tab-span" style="white-space: pre;"> </span></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<br />
<div class="MsoNormal">
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">= = = = = = = = = = = = = = = = = = = = = = =</span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-size: 9pt;"><span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">William Favre Slater, III <o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-size: 9pt;"><span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">MBA, M.S., PMP, CISSP, SSCP, CISA, ISO 27002,
ISO 20000, ITIL v3, Cloud Computing Foundation <o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-size: 9pt;"><span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">Project Manager / Program Manager<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-size: 8pt;"><span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">CYBR 510 Blog:
<a href="http://cybr510.blogspot.com/">http://cybr510.blogspot.com</a><o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-size: 9pt;"><span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><a href="http://billslater.com/career">http://billslater.com/career</a><o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-size: 9pt;"><span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">Chicago, IL<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-size: 9pt;"><span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">United States of America<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<br />William Favre Slater, IIIhttp://www.blogger.com/profile/05247248094266294971noreply@blogger.com2tag:blogger.com,1999:blog-2656669920870314927.post-54169536843967168572011-12-21T12:34:00.000-08:002011-12-21T12:34:27.364-08:00Post 009 - CYBR 510<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUjA-mJaJl_rZmlJ6-KCj-QPc1netgCkLlSXPl4toQzWt9NYDYQ_SyPd-mYUXeVn65u0FuXQz_qaUp-NPiJv8FhwiQwDGeXFVsl0xSfh-8O8e8jHr_dl2BT7XPoqbfLHAyPvsV6vQ1_QM/s1600/interview_02.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span style="font-family: 'Trebuchet MS', sans-serif;"><img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUjA-mJaJl_rZmlJ6-KCj-QPc1netgCkLlSXPl4toQzWt9NYDYQ_SyPd-mYUXeVn65u0FuXQz_qaUp-NPiJv8FhwiQwDGeXFVsl0xSfh-8O8e8jHr_dl2BT7XPoqbfLHAyPvsV6vQ1_QM/s400/interview_02.jpg" width="400" /></span></a></div>
<div class="separator" style="clear: both; text-align: center;">
<span style="font-family: 'Trebuchet MS', sans-serif; font-size: x-small;">Interview - Source: Microsoft Office Online Clip-art</span></div>
<div style="text-align: center;">
<span style="font-family: 'Trebuchet MS', sans-serif;"><br /></span></div>
<span style="font-family: 'Trebuchet MS', sans-serif;"><br /></span><table border="1" cellpadding="0" cellspacing="0" class="MsoNormalTable" style="border-bottom-style: none; border-collapse: collapse; border-color: initial; border-image: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial; margin-left: 4.8pt; width: 577px;">
<tbody>
<tr>
<td style="border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 6.15in;" valign="top" width="590">
<div class="MsoNormal" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-family: 'Trebuchet MS', sans-serif; font-size: x-small;">Assignment Description:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-family: 'Trebuchet MS', sans-serif; font-size: x-small;">On Week 3 Forum, post your response to one of the following
items. While you must answer the questions, you don't have to do it in
question-answer format. You can make it a narrative that includes the
answers.<o:p></o:p></span></div>
<ul style="margin-top: 0in;" type="disc">
<li class="MsoNormal" style="margin-bottom: 6pt; margin-top: 6pt;"><span style="font-family: 'Trebuchet MS', sans-serif; font-size: x-small;">What is your opinion of pre-employment screening? How does
pre-employment screening affect an organization? Discuss how
pre-employment screening affects the process of recruiting employees.<o:p></o:p></span></li>
<li class="MsoNormal" style="margin-bottom: 6pt; margin-top: 6pt;"><span style="font-family: 'Trebuchet MS', sans-serif; font-size: x-small;">Is it fair to perform Internet searches on applicants? What is
allowed or not allowed for application Internet searches? Has this
caused any issues that you know of or can find for applicants? <o:p></o:p></span></li>
<li class="MsoNormal" style="margin-bottom: 6pt; margin-top: 6pt;"><span style="font-family: 'Trebuchet MS', sans-serif; font-size: x-small;">How does personnel planning assist an organization in achieving
the performance level that is needed for a successful organization? Why
is it important to include security in the personnel planning and
employment process?<o:p></o:p></span></li>
<li class="MsoNormal" style="margin-bottom: 6pt; margin-top: 6pt;"><span style="font-family: 'Trebuchet MS', sans-serif; font-size: x-small;">How can the whole employment process “weed” out potential
employees who may not be the right fit for an organization? How
important is it to have a good fit for both the organization and the
prospective employee?<o:p></o:p></span></li>
</ul>
<div class="MsoNormal" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-family: 'Trebuchet MS', sans-serif; font-size: x-small;">Your answer should be 2-3 paragraphs in length with proper
attention given to spelling and grammar. You can use the textbook and
supplemental reading, but you should also include at least one Internet sites
that provide information on your topic. Once you have submitted your initial
post (by Friday night), read each of your classmates' initial posts and
respond to at least four of them. In your response, provide your comments and
any additional information you might have. Remember to cite your sources.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-family: 'Trebuchet MS', sans-serif; font-size: x-small;">Directions: Each student must respond to a minimum of four other
students’ threaded discussion postings in a “substantive and meaningful”
manner. Do not simply agree or disagree – provide a quality response that
reflects critical thinking. To foster learning, “professional and
constructive” criticism is encouraged when responding to your classmates. <o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-family: 'Trebuchet MS', sans-serif; font-size: x-small;">The weekly discussion questions, to allow time for students to
respond, must be answered by 11:59 p.m. on Sunday of each week. Please see
the discussion evaluation section in the syllabus for detailed expectations
and directions of how your discussion board postings and overall participation
is evaluated. <o:p></o:p></span></div>
<div class="MsoNormal" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-family: 'Trebuchet MS', sans-serif;"><span style="font-size: x-small;">Reminders: Each student must respond to the weekly questions.
Discussion postings should reflect some new or original information – do not
just regurgitate data or opinion posted by previous students. The quality of
your effort will be considered.</span><b><span style="font-size: 16pt;"><o:p></o:p></span></b></span></div>
</td>
</tr>
</tbody></table>
<div class="MsoNormal">
<br /></div>
<span style="font-family: 'Trebuchet MS', sans-serif;"><b><span style="font-size: 16pt;"><br clear="all" style="page-break-before: always;" />
</span></b>
</span><div class="MsoNormal" style="margin-bottom: 6pt; margin-left: 0.5in; margin-right: 0in; margin-top: 6pt; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: 'Trebuchet MS', sans-serif;"><span style="font-size: 16pt;">·<span style="font: 7.0pt "Times New Roman";">
</span></span><!--[endif]--><b><span style="font-size: 16pt;">What is your opinion of
pre-employment screening? How does pre-employment screening affect an
organization? Discuss how pre-employment screening affects the process of
recruiting employees.<o:p></o:p></span></b></span></div>
<div class="MsoNormal" style="margin-left: 0.25in;">
<br /></div>
<div class="MsoNormal" style="margin-left: 0.25in;">
<span style="font-family: 'Trebuchet MS', sans-serif;"><b><span style="font-size: 16pt;">Answer:<br />
</span></b><span style="font-size: 16pt;">First, an
organization should establish policies, guidelines, and regulations regarding
its recruitment practices, especially those that are related to pre-employment
screening.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-left: 0.25in;">
<br /></div>
<div class="MsoNormal" style="margin-left: 0.25in;">
<span style="font-size: 16pt;"><span style="font-family: 'Trebuchet MS', sans-serif;">Pre-employment screening usually takes four main forms:<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-left: 1in; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: 'Trebuchet MS', sans-serif;"><b><span style="font-size: 16pt;">1)<span style="font: 7.0pt "Times New Roman";"> </span></span></b><!--[endif]--><span style="font-size: 16pt;">Character reference checks<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-left: 1in; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: 'Trebuchet MS', sans-serif;"><b><span style="font-size: 16pt;">2)<span style="font: 7.0pt "Times New Roman";"> </span></span></b><!--[endif]--><span style="font-size: 16pt;">Completeness and accuracy check of
the resume<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-left: 1in; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: 'Trebuchet MS', sans-serif;"><b><span style="font-size: 16pt;">3)<span style="font: 7.0pt "Times New Roman";"> </span></span></b><!--[endif]--><span style="font-size: 16pt;">Confirmation and verification of
educational and professional credentials<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-left: 1in; text-indent: -0.25in;">
<!--[if !supportLists]--><span style="font-family: 'Trebuchet MS', sans-serif;"><b><span style="font-size: 16pt;">4)<span style="font: 7.0pt "Times New Roman";"> </span></span></b><!--[endif]--><span style="font-size: 16pt;">Check against a passport or some
other government-issued form of identification.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-left: 2.75in;">
<span style="font-size: 14pt;"><span style="font-family: 'Trebuchet MS', sans-serif;">(Calder and Watkins, 2009).<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-size: 16pt;"><span style="font-family: 'Trebuchet MS', sans-serif;">Now that there are web services, companies also use third parties
and also the hiring companies will do their own Google searches on
candidates. <o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-size: 16pt;"><span style="font-family: 'Trebuchet MS', sans-serif;">(McCrie, 2007).<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<span style="font-family: 'Trebuchet MS', sans-serif;"><b><span style="font-size: 16pt;"><br clear="all" style="page-break-before: always;" />
</span></b>
</span><div class="MsoNormal" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<b><span style="font-size: 16pt;"><span style="font-family: 'Trebuchet MS', sans-serif;">Q. What is your opinion of pre-employment
screening? <o:p></o:p></span></span></b></div>
<div class="MsoNormal" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<br /></div>
<div class="MsoNormal">
<span style="font-family: 'Trebuchet MS', sans-serif;"><b><span style="font-size: 16pt;">Answer:<br />
</span></b><span style="font-size: 16pt;">I believe
pre-employment it is a vital step in hiring the right candidate. Without this type of screening, employers
constantly subject themselves to the risks of hiring inferior candidates that
might ot be qualified to fill the position to which they were applying.<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: 'Trebuchet MS', sans-serif;"><span style="font-size: 16pt;"><br /></span></span></div>
<div class="MsoNormal">
<span style="font-family: 'Trebuchet MS', sans-serif;"><span style="font-size: 16pt;"><br /></span></span></div>
<div class="MsoNormal">
<span style="color: navy;"><span style="font-family: 'Trebuchet MS', sans-serif;">= = = = = = = = = = = = = = = = = =
= = = = = =<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: 'Trebuchet MS', sans-serif;"><span style="font-size: 16pt; line-height: 115%;">This is the questionnaire I created to screen E-Mail
Server Technical Support candidates nearly five years ago:<br />
<br />
</span><span style="color: #b4a7d6;">(Please use as much space as you need to answer these questions.)</span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="color: #b4a7d6; font-family: 'Trebuchet MS', sans-serif;">Describe a tough problem you had to troubleshoot on a
production server or production network.</span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="color: #b4a7d6; font-family: 'Trebuchet MS', sans-serif;">When setting up a mail server in DNS, what is the special
type of record required to define the mail server?</span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="color: #b4a7d6; font-family: 'Trebuchet MS', sans-serif;">If you have multiple Exchange Servers at a site, within a
single domain, what is required when you replace the first Exchange Server at
this site? (This was more applicable to Exchange 5.5…)</span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="color: #b4a7d6; font-family: 'Trebuchet MS', sans-serif;">Describe a significant network or computer security issue
you have had to deal with and solve.</span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="color: #b4a7d6; font-family: 'Trebuchet MS', sans-serif;">What is the highest number of problem tickets you have ever
resolved in a single day?</span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="color: #b4a7d6; font-family: 'Trebuchet MS', sans-serif;">Besides what is on your resume, what other areas of IT and
career skills do you work on?</span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="color: navy;"><span style="font-family: 'Trebuchet MS', sans-serif;">= = = = = = = = = = = = = = = = = =
= = = = = =<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<br /></div>
<div class="MsoNormal" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<b><span style="font-size: 16pt;"><span style="font-family: 'Trebuchet MS', sans-serif;">Q. How does pre-employment screening
affect an organization? <o:p></o:p></span></span></b></div>
<div class="MsoNormal" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<br /></div>
<div class="MsoNormal">
<span style="font-family: 'Trebuchet MS', sans-serif;"><b><span style="font-size: 16pt;">Answer:<br />
<!--[if !supportLineBreakNewLine]--><br />
<!--[endif]--></span></b><span style="font-size: 16pt;"><o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-size: 16pt;"><span style="font-family: 'Trebuchet MS', sans-serif;">Pre-employment screen can improve the morale in an organization,
because the employees will know that their new co-workers will be held to a
high standard of being able to pass the pre-employment screening.<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-size: 16pt;"><span style="font-family: 'Trebuchet MS', sans-serif;">Pre-employment also helps an organization my improving the overall
quality of the workforce and helping the security posture of the organization
by reducing the inherent security risks associated with hiring an improperly
vetted employee.<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-size: 16pt;"><span style="font-family: 'Trebuchet MS', sans-serif;">(McCrie, 2007).<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<span style="font-family: 'Trebuchet MS', sans-serif;"><span style="font-size: 16pt;"><br clear="all" style="page-break-before: always;" />
</span>
</span><div class="MsoNormal" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 16pt;"><b><span style="font-family: 'Trebuchet MS', sans-serif;">Q. Discuss how pre-employment screening affects the process of
recruiting employees.<o:p></o:p></span></b></span></div>
<div class="MsoNormal">
<span style="font-size: 16pt;"><span style="font-family: 'Trebuchet MS', sans-serif;"><b>Answer:</b><o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-size: 16pt;"><span style="font-family: 'Trebuchet MS', sans-serif;">Pre-employment screening makes the process of hiring employees
more efficient and thorough because it means that employees that get screened
and interviewed as finalist candidates have already met rigorous
requirements. It also helps stop the wasting
of the hiring manager’s precious time, because the hiring manager knows that he
or she will only be screening candidates that are worth hiring.<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-size: 16pt;"><span style="font-family: 'Trebuchet MS', sans-serif;">(McCrie, 2007).<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div align="center" class="MsoNormal" style="text-align: center;">
<b><span style="font-size: 12pt; line-height: 115%;"><span style="font-family: 'Trebuchet MS', sans-serif;">References:<o:p></o:p></span></span></b></div>
<div style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-indent: -58.3pt;">
<span style="line-height: 200%; mso-bidi-font-size: 10.0pt;"><span style="font-family: 'Trebuchet MS', sans-serif;">Calder, A. and Watkins, S.
(2009). IT Governance: A Manager’s Guide
to Data Security and ISO27001/ISO27002, 4<sup>th</sup> edition. London, U.K.:
Kogan Page.<o:p></o:p></span></span></div>
<div style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-indent: -58.3pt;">
<span style="line-height: 200%; mso-bidi-font-size: 10.0pt;"><span style="font-family: 'Trebuchet MS', sans-serif;">McCrie, R. D. (2007).
Security Operations Management, second edition. Burlington, MA: Elsevier.<o:p></o:p></span></span></div>
<div style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-indent: -58.3pt;">
<span style="line-height: 200%; mso-bidi-font-size: 10.0pt;"><span style="font-family: 'Trebuchet MS', sans-serif;">Whitman, M. E and Mattord,
H. J. (2010). Management of Information Security, third edition: Indianapolis,
IN: Course Technology.</span><o:p></o:p></span></div>William Favre Slater, IIIhttp://www.blogger.com/profile/05247248094266294971noreply@blogger.com0tag:blogger.com,1999:blog-2656669920870314927.post-19918976138654671472011-12-21T11:04:00.000-08:002011-12-21T23:45:07.954-08:00Post 008 - CYBR 510<span style="color: #eeeeee;"><br /></span><br />
<div style="text-align: center;">
<span style="color: #eeeeee;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqmWH5gU2aSgr0SgJWXep1aTQeYD3hM1p5-at0C1A5W7egtz2QvJaGY1-YK0e_rd0n5oAIvntKv_MJ4bzg9R62XTnY4LvhtSg8Mhogh7Xu3lRP2O0bwMQtCxvsBrPd43fQEcKipvAVJ4M/s1600/polygraph.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span style="color: #eeeeee;"><img border="0" height="321" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqmWH5gU2aSgr0SgJWXep1aTQeYD3hM1p5-at0C1A5W7egtz2QvJaGY1-YK0e_rd0n5oAIvntKv_MJ4bzg9R62XTnY4LvhtSg8Mhogh7Xu3lRP2O0bwMQtCxvsBrPd43fQEcKipvAVJ4M/s400/polygraph.jpg" width="400" /></span></a></div>
<div class="separator" style="clear: both; text-align: center;">
<span style="color: #eeeeee;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<span style="color: #eeeeee; font-size: x-small;">Source: <a href="http://www.crimemagazine.com/users-guide-polygraph-exam">http://www.crimemagazine.com/users-guide-polygraph-exam</a></span></div>
<div style="text-align: center;">
<span style="color: #eeeeee;"><br /></span></div>
<div style="text-align: center;">
<span style="color: #eeeeee;"><br /></span></div>
<span style="color: #eeeeee;"><br /></span><br />
<br />
<div class="MsoNormal">
<b><span style="font-family: 'Times New Roman', serif; line-height: 115%;"><span style="color: #eeeeee; font-size: x-small;">Assignment
Description:<o:p></o:p></span></span></b></div>
<table border="1" cellpadding="0" cellspacing="0" class="MsoNormalTable" style="border-collapse: collapse; border: none; margin-left: .2in; mso-border-alt: solid windowtext .5pt; mso-border-insideh: .5pt solid windowtext; mso-border-insidev: .5pt solid windowtext; mso-padding-alt: 0in 5.4pt 0in 5.4pt; mso-yfti-tbllook: 1184;">
<tbody>
<tr>
<td style="border: solid windowtext 1.0pt; mso-border-alt: solid windowtext .5pt; padding: 0in 5.4pt 0in 5.4pt; width: 6.45in;" valign="top" width="619"><div class="MsoNormal" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-family: 'Times New Roman', serif;"><span style="color: #eeeeee; font-size: x-small;">In one Word
document, discuss the following:<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-family: 'Times New Roman', serif;"><span style="color: #eeeeee; font-size: x-small;">View the
“Polygraph Testing” case study module. The link for the module can be found
in the “Week 3 Assignments” folder.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-family: 'Times New Roman', serif;"><span style="color: #eeeeee; font-size: x-small;">After
viewing the case study, discuss how you feel the testing of Aldrich Ames was
handled by the polygraph operators. What could have been done to eliminate
the errors? Explain why you think Ames
“beat the system.”<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-family: 'Times New Roman', serif;"><span style="color: #eeeeee; font-size: x-small;">Furthermore,
discuss if you have ever been involved with a polygraph test and what
occurred. Relate this to this case study. If you have not been involved in a
polygraph test, discuss what you think it would be like.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-family: 'Times New Roman', serif;"><span style="color: #eeeeee; font-size: x-small;">Reminders:
Students are required to submit assignments with a name, course name/number
and page numbers on your assignments. Please double space your work, and
re-state the question. Grading is facilitated when the assignment submission
is well structured, and the questions (opposed to your answers) have been bolded.
File Naming Convention: Students are required to submit assignments with
their last name, followed by the week’s assignment; e.g. smith1.2. Microsoft
Word documents only. Late submitters will be penalized.<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-family: 'Times New Roman', serif;"><span style="color: #eeeeee; font-size: x-small;">Weekly
written assignments will be due by 11:59 p.m. on Sunday at the end of each
week. Specific assignments will be posted each week throughout the course.
Your grade will be predicated on the quality of your thinking and writing -
NOT the length of your writing. Too many words are usually a sign of poor
editing, and too few words are a sign of poor analysis. (Submit for grading
use the link below)<o:p></o:p></span></span></div>
<div class="MsoNormal" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-family: 'Times New Roman', serif;"><span style="color: #eeeeee;"><span style="font-size: x-small;">This
assignment is worth 100 points total.</span><span style="font-size: 9pt;"><o:p></o:p></span></span></span></div>
</td>
</tr>
</tbody></table>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div align="center" class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<br /></div>
<div align="center" class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0in; text-align: center;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="bylineaffiliation" style="line-height: 200%; margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-align: center;">
<span style="font-family: 'Times New Roman', serif; font-size: 12pt; line-height: 200%;"><span style="color: #eeeeee;">A Brief Analysis of
the Aldrich Ames Polygraph Screening Case<o:p></o:p></span></span></div>
<div class="bylineaffiliation" style="line-height: 200%; margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-align: center;">
<span style="font-family: 'Times New Roman', serif; font-size: 12pt; line-height: 200%;"><span style="color: #eeeeee;">William
Slater<o:p></o:p></span></span></div>
<div class="bylineaffiliation" style="line-height: 200%; margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-align: center;">
<span style="color: #eeeeee;"><span style="font-family: 'Times New Roman', serif; font-size: 12pt; line-height: 200%;">CYBR 510 – Physical,
Operations, and Personnel Security</span><span style="font-family: 'Times New Roman', serif; font-size: 12pt; line-height: 200%;"><o:p></o:p></span></span></div>
<div class="bylineaffiliation" style="line-height: 200%; margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-align: center;">
<span style="font-family: 'Times New Roman', serif; font-size: 12pt; line-height: 200%;"><span style="color: #eeeeee;">Bellevue University<o:p></o:p></span></span></div>
<div class="bylineaffiliation" style="line-height: 200%; margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-align: center;">
<span style="font-family: 'Times New Roman', serif; font-size: 12pt; line-height: 200%;"><span style="color: #eeeeee;">Week 3, Writing Assignment<o:p></o:p></span></span></div>
<div class="bylineaffiliation" style="line-height: 200%; margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-align: center;">
<span style="font-family: 'Times New Roman', serif; font-size: 12pt; line-height: 200%;"><span style="color: #eeeeee;">Ronald Woerner, M.S. - Instructor<o:p></o:p></span></span></div>
<div class="bylineaffiliation" style="line-height: 200%; margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-align: center;">
<span style="font-family: 'Times New Roman', serif; font-size: 12pt; line-height: 200%;"><span style="color: #eeeeee;">December
18, 2011<o:p></o:p></span></span></div>
<div class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0in;">
<br /></div>
<div class="MsoNormal">
<br /></div>
<span style="color: #eeeeee;"><span style="font-family: 'Times New Roman', serif; font-size: 12pt; line-height: 200%;"><br clear="all" style="page-break-before: always;" />
</span>
</span><br />
<div align="center" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: center; text-indent: -58.3pt;">
<b><span style="color: #eeeeee;">A Brief Analysis of
the Aldrich Ames Polygraph Screening Case<o:p></o:p></span></b></div>
<div style="line-height: 200%; margin-bottom: .0001pt; margin: 0in;">
<span style="color: #eeeeee;">This brief paper
will present an analysis of Aldrich Ames Polygraph Screening Case. Aldrich Ames was a CIA counterintelligence
spy who was ultimately charged with selling top secret data to secret agents of
Russia and the former Soviet Union during the Cold War. This case initially appears that Aldrich beat
a polygraph examination, because he was seen to have not passed the examination
on the first attempt and then came back four days later and registered
responses that indicated he was telling the truth (Bellevue University, 2011).</span></div>
<div style="line-height: 200%; margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div align="center" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: center; text-indent: -58.3pt;">
<b><span style="color: #eeeeee;">How Could Errors
Have Been Avoided in the Aldrich Ames
Polygraph Screening Case?<o:p></o:p></span></b></div>
<div style="line-height: 200%; margin-bottom: .0001pt; margin: 0in;">
<span style="color: #eeeeee;"> According to the case study, the
initial results of Mr. Ames’ polygraph examination indicated deceptive
responses regarding his behavior related to his personal finances (Bellevue
University, 2011). Such behaviors
related to large expenditures and unexplained affluence and assets can to point
suspicious sources of income, especially sources such as income possibly gained
from spying activities if an employee has access to secret data that could have
been sold to foreign agents.</span></div>
<div style="line-height: 200%; margin-bottom: .0001pt; margin: 0in;">
<span style="color: #eeeeee;"> In the McCrie text, there are two
primary types of errors that can occur during polygraph examinations. The first is the false negatives that are the
false decisions made by the examiner that can occur when the person being examined
is not speaking falsely, yet they are actually being deceptive. The second is the false positives that can
occur when examiner makes false decisions about the person being examined, yet
the examinee is actually being truthful <span style="line-height: 200%;">(McCrie,2007).</span></span></div>
<div style="line-height: 200%; margin-bottom: .0001pt; margin: 0in;">
<span style="color: #eeeeee;"> However, if there are established
procedures that require the complete submission of all data related to a
polygraph examination and the examiner failed to follow those procedures, that
allowed Mr. Ames to give the appearance that he had “beat the system” when in fact,
it was Ames’ own, over confident and unusually friendly that probably caused
the polygraph examiner to not be on guard and follow all his required
procedures explicitly and to the letter.</span></div>
<div style="line-height: 200%; margin-bottom: .0001pt; margin: 0in;">
<span style="color: #eeeeee;"> If the polygraph examiner who
examined Mr. Ames had followed his training and required procedures explicitly
and reported both sets of results it would have probably raised flags and
required that Ames submit to a different set of polygraph examinations from an
entirely new examiner. I also think that
the polygraph examiner who examined Mr. Ames was probably younger than Ames and
not very experienced, or he would have not allowed Ames to engage him in the
friendly conversation that preceded the exam, inquiring about the examiner’s
background, experience and interested in that kind of work (Bellevue
University, 2011).</span></div>
<div style="line-height: 200%; margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div align="center" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: center; text-indent: -58.3pt;">
<b><span style="color: #eeeeee;">How was Aldrich Ames Finally Caught by the FBI?<o:p></o:p></span></b></div>
<div style="line-height: 200%; margin-bottom: .0001pt; margin: 0in;">
<span style="color: #eeeeee;"> Ames was finally caught after nine
years of misleading investigators, because he exhibited suspicious, provocative
behavior by speeding his sports car, and that warranted further
investigation. His demise is described
in the passage below: </span></div>
<div style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 1.0in; margin-right: 1.0in; margin-top: 5.0pt;">
<b><span style="font-size: 11pt; line-height: 200%;"><span style="color: #eeeeee;">“But, in an inquiry that careered like a roller coaster, the F.B.I. got
its first big break just a few days later. Ignoring the warnings of their
superiors, agents pilfered Mr. Ames's household trash, switching refuse cans in
a nighttime operation that yielded a decisive find: a torn-up draft of a note
from the suspect to his Russian handlers.<o:p></o:p></span></span></b></div>
<div style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 1.0in; margin-right: 1.0in; margin-top: 5.0pt;">
<b><span style="font-size: 11pt; line-height: 200%;"><span style="color: #eeeeee;">A few weeks later, Federal agents broke into Mr. Ames's house and, in a
search authorized by the Attorney General, found in his computer a wealth of
incriminating data, including his procedures for secret communications with the
Russians.<o:p></o:p></span></span></b></div>
<div style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 1.0in; margin-right: 0in; margin-top: 0in;">
<b><span style="font-size: 11pt; line-height: 200%;"><span style="color: #eeeeee;">“F.B.I.
officials, including senior investigators who supervised the inquiry and agents
who ran it in the field, have previously been under strict orders not to
discuss it. Now, almost a year after Mr. Ames's arrest, those officials, in
response to numerous requests, have talked about the case in a series of
interviews in recent days (Kidwell, 1995).”<o:p></o:p></span></span></b></div>
<div style="line-height: 200%; margin-bottom: .0001pt; margin: 0in;">
<span style="color: #eeeeee;"> These activities resulted in the
final conviction and incarceration of Ames where is serving a life sentence in
a federal prison without any possibility of parole. The secrets he sold to foreign agents
reportedly compromised the operations of other CIA agents and resulted in
irreparable harm to the U.S. Government.</span></div>
<div align="center" style="line-height: 200%; margin-bottom: .0001pt; margin: 0in; text-align: center;">
<br /></div>
<div align="center" style="line-height: 200%; margin-bottom: .0001pt; margin: 0in; text-align: center;">
<b><span style="color: #eeeeee;">My Own Experience
Related to Polygraph Examinations<o:p></o:p></span></b></div>
<div style="line-height: 200%; margin-bottom: .0001pt; margin: 0in;">
<span style="color: #eeeeee;"> From 1972 until 1977, I worked my
way through the last year of high school and then four years of college as a
retail clerk in a Kroger grocery store.
I started at one store in July 1972 and transferred to another store in
July 1974 because it was closer to the campus of the university where I was
working on my bachelor’s degree. At the
second store location, there was a management change less than six months after
I arrived. Within 12 months, the store
was experiencing huge money losses that resulted from “inventory shrinkage”
that represented truckloads of merchandise being stolen in short periods of
time. Even though I was afforded protections
against polygraph examinations by the Retail Clerks Union to which I belong,
during the investigation that resulted, I was strongly persuaded and agreed to
take a polygraph examination. Prior to
the examiniation, I was briefed on the entire process and what they were trying
to discover using the polygraph examination.
Though I was truthful regarding my own employee performance, when asked by
the polygraph examiner about detailed knowledge of activities of other
employees, I lied and did so intentionally.
I was not about to become an informant on my fellow employees. These were fellow coworkers who had been
manually ringing up cartons of cigarettes and six-packs of beer for one tenth
the listed price. The result was I
completed the exam and was never called back for a discussion of the
results. I also never brought it up
again either, and secretly I was angry at myself for unnecessarily subjecting myself to this unpleasant experience, when I had explicitly
guaranteed union protection regarding this practive. In my own set of values, I felt that I had
subjected myself to the perils have my character questioned, when I did not
have to submit to this situation voluntarily.</span></div>
<div style="line-height: 200%; margin-bottom: .0001pt; margin: 0in; text-indent: .5in;">
<span style="color: #eeeeee;">On
another note, I noticed that the management and the polygraph examiner never
called the process or the machine a “lie detector.” That to me was very telling. I was smart enough to realize two
things: 1) the results are not
admissible as evidence in a court of law; and 2) the management and the
polygraph examiner intentionally avoided calling it a “lie detector” exam or a
“lie detector machine” because they knew that “lie detector has a much more
negative and emotional connotation than the sterile, scientific sounding term,
“polygraph examination.”</span></div>
<div style="line-height: 200%; margin-bottom: .0001pt; margin: 0in;">
<span style="color: #eeeeee;"> A few employees were visibly
emotionally upset about this polygraph exam and said so. Then they turned around and asked the
examiner, and later other managers, “Did you catch me lying?” Hearing these stories made me realize that I
was working with some pretty stupid people, because the worst thing a person
could do would be to act suspicious during or after the process, and act as if
they were hiding information, and personally wondering if the polygraph machine
had caught it.</span></div>
<div style="line-height: 200%; margin-bottom: .0001pt; margin: 0in; text-indent: .5in;">
<span style="color: #eeeeee;">The
Management Team of the grocery store was transferred to other stores and
rreplaced with a new Management Team, but no employees were ever fired as a
result of these polygraph examinations and the related investigations.</span></div>
<div style="line-height: 200%; margin-bottom: .0001pt; margin: 0in;">
<br /></div>
<div align="center" style="line-height: 200%; margin-bottom: .0001pt; margin: 0in; text-align: center;">
<b><span style="color: #eeeeee;">Conclusion<o:p></o:p></span></b></div>
<div style="line-height: 200%; margin-bottom: .0001pt; margin: 0in;">
<span style="color: #eeeeee;"> In 1975, when I went through a
polygraph examination, I believed that no machine can accurately determine
100% of the time if and when a person is telling the truth and when they are
lying. As a result of my own experience
and seeing the fallibility of the system as it requires imperfect people to
administer it, I believed then and I believed today that a polygraph
examination is a “mind game” that is played by people in authority to cause
people to believe that the polygraph examiner knows conclusively if a person is
being deceptive or telling the truth.
The fact that polygraph examinations are not admissible as evidence in a
court of law shows that our judicial system in America also recognizes this
truth. Therefore, I think the polygraph
examination is an outdated 20<sup>th</sup> century practice in law enforcement
and investigations and that it should be discontinued.</span></div>
<span style="color: #eeeeee;"><span style="font-family: 'Times New Roman', serif; font-size: 12pt; line-height: 200%;"><br clear="all" style="page-break-before: always;" />
</span>
</span><br />
<div align="center" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: center; text-indent: -58.3pt;">
<b><span style="line-height: 200%;"><span style="color: #eeeeee;">References<o:p></o:p></span></span></b></div>
<div style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-indent: -58.3pt;">
<span style="color: #eeeeee;"><span style="line-height: 200%;">Bellevue University. (2011).
Polygraph Testing Case Study. Retrieved
from the web at </span><a href="http://idcontent.bellevue.edu/content/CIT/cyber/510/case3/">http://idcontent.bellevue.edu/content/CIT/cyber/510/case3/</a>
<span style="line-height: 200%;"> on December 18, 2011.<o:p></o:p></span></span></div>
<div style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-indent: -58.3pt;">
<span style="color: #eeeeee;"><span style="line-height: 200%;">Kidwell, D. (1995). How the F.B.I. Finally Caught Aldrich
Ames. A New York Times news article
published on January 27, 1995. Retrieved
from the web at </span><a href="http://www.nytimes.com/1995/01/27/us/how-the-fbi-finally-caught-aldrich-ames.html?pagewanted=all">http://www.nytimes.com/1995/01/27/us/how-the-fbi-finally-caught-aldrich-ames.html?pagewanted=all</a><span style="line-height: 200%;"> on December 18, 2011.<o:p></o:p></span></span></div>
<div style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-indent: -58.3pt;">
<span style="line-height: 200%;"><span style="color: #eeeeee;">McCrie, R. D. (2007).
Security Operations Management, second edition. Burlington, MA: Elsevier.<o:p></o:p></span></span></div>
<div style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-indent: -58.3pt;">
<span style="line-height: 200%;"><span style="color: #eeeeee;"><br /></span></span></div>
<div style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-indent: -58.3pt;">
<span style="line-height: 200%;"><span style="color: #eeeeee;"><br /></span></span></div>
<div style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-indent: -58.3pt;">
</div>
<div class="MsoNormal">
<span style="color: #eeeeee;">= = = = = = = = = = = = = = = = = = = = = = =</span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: Arial, sans-serif; font-size: 9pt;"><span style="color: #eeeeee;">William Favre Slater, III <o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, sans-serif; font-size: 9pt;"><span style="color: #eeeeee;">MBA, M.S., PMP, CISSP, SSCP, CISA, ISO 27002,
ISO 20000, ITIL v3, Cloud Computing Foundation <o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, sans-serif; font-size: 9pt;"><span style="color: #eeeeee;">Project Manager / Program Manager<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, sans-serif; font-size: 8pt;"><span style="color: #eeeeee;">CYBR 510 Blog:
<a href="http://cybr510.blogspot.com/">http://cybr510.blogspot.com</a><o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, sans-serif; font-size: 9pt;"><span style="color: #eeeeee;"><a href="http://billslater.com/career">http://billslater.com/career</a><o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, sans-serif; font-size: 9pt;"><span style="color: #eeeeee;">Chicago, IL<o:p></o:p></span></span></div>
<div class="MsoNormal">
<span style="font-family: Arial, sans-serif; font-size: 9pt;"><span style="color: #eeeeee;">United States of America<o:p></o:p></span></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<br />
<div style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-indent: -58.3pt;">
<span style="line-height: 200%;"><span style="color: #eeeeee;"><br /></span></span></div>
<div style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-indent: -58.3pt;">
<span style="line-height: 200%;"><br /></span></div>William Favre Slater, IIIhttp://www.blogger.com/profile/05247248094266294971noreply@blogger.com0tag:blogger.com,1999:blog-2656669920870314927.post-34456925304359803792011-12-15T23:45:00.000-08:002011-12-15T23:47:38.151-08:00Post 007 - CYBR 510<br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh49hFLl2UWobuTZRv-4lBFw2uOPlpucWCg3bELZOBNGH8D_me8YnKVzCbZfeJ3LC7c1Y2vUy_1CNTwp9GtvJmoNU2PQNueBDSfgUMwhj6MB-xpfaFz5UtdUrvgtGSqxo3vxbxwlNF3jsE/s1600/Roman_Numeral_Turquoise_03.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh49hFLl2UWobuTZRv-4lBFw2uOPlpucWCg3bELZOBNGH8D_me8YnKVzCbZfeJ3LC7c1Y2vUy_1CNTwp9GtvJmoNU2PQNueBDSfgUMwhj6MB-xpfaFz5UtdUrvgtGSqxo3vxbxwlNF3jsE/s1600/Roman_Numeral_Turquoise_03.jpg" /></span></a></div>
<div style="text-align: center;">
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span></div>
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif; font-size: x-large;"><b>Week Three Assignments</b><span class="Apple-tab-span" style="white-space: pre;"> </span></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"> <span class="Apple-tab-span" style="white-space: pre;"> </span>Week 3 Summary</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">Theme for the Week - Staffing to Meet Protective Goals</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">This week: </span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>Personnel planning</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>Recruitment and hiring</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>Prescreening</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>Polygraphs</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">Learning Objectives:</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>Differentiate and examine the special issues in security such as discipline and discharge; supporting and motivating; appraising and promoting; accounting controls and budgeting; staffing; training; operations; technology; and leadership.</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>Analyze different recruiting, hiring, and staffing practices to ensure adequate security.</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>Assess the personnel planning process.</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>Examine hiring and vetting processes as it relates to security.<span class="Apple-tab-span" style="white-space: pre;"> </span></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"> <span class="Apple-tab-span" style="white-space: pre;"> </span>Readings</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">Week 3 Reading Assignments</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>Security Operations Management, Chapter 3</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>Security Operations Management, Appendix B- Code of Ethics<span class="Apple-tab-span" style="white-space: pre;"> </span></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"> <span class="Apple-tab-span" style="white-space: pre;"> </span>Week 3 Discussion Post</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">On Week 3 Forum, post your response to one of the following items. While you must answer the questions, you don't have to do it in question-answer format. You can make it a narrative that includes the answers.</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>What is your opinion of pre-employment screening? How does pre-employment screening affect an organization? Discuss how pre-employment screening affects the process of recruiting employees.</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>Is it fair to perform Internet searches on applicants? What is allowed or not allowed for application Internet searches? Has this caused any issues that you know of or can find for applicants? </span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>How does personnel planning assist an organization in achieving the performance level that is needed for a successful organization? Why is it important to include security in the personnel planning and employment process?</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>How can the whole employment process “weed” out potential employees who may not be the right fit for an organization? How important is it to have a good fit for both the organization and the prospective employee?</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">Your answer should be 2-3 paragraphs in length with proper attention given to spelling and grammar. </span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">You can use the textbook and supplemental reading, but you should also include at least one Internet sites that provide information on your topic. Once you have submitted your initial post (by Friday night), read each of your classmates' initial posts and respond to at least four of them. In your response, provide your comments and any additional information you might have. Remember to cite your sources.</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">Directions: Each student must respond to a minimum of four other students’ threaded discussion postings in a “substantive and meaningful” manner. Do not simply agree or disagree – provide a quality response that reflects critical thinking. To foster learning, “professional and constructive” criticism is encouraged when responding to your classmates. </span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">The weekly discussion questions, to allow time for students to respond, must be answered by 11:59 p.m. on Sunday of each week. Please see the discussion evaluation section in the syllabus for detailed expectations and directions of how your discussion board postings and overall participation is evaluated. </span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">Reminders: Each student must respond to the weekly questions. Discussion postings should reflect some new or original information – do not just regurgitate data or opinion posted by previous students. The quality of your effort will be considered when grading discussion postings.</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">This assignment is worth 100 points total.<span class="Apple-tab-span" style="white-space: pre;"> </span></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"> <span class="Apple-tab-span" style="white-space: pre;"> </span>Polygraph Testing Case Study</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">View this case study prior to completing the assignment below. <span class="Apple-tab-span" style="white-space: pre;"> </span></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"> <span class="Apple-tab-span" style="white-space: pre;"> </span>Week 3 Written Assignments</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">In one Word document, discuss the following:</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>View the “Polygraph Testing” case study module. The link for the module can be found in the “Week 3 Assignments” folder.</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>After viewing the case study, discuss how you feel the testing of Aldrich Ames was handled by the polygraph operators. What could have been done to eliminate the errors? Explain why you think Ames “beat the system.”</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">•<span class="Apple-tab-span" style="white-space: pre;"> </span>Furthermore, discuss if you have ever been involved with a polygraph test and what occurred. Relate this to this case study. If you have not been involved in a polygraph test, discuss what you think it would be like.</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">Reminders: Students are required to submit assignments with a name, course name/number and page numbers on your assignments. Please double space your work, and re-state the question. Grading is facilitated when the assignment submission is well structured, and the questions (opposed to your answers) have been bolded. File Naming Convention: Students are required to submit assignments with their last name, followed by the week’s assignment; e.g. smith1.2. Microsoft Word documents only. Late submitters will be penalized.</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">Weekly written assignments will be due by 11:59 p.m. on Sunday at the end of each week. Specific assignments will be posted each week throughout the course. Your grade will be predicated on the quality of your thinking and writing - NOT the length of your writing. Too many words are usually a sign of poor editing, and too few words are a sign of poor analysis. </span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">This assignment is worth 100 points total.</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"> <span class="Apple-tab-span" style="white-space: pre;"> </span>Week 3 Journal</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">Each student will complete “weekly” entries into a well-organized journal that reflects how the weekly coursework (reading and assignment) and discussion has impacted their personal and professional lives. Essentially, the journal - akin to a personal diary, should capture the meaningful and significant aspects of the course which generated student analysis and thought. See the Journal Guidelines on the main Assignments page.Your weekly journal entry will be due by 11:59 p.m. on Sunday at the end of each week. </span><span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;">This assignment is worth 100 points total.</span><br />
<span style="color: #eeeeee; font-family: 'Trebuchet MS', sans-serif;"><br /></span><br />
<br />William Favre Slater, IIIhttp://www.blogger.com/profile/05247248094266294971noreply@blogger.com0tag:blogger.com,1999:blog-2656669920870314927.post-79294046667192530032011-12-11T21:57:00.000-08:002011-12-14T00:08:07.198-08:00Post 006 - CYBR 510<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwZLT8DRHs8haxUV8BZc8DVjhhqQf5JxdgomtH0WJ7fc8rp4kZFxJtE4YEg3yPvkPVJ2ic74pomW7CaheVqd8VTuonR891t8Cuw3NsJ7faZ2MjLiKGS6YcYun4pPqFpYUnKK1z84My5dc/s1600/wfs_writing_on_computer_.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 283px; height: 400px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwZLT8DRHs8haxUV8BZc8DVjhhqQf5JxdgomtH0WJ7fc8rp4kZFxJtE4YEg3yPvkPVJ2ic74pomW7CaheVqd8VTuonR891t8Cuw3NsJ7faZ2MjLiKGS6YcYun4pPqFpYUnKK1z84My5dc/s400/wfs_writing_on_computer_.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5685121838244124962" /></a><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">Week 2 Written Assignment</span></div><div><span class="Apple-style-span"><br /></span></div><div><p class="MsoNormal" style="margin-top: 6pt; margin-right: 0in; margin-bottom: 6pt; margin-left: 0in; "><span style="font-size:9.0pt;mso-bidi-font-size: 12.0pt;font-family:"Times New Roman","serif""><span class="Apple-style-span">Week 2 Written Assignments<o:p></o:p></span></span></p> <p class="MsoNormal" style="margin-top: 6pt; margin-right: 0in; margin-bottom: 6pt; margin-left: 0in; "><span style="font-size:9.0pt;mso-bidi-font-size: 12.0pt;font-family:"Times New Roman","serif""><span class="Apple-style-span">Your written assignment this week is to write a paper addressing both of the following:<o:p></o:p></span></span></p> <p class="MsoNormal" style="margin-top: 6pt; margin-right: 0in; margin-bottom: 6pt; margin-left: 0in; "><span style="font-size:9.0pt;mso-bidi-font-size: 12.0pt;font-family:"Times New Roman","serif""><span class="Apple-style-span">• Discuss how the Rand Report (p. 32-33 of Security Operations Management textbook) has changed the security field and the law enforcement field.<o:p></o:p></span></span></p> <p class="MsoNormal" style="margin-top: 6pt; margin-right: 0in; margin-bottom: 6pt; margin-left: 0in; "><span style="font-size:9.0pt;mso-bidi-font-size: 12.0pt;font-family:"Times New Roman","serif""><span class="Apple-style-span">• How has the modern protective industry grown in recent history? How does it compare with law enforcement today?<o:p></o:p></span></span></p></div><div><span class="Apple-style-span">= = = = = = = = = = = = = = = = = = = = = = =<span class="Apple-style-span" style="font-family: Arial, sans-serif; font-size: 12px; "> </span></span></div><div><span class="Apple-style-span" style="font-family: Arial, sans-serif; font-size: 12px; "><span class="Apple-style-span"><br /></span></span></div><div><span class="Apple-style-span" style="font-family: Arial, sans-serif; font-size: 12px; "><span class="Apple-style-span"><br /></span></span></div><div><p class="bylineaffiliation" style="text-align: center;margin-top: 0in; margin-right: 0in; margin-left: 0in; margin-bottom: 0.0001pt; line-height: 200%; "><span style="font-size: 12pt; line-height: 200%; font-family: 'Times New Roman', serif; "><span class="Apple-style-span">A Brief Analysis of the 1972 Kakalik and Wildhorn Rand Report and Its Impacts<o:p></o:p></span></span></p> <p class="bylineaffiliation" style="text-align: center;margin-top: 0in; margin-right: 0in; margin-left: 0in; margin-bottom: 0.0001pt; line-height: 200%; "><span style="font-size: 12pt; line-height: 200%; font-family: 'Times New Roman', serif; "><span class="Apple-style-span">William Slater<o:p></o:p></span></span></p> <p class="bylineaffiliation" style="text-align: center;margin-top: 0in; margin-right: 0in; margin-left: 0in; margin-bottom: 0.0001pt; line-height: 200%; "><span class="Apple-style-span"><span style="font-size: 12pt; line-height: 200%; font-family: 'Times New Roman', serif; ">CYBR 510 – Physical, Operations, and Personnel Security</span><span style="font-size: 12pt; line-height: 200%; font-family: 'Times New Roman', serif; "><o:p></o:p></span></span></p> <p class="bylineaffiliation" style="text-align: center;margin-top: 0in; margin-right: 0in; margin-left: 0in; margin-bottom: 0.0001pt; line-height: 200%; "><span style="font-size: 12pt; line-height: 200%; font-family: 'Times New Roman', serif; "><span class="Apple-style-span">Bellevue University<o:p></o:p></span></span></p> <p class="bylineaffiliation" style="text-align: center;margin-top: 0in; margin-right: 0in; margin-left: 0in; margin-bottom: 0.0001pt; line-height: 200%; "><span style="font-size: 12pt; line-height: 200%; font-family: 'Times New Roman', serif; "><span class="Apple-style-span">Week 2, Writing Assignment 1<o:p></o:p></span></span></p> <p class="bylineaffiliation" style="text-align: center;margin-top: 0in; margin-right: 0in; margin-left: 0in; margin-bottom: 0.0001pt; line-height: 200%; "><span style="font-size: 12pt; line-height: 200%; font-family: 'Times New Roman', serif; "><span class="Apple-style-span">Ronald Woerner, M.S. - Instructor<o:p></o:p></span></span></p> <p class="bylineaffiliation" style="text-align: center;margin-top: 0in; margin-right: 0in; margin-left: 0in; margin-bottom: 0.0001pt; line-height: 200%; "><span style="font-size: 12pt; line-height: 200%; font-family: 'Times New Roman', serif; "><span class="Apple-style-span">December 11, 2011<o:p></o:p></span></span></p> <p class="MsoNormal" style="margin-bottom:0in;margin-bottom:.0001pt;line-height: 200%"><span style="font-size:12.0pt;line-height:200%;font-family:"Times New Roman","serif""><o:p><span class="Apple-style-span"> </span></o:p></span></p> <p class="MsoNormal"><span style="font-size:12.0pt;line-height:115%;font-family: "Times New Roman","serif""><o:p><span class="Apple-style-span"> </span></o:p></span></p><span class="Apple-style-span"> </span><p align="center" style="margin-top:0in;margin-right:0in;margin-bottom:0in; margin-left:58.3pt;margin-bottom:.0001pt;text-align:center;text-indent:-58.3pt; line-height:200%"><b><span class="Apple-style-span">A Brief Analysis of the 1972 Kakalik and Wildhorn Rand Report and Its Impacts<o:p></o:p></span></b></p> <p style="margin:0in;margin-bottom:.0001pt;line-height:200%"><span class="Apple-style-span">This brief paper will present an analysis of a Rand Report titled <span style="mso-bidi-font-size: 10.0pt;line-height:200%">Private Police in the United States: Findings and Recommendations</span>, by James S. Kakalik and Sorrel Wildhorn, and its impacts on the security industry in the United States. This report was commissioned by the Law Enforcement Assistance Administration (LEAA). The chief objectives of this report were to accurately describe state of the situation that existed with private security police who were not employed by government entities, and to provide recommendations and a basis for the improvement of policies that would result in improvements in the quality of private security police (<span style="mso-bidi-font-size:10.0pt;line-height:200%">McCrie, 2007)</span>.</span></p> <p style="margin:0in;margin-bottom:.0001pt;text-indent:.5in;line-height:200%"><span class="Apple-style-span">This Rand Report was seen as a scathing indictment of the state of private police in the U.S. The crux of the report can be seen in this passage:</span></p> <p style="margin-top:0in;margin-right:0in;margin-bottom:0in;margin-left:.5in; margin-bottom:.0001pt;line-height:200%"><span class="Apple-style-span">“The typical security guard is an aging white male, poorly educated, usually untrained, and very poorly paid. Depending on where in the country he works, what type of employer he works for (contract guard agency, in-house firm, or government), and similar factors, he averages between 40 and 55 years of age, has had little education beyond the ninth grade, and has had few years of experience in private security… He often receives few fringe benefits; at best, fringe benefits may amount to 10 percent of wages. But since the turnover rate is high in contract agencies, many employees never work the 6 months or 1 year required to become eligible for certain of these benefits.” (sic) (<span style="mso-bidi-font-size:10.0pt;line-height: 200%">McCrie, 2007)</span>.</span></p> <p style="margin-top:0in;margin-right:0in;margin-bottom:0in;margin-left:.5in; margin-bottom:.0001pt;line-height:200%"><o:p><span class="Apple-style-span"> </span></o:p></p> <p style="margin:0in;margin-bottom:.0001pt;text-indent:.5in;line-height:200%"><span class="Apple-style-span">Other factors that the Rand Report identified that were leading to the overall poor quality of these private police officers were: weak pre-employment screening, high-turnover in the industry, low hourly compensation, and a lack of meaningful licensing standards </span>(<span style="text-indent: 0px; ">McCrie, 2007)</span>. One could also surmise from this list that lack of adequate training was also a factor.</p><p style="margin:0in;margin-bottom:.0001pt;text-indent:.5in;line-height:200%"><span class="Apple-style-span"><br /></span></p> <p style="margin:0in;margin-bottom:.0001pt;line-height:200%"><o:p><span class="Apple-style-span"> </span></o:p></p> <p align="center" style="margin:0in;margin-bottom:.0001pt;text-align:center; line-height:200%"><b><span class="Apple-style-span">How the 1971 Rand Report Has Changed the Security Field and the Law Enforcement Field<o:p></o:p></span></b></p> <p style="line-height:200%"><span class="Apple-style-span"><span class="Apple-tab-span" style="white-space:pre"> <span class="Apple-tab-span" style="white-space:pre"> </span></span>Nearly 40 years later, the 1972 Rand Report by Kakalik and Wild Horn is still being researched and referenced to understand the linkage between substandard security employees and the factors that could contribute to the overall poor quality of security processionals. It is clear example of the worst that can and will happen when there is lack of policy and professional standards with which to create a staff of quality private police.</span></p> <p style="line-height:200%"><span class="Apple-style-span"><span class="Apple-tab-span" style="white-space:pre"><span class="Apple-tab-span" style="white-space:pre"> </span> </span>In 1976, the LEAA created the National Advisory Committee on Criminal Justice Standards and Goals. The purpose of this group was to undertake a number of detailed analytical reviews of issues related to criminal justice. One group that was created from this initiative was the Private Security Task Force (PSTF). The PSTF was comprised of law enforcement officials, corporate security directors, and executives from a major security services company. It released a report that was regarded as a response follow-on report and it identified 80 goals and standards for private security. While this report was not created to impact public policy that would influence governments and law enforcement professional standards, it was used as a good set of guidelines, though many have yet to be enacted </span>(<span>McCrie, 2007)</span>.</p> <p align="center" style="margin-top:0in;margin-right:0in;margin-bottom:0in; margin-left:58.3pt;margin-bottom:.0001pt;text-align:center;text-indent:-58.3pt; line-height:200%"><b><span class="Apple-style-span">How Has the Modern Protective Industry Grown in Recent History? <o:p></o:p></span></b></p> <p style="line-height:200%"><span class="Apple-style-span"><span class="Apple-tab-span" style="white-space:pre"> <span class="Apple-tab-span" style="white-space:pre"> </span></span>Events since the September 11, 2001 terrorist attacks have underscored the importance of security as a priority in the eyes of the public and the eyes of our government leaders. The use of private security police is evident everywhere in large cities. Nearly every large public building in downtown Chicago has uniformed private security forces, and these are complemented by the use of other controls such as sign-in rosters, closed circuit television (CCTV) cameras with digital video recorders (DVR), pass card access, etc. When private police security guards serve in such capacities, they serve as a reminder that there is a human security element that can instantly react to security incidents, though to be sure, crime still occurs.</span></p> <p style="text-indent:.5in;line-height:200%"><span class="Apple-style-span">On October 24, 2006, my own dermatologist, Dr. David Cornbleet, was brutally murdered in his downtown Chicago office located in a high-rise office building on Michigan Avenue and evidence points to a disgruntled patient (Lohr, 2011). Ironically, the suspect was seen on CCTV and DVR entering and leavning the building within the window of the time of the crime, and there were private security guards on duty in the lobby of the building. Obviously, the killer exploited a vulnerability where the doctor was alone in his office and there were no witnesses to the crime. Nevertheless, despite the presence of private security guards, the crime was not deterred, and it was the CCTV and DVR that led to the best evidence of the identity of the primary suspect.</span></p> <p align="center" style="margin-top:0in;margin-right:0in;margin-bottom:0in; margin-left:58.3pt;margin-bottom:.0001pt;text-align:center;text-indent:-58.3pt; line-height:200%"><b><span class="Apple-style-span">How Does It Compare with Law Enforcement Today?<o:p></o:p></span></b></p> <p style="margin:0in;margin-bottom:.0001pt;line-height:200%"><span class="Apple-style-span"><span class="Apple-tab-span" style="white-space:pre"> <span class="Apple-tab-span" style="white-space:pre"> </span></span>Since the publication in 1972, and the publication the follow-on PSTF report in 1976, of the there have been several organizations created to promote professionalism, standards, and guidelines among private security police personnel. One such organization is the International Foundation for Protection Officers (IFPO, 2011).</span></p> <p style="margin:0in;margin-bottom:.0001pt;text-indent:.5in;line-height:200%"><span class="Apple-style-span">Compared to the time in which the Rand Report was published the pay and standards for hiring are hiring are higher. But since nearly all uniformed police professionals who hired to the police forces of county, city, state, and federal levels all undergo much more intensive training, usually at some kind of academy, and they all have better pay, benefits, and usually pensions, usually the only comparisons is that both public security professionals and private security professionals are in security uniforms and carry a badge. The similarities usually end there.</span></p> <p style="margin:0in;margin-bottom:.0001pt;text-indent:.5in;line-height:200%"><span class="Apple-style-span">Ultimately, the existence and effectiveness of private security personnel and their corresponding lower rate of compensation is directly related to the degree at which an organization or group of organizations is willing to expend resources to reduce risk. If the organization will not expend adequate resources to reduce risk, the probably of a risk event occurrence will increase as a result.</span></p><p style="margin:0in;margin-bottom:.0001pt;text-indent:.5in;line-height:200%"><span class="Apple-style-span"><br /></span></p> <p align="center" style="margin:0in;margin-bottom:.0001pt;text-align:center; line-height:200%"><b><span class="Apple-style-span">Conclusion<o:p></o:p></span></b></p> <p style="margin:0in;margin-bottom:.0001pt;line-height:200%"><span class="Apple-style-span"><span class="Apple-tab-span" style="white-space:pre"> <span class="Apple-tab-span" style="white-space:pre"> <span class="Apple-tab-span" style="white-space:pre"> </span></span></span>The Rand Report was clearly a turning point specifically in the security industry for private police, as well as the security industry as a whole. Since its publication in 1972, security professionals have researched and referenced this report as a started point. It is safe to say that while the security industry for private police did not immediately start to improve, the fact that this report was published by the Rand Corporation in 1972 as a factual document, and as a tool to promote policies for improvement, it achieved its objectives. It is also safe to say that because it was well researched and it came from the Rand Corporation, the quality, credibility, and relevance of this report to the security industry all explain why it is still being referenced and quoted almost 40years after its initial publication.</span></p><p style="margin:0in;margin-bottom:.0001pt;line-height:200%"><span class="Apple-style-span"><br /></span></p> <span class="Apple-style-span"><span style="font-size:12.0pt;line-height:200%;font-family:"Times New Roman","serif"; mso-fareast-font-family:"Times New Roman";mso-ansi-language:EN-US;mso-fareast-language: EN-US;mso-bidi-language:AR-SA"> </span> </span><p align="center" style="margin-top:0in;margin-right:0in;margin-bottom:0in; margin-left:58.3pt;margin-bottom:.0001pt;text-align:center;text-indent:-58.3pt; line-height:200%"><b><span style="mso-bidi-font-size:10.0pt;line-height:200%"><span class="Apple-style-span">References<o:p></o:p></span></span></b></p> <p style="margin-top:0in;margin-right:0in;margin-bottom:0in;margin-left:58.3pt; margin-bottom:.0001pt;text-indent:-58.3pt;line-height:200%"><span style="mso-bidi-font-size:10.0pt;line-height:200%"><span class="Apple-style-span">McCrie, R. D. (2007). Security Operations Management, second edition. Burlington, MA: Elsevier.<o:p></o:p></span></span></p> <p style="margin-top:0in;margin-right:0in;margin-bottom:0in;margin-left:58.5pt; margin-bottom:.0001pt;text-indent:-58.5pt;line-height:200%"><span class="Apple-style-span"><span style="mso-bidi-font-size:10.0pt;line-height:200%">Gunter, W. and Kidwell, J. (2004). Law Enforcement and Private Security Liaison: Partnerships for Cooperation. An article published at the International Foundation of Protection Officers. Retrieved from the web at </span><a href="http://www.ifpo.org/articlebank/lawprivateliaison.html">http://www.ifpo.org/articlebank/lawprivateliaison.html</a> on December 11, 2011.</span></p> <p style="margin-top:0in;margin-right:0in;margin-bottom:0in;margin-left:58.5pt; margin-bottom:.0001pt;text-indent:-58.5pt;line-height:200%"><span class="Apple-style-span">IFPO. (2011). Benefits of Membership in the<span style="mso-bidi-font-size:10.0pt;line-height:200%"> International Foundation of Protection Officers. Retrieved from the web at </span><a href="http://www.ifpo.org/membership.html">http://www.ifpo.org/membership.html</a> on December 11, 2011.</span></p> <p style="margin-top:0in;margin-right:0in;margin-bottom:0in;margin-left:58.5pt; margin-bottom:.0001pt;text-indent:-58.5pt;line-height:200%"><span style="mso-bidi-font-size:10.0pt;line-height:200%"><span class="Apple-style-span">Kakalik, J. S. and Wildhorn, S. (1972). Private Police in the United States: Findings and Recommendations. A study commissioned by the Law Enforcement Assistance Administration and published by Rand Corporation. Retrieved from the web at <a href="http://www.rand.org/content/dam/rand/pubs/reports/2006/R869.pdf"><span style="text-decoration: none; ">http://www.rand.org/content/dam/rand/pubs/reports/2006/R869.pdf</span></a> on December 11, 2011.<o:p></o:p></span></span></p> <p style="margin-top:0in;margin-right:0in;margin-bottom:0in;margin-left:58.5pt; margin-bottom:.0001pt;text-indent:-58.5pt;line-height:200%"><span style="mso-bidi-font-size:10.0pt;line-height:200%"><span class="Apple-style-span">Lohr, D. (2011). Dr. David Cornbleet: Lost at the Hands of a Patient. A web article published at the Investigation Discovery website. Retrieved from the web at <a href="http://investigation.discovery.com/investigation/internet-cases/cornbleet/david-cornbleet.html">http://investigation.discovery.com/investigation/internet-cases/cornbleet/david-cornbleet.html</a> on December 11, 2011.<o:p></o:p></span></span></p> <p style="margin-top:0in;margin-right:0in;margin-bottom:0in;margin-left:58.5pt; margin-bottom:.0001pt;text-indent:-58.5pt;line-height:200%"><span style="mso-bidi-font-size:10.0pt;line-height:200%"><span class="Apple-style-span">Wildhorn, S. (1975). Issues in Private Security. A special report published by the Rand Corporation. Retrieved from the web at <a href="http://www.rand.org/pubs/papers/2008/P5422.pdf"><span style="text-decoration: none; ">http://www.rand.org/pubs/papers/2008/P5422.pdf</span></a> on December 11, 2011.<o:p></o:p></span></span></p></div><div><span class="Apple-style-span" style="font-family: Arial, sans-serif; font-size: 12px; "><span class="Apple-style-span"><br /></span></span></div><div><p class="MsoNormal"><span class="Apple-style-span">= = = = = = = = = = = = = = = = = = = = = = =<span class="Apple-style-span" style="font-family: Arial, sans-serif; font-size: 12px; "> </span></span></p> <p class="MsoNormal"><span class="Apple-style-span"><span style="font-size: 9pt; font-family: Arial, sans-serif; ">William Favre Slater, III<br /></span><span class="Apple-style-span" style="font-family: Arial, sans-serif; font-size: 12px; ">MBA, M.S., PMP, CISSP, SSCP, CISA, ISO 27002, ISO 20000, ITIL v3, Cloud Computing Foundation<br /></span><span class="Apple-style-span" style="font-family: Arial, sans-serif; font-size: 12px; ">Project Manager / Program Manager<br /></span><span class="Apple-style-span" style="font-family: Arial, sans-serif; font-size: 11px; ">CYBR 510 Blog: </span><a href="http://cybr510.blogspot.com/" style="font-family: Arial, sans-serif; font-size: 11px; ">http://cybr510.blogspot.com</a><br /><a href="http://billslater.com/career" style="font-family: Arial, sans-serif; font-size: 12px; ">http://billslater.com/career</a><br /><span class="Apple-style-span" style="font-family: Arial, sans-serif; font-size: 12px; ">Chicago, IL<br /></span><span class="Apple-style-span" style="font-family: Arial, sans-serif; font-size: 12px; ">United States of America</span></span></p> <p class="MsoNormal"><o:p><span class="Apple-style-span"> </span></o:p></p></div>William Favre Slater, IIIhttp://www.blogger.com/profile/05247248094266294971noreply@blogger.com0tag:blogger.com,1999:blog-2656669920870314927.post-65977224280091795772011-12-09T22:04:00.000-08:002011-12-25T20:43:25.065-08:00Post 005 - CYBR 510<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"></span><br />
<div>
<div style="text-align: center;">
<div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-dN4vnDLYj7o/Tvf7R4fL0FI/AAAAAAAAAyE/I7I8Pi1WYUw/s1600/cybersecurity_policy_.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="478" src="http://4.bp.blogspot.com/-dN4vnDLYj7o/Tvf7R4fL0FI/AAAAAAAAAyE/I7I8Pi1WYUw/s640/cybersecurity_policy_.png" width="640" /></a></div>
<br />
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif; font-size: x-small;">(Click picture for larger view and better readability.)</span><br />
<br />
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><a href="http://info.publicintelligence.net/cyberspace_policy_review_final.pdf">Cyberspace and Communication Policy Timeline Picture from the</a></span></div>
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif; text-align: left;"></span><br />
<div style="text-align: center;">
<span class="Apple-style-span" style="text-align: left;"><a href="http://info.publicintelligence.net/cyberspace_policy_review_final.pdf"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">National Cyberspace Policy Review, the White House - July 2009</span></a></span></div>
<div style="text-align: center;">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif; text-align: left;"><br /></span></div>
<div style="text-align: center;">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif; text-align: left;"><br /></span></div>
</div>
<div>
<b><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif; font-size: large;">Week 2 Discussion Question</span></b></div>
<div>
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><br /></span></div>
<div>
<b><span style="font-size: 16pt; line-height: 115%;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Describe federal laws that have helped form security practices.</span></span></b></div>
<div>
<div class="MsoNormal">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif; font-size: 12pt;">According to McCrie, in Security Operations Management, laws have impacted the formation and operation of security departments withing organizations (McCrie, 2007).<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif; font-size: 12pt;"><o:p> </o:p></span></div>
<div class="MsoNormal">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif; font-size: 12pt;">In a report, released by the White House in July 2009, the State on Cybersecurity and U.S. Policy was summarized.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif; font-size: 12pt;"><o:p> </o:p></span></div>
<div class="MsoNormal">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif; font-size: 12pt;">This diagram above is from that report was in an appendix of the Cyberspace Policy Review report that was released by the Obama Administration in July 2009. The top half of the diagram shows major historical events that have occurred related to communications, computers and the Internet. The bottom half of the diagram shows the corresponding history of legislation, regulation, etc, that have affected security and privacy since 1900. What is particularly interesting about this diagram is that it begins in 1900. As the reader will see, there were some very important developments that affected the state of laws today.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif; font-size: 12pt;">The tables in the appendices show the following:<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-left: 0.5in;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif; font-size: 12pt;">Appendix A - A timeline that shows U.S. laws related to privacy and security.<o:p></o:p></span></div>
<div class="MsoNormal" style="margin-left: 0.5in;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif; font-size: 12pt;">Appendix B - A comprehensive list of State Laws that are related to data privacy.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif; font-size: 12pt;">As a whole, all of these laws have in help to form and influence the composition and operation of security practices in organizations. For it is the consequences of non-compliance that is described within these various laws that gives the leadership of organizations a sense of urgency to meet the obligations to protect assets, data, and people.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif; font-size: 12pt;">Also, it is important to note that federal laws are influenced by state laws and vice versa. On May 12, 2011, President Obama’s administration submitted a legislative proposal to Congress to request the creation of laws to provide greater security for Federal government entities under the Department of Homeland Security as well as mandating Federal legislation that will require all organizations that experience privacy data breaches to notify those that are affected.<o:p></o:p></span></div>
<div class="MsoNormal">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><br /></span></div>
<div class="MsoNormal">
</div>
<div align="center" class="MsoNormal" style="text-align: center;">
<br />
<div align="center" class="MsoNormal">
<b><span style="line-height: 18px;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><span style="font-size: large;">References:</span><span style="font-size: small;"><o:p></o:p></span></span></span></b></div>
<div align="center" class="MsoNormal">
<b><span style="font-size: 12pt; line-height: 18px;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><br /></span></span></b></div>
<div style="line-height: 32px; margin-bottom: 0in; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
</div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Ballard, Spahr, Andrews, Ingersoll, LLC. (2004) Privacy Law. [Electronic version.] Retrieved from the web on May 14, 2004 at<span class="apple-converted-space"> </span><a href="http://www.virtualchase.com/resources/privacy.html">http://www.virtualchase.com/resources/privacy.html</a>.<o:p></o:p></span></div>
<div style="text-align: -webkit-auto;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><u1:p></u1:p></span></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<br /></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Brancik, K. C. (2008). Insider Computer Fraud: An In-depth Framework for Detecting and Defending Against Insider IT Attacks. Boca Raton, FL: Auerbach Publications.<o:p></o:p></span></div>
<div style="text-align: -webkit-auto;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><u1:p></u1:p></span></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<br /></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Davis, C.; Schiller, M.; and Wheeler, K. (2007). IT Auditing: Using Controls to Protect Information Assets. New York, NY: Osborne McGraw Hill.<o:p></o:p></span></div>
<div style="text-align: -webkit-auto;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><u1:p></u1:p></span></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<br /></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Department of Homeland Security. (2009). (U//FOUO) Rightwing Extremism: Current Economic and Political Climate Fueling Resurgence in Radicalization and Recruitment. Retrieved from the web at<o:p></o:p></span></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><a href="http://www.fas.org/irp/eprint/rightwing.pdf"><span style="text-decoration: none;">http://www.fas.org/irp/eprint/rightwing.pdf</span></a> on December 24, 2011.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<br /></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Department of Justice (2004). USA PATRIOT Act at Work. Retrieved from the web at<o:p></o:p></span></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><a href="http://www.justice.gov/olp/pdf/patriot_report_from_the_field0704.pdf"><span style="text-decoration: none;">http://www.justice.gov/olp/pdf/patriot_report_from_the_field0704.pdf</span></a> on December 24, 2011.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<br /></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Doyle, C. (2002). USA PATRIOT Act: A sketch. Retrieved from the web at <a href="http://www.fas.org/irp/crs/RS21203.pdf"><span style="text-decoration: none;">http://www.fas.org/irp/crs/RS21203.pdf</span></a> on December 24, 2011.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<br /></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Doyle, C. (2010). National Security Letters in Foreign Intelligence Investigations: A Glimpse of the Legal Background and Recent Amendments - a CRS Report Dated December 27, 2010. Retrieved from the web at <a href="http://www.fas.org/sgp/crs/intel/RS22406.pdf"><span style="text-decoration: none;">http://www.fas.org/sgp/crs/intel/RS22406.pdf</span></a> on December 24, 2011.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<br /></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Electronic Privacy and Information Center Resources about the USA PATRIOT Act <a href="http://epic.org/privacy/terrorism/usapatriot/"><span style="text-decoration: none;">http://epic.org/privacy/terrorism/usapatriot/</span></a> .<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<br /></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">EPIC. (2011). Information Related to the USA PATRIOT Act. Retreived from the web at <a href="http://epic.org/privacy/terrorism/usapatriot/">http://epic.org/privacy/terrorism/usapatriot/</a> on December 9, 2011.<o:p></o:p></span></div>
<div style="text-align: -webkit-auto;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><u1:p></u1:p></span></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<br /></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Frackman, A., Martin, R., and Ray, C. (2002). Internet and Online Privacy: A Legal and Business Guide. New York: ALM Publishing.<o:p></o:p></span></div>
<div style="text-align: -webkit-auto;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><u1:p></u1:p></span></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<br /></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Galik, D. (1998). Defense in Depth: Security for Network-Centric Warfare. [Electronic version] Retrieved from the web on May 11, 2004 from<span class="apple-converted-space"> </span><a href="http://www.chips.navy.mil/archives/98_apr/Galik.htm">http://www.chips.navy.mil/archives/98_apr/Galik.htm</a>.<u1:p></u1:p><o:p></o:p></span></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<br /></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Gaskin, J. (1997). Corporate Politics and the Internet: Connection Without Controversy. Upper Saddle River, NJ: Prentice Hall.<o:p></o:p></span></div>
<div style="text-align: -webkit-auto;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><u1:p></u1:p></span></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<br /></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Herrmann, D. S. (2007). Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience, and ROI. Boca Raton, FL: Auerbach Publications.<o:p></o:p></span></div>
<div style="text-align: -webkit-auto;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><u1:p></u1:p></span></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<br /></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Hoffman, L. J. (1977). Modern Methods for Computer Security and Privacy. Englewood Cliffs, NJ: Prentice-Hall.<o:p></o:p></span></div>
<div style="text-align: -webkit-auto;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><u1:p></u1:p></span></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<br /></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Icove, D., et al. (1995). Computer Crime: A Crimefighter’s Handbook. Sebastopol, CA: O’Reilly & Associates.<o:p></o:p></span></div>
<div style="text-align: -webkit-auto;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><u1:p></u1:p></span></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<br /></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Jacobs, S. (2011). Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance. Piscataway, NJ: IEEE Press.<o:p></o:p></span></div>
<div style="text-align: -webkit-auto;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><u1:p></u1:p></span></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<br /></div>
<div style="line-height: 24pt; margin-left: 58.3pt; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Landy, G. K. (2008). the IT/Digital Legal Companion: A Comprehensive Business Guide to Software, IT, Internet, Media, and IP Law. Burlington, MA: Syngress.<o:p></o:p></span></div>
<div style="line-height: 24pt; margin-left: 58.3pt; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><br /></span></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Lane, C. A. (1997). Naked in Cyberspace. Wilton, CT: Pemberton, Press.<o:p></o:p></span></div>
<div style="text-align: -webkit-auto;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><u1:p></u1:p></span></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<br /></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Legal Information Institute. (2004). Right of Privacy, An Overview. An article from Cornell Law School. [Electronic version.] Retrieved from the web on May 14, 2004 at<span class="apple-converted-space"> </span><a href="http://www.law.cornell.edu/topics/privacy.html">http://www.law.cornell.edu/topics/privacy.html</a><span class="apple-converted-space"> </span>.<o:p></o:p></span></div>
<div style="text-align: -webkit-auto;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><u1:p></u1:p></span></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<br /></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">McCrie, R. D. (2007). Security Operations Management, second edition. Burlington, MA: Elsevier.<o:p></o:p></span></div>
<div style="text-align: -webkit-auto;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><u1:p></u1:p></span></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<br /></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Miles, G., et al. (2004) Security Assessment: Case Studies for Implementing the NSA IAM. Burlington, MA: Syngress Publishing, Inc.<o:p></o:p></span></div>
<div style="text-align: -webkit-auto;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><u1:p></u1:p></span></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<br /></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Olsen, J. E. (2003). Data Quality: The Accuracy Dimension. San Francisco, CA: Morgan Kaufmann Publishers.<o:p></o:p></span></div>
<div style="text-align: -webkit-auto;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><u1:p></u1:p></span></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<br /></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Reynolds, G. W. (2012). Ethics in Information Tehnology, 4th edition. Boston, MA: Course Technology.<o:p></o:p></span></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<br /></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Riggs, M. (2011). Lee County Deputies Tied Suspect to a Chair, Gagged Him, and Pepper-Sprayed Him to Death. An article published at Reason.com on December 23, 2011. Retrieved from the web at <a href="http://reason.com/blog/2011/12/23/lee-county-deputies-tied-suspect-to-a-ch"><span style="text-decoration: none;">http://reason.com/blog/2011/12/23/lee-county-deputies-tied-suspect-to-a-ch</span></a> on December 23, 2011.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<br /></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Senft, A. and Gallegos, F. (2009). Information Technology Control and Audit. Bocan Raton, FL: CRC Press.<o:p></o:p></span></div>
<div style="text-align: -webkit-auto;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><u1:p></u1:p></span></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<br /></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">The White House. (2009). Cyberspace Policy Review. A document published by the Obama Administration. Retrieved from the web at<span class="apple-converted-space"> </span><a href="http://info.publicintelligence.net/cyberspace_policy_review_final.pdf">http://info.publicintelligence.net/cyberspace_policy_review_final.pdf</a><span class="apple-converted-space"> </span>on December 9, 2011.<o:p></o:p></span></div>
<div style="text-align: -webkit-auto;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><u1:p></u1:p></span></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<br /></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">U.S. Congress. (1987). The Computer Security Act of 1987. 101 STAT. 1724, Public Law 100-235, 100th Congress. Retrieved from the web<span class="apple-converted-space"> </span><a href="http://www.nist.gov/cfo/legislation/Public%20Law%20100-235.pdf">http://www.nist.gov/cfo/legislation/Public%20Law%20100-235.pdf</a><span class="apple-converted-space"> </span>on December 9, 2011.<o:p></o:p></span></div>
<div style="text-align: -webkit-auto;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><u1:p></u1:p></span></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<br /></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">U.S. Government. (2009). American Recovery and Reinvestment Act of 2009. 101 STAT. 1724, Public Law 100-235, 100th Congress. Retrieved from the web<span class="apple-converted-space"> </span><a href="http://www.opencongress.org/bill/111-s1/show">http://www.opencongress.org/bill/111-s1/show</a><span class="apple-converted-space"> </span>on December 9, 2011.<o:p></o:p></span></div>
<div style="text-align: -webkit-auto;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><u1:p></u1:p></span></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<br /></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">U.S. Government. (2001). USA PATRIOT Act. Retrieved from the web at <a href="http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=107_cong_public_laws&docid=f:publ056.107.pdf"><span style="text-decoration: none;">http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=107_cong_public_laws&docid=f:publ056.107.pdf</span></a> on December 24, 2011.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<br /></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">U.S. Government. (1776). The Declaration of Independence. Retrieved from the web at <a href="http://www.billslater.com/tj1776.htm"><span style="text-decoration: none;">http://www.billslater.com/tj1776.htm</span></a> on November 6, 2011.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<br /></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">U.S. Government. (1791). U.S. Constitution. Retrieved from the web at<o:p></o:p></span></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><a href="http://www.billslater.com/wfs_us_constitution.htm"><span style="text-decoration: none;">http://www.billslater.com/wfs_us_constitution.htm</span></a> on November 6, 2011.<o:p></o:p></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<br /></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Whitman, M. E and Mattord, H. J. (2010). Management of Information Security, third edition: Indianapolis, IN: Course Technology.<o:p></o:p></span></div>
<div style="text-align: -webkit-auto;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><u1:p></u1:p></span></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<br /></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Wikipedia. (2011). USA PATRIOT Act. A Wikipedia article retrieved from the web at<o:p></o:p></span></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><a href="http://en.wikipedia.org/wiki/Usa_patriot_act"><span style="text-decoration: none;">http://en.wikipedia.org/wiki/Usa_patriot_act</span></a> on November 6, 2011.<o:p></o:p></span></div>
<div style="line-height: 24pt; margin-bottom: 0.0001pt; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><br /></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<br /></div>
<div style="text-align: -webkit-auto;">
<br /></div>
<div style="line-height: 32px; margin-bottom: 0in; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
</div>
<table border="0" cellpadding="0" cellspacing="0" class="MsoNormalTable" style="background-attachment: initial; background-clip: initial; background-color: #d9d9d9; background-image: initial; background-origin: initial; border-collapse: collapse;"><tbody>
<tr><td style="padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 6.65in;" valign="top" width="638"><span class="Apple-style-span" style="background-color: black; color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><b><span style="font-size: 16pt;"><br /></span></b></span><br />
<h3 style="margin-bottom: 12pt; page-break-before: always;">
<span class="Apple-style-span" style="background-color: black; color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Appendix A - Federal Legislation that has Influenced Security Practices - From the Beginning to 2011-</span></h3>
</td></tr>
</tbody></table>
<div class="MsoNormal" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 12pt; text-align: -webkit-auto;">
<span style="font-size: 10pt;"><o:p><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"></span></o:p></span></div>
<table border="1" cellpadding="0" cellspacing="0" class="MsoNormalTable" style="border-bottom-style: none; border-collapse: collapse; border-color: initial; border-image: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial; margin-left: 0.2in; width: 654px;"><tbody>
<tr><td style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 1.25in;" valign="top" width="120"><div align="center" class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt; text-align: center;">
<b><span class="Apple-style-span" style="background-color: black; color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Timeframe<o:p></o:p></span></b></div>
</td><td style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 135pt;" valign="top" width="180"><div align="center" class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt; text-align: center;">
<b><span class="Apple-style-span" style="background-color: black; color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Law<o:p></o:p></span></b></div>
</td><td style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 103.5pt;" valign="top" width="138"><div align="center" class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt; text-align: center;">
<b><span class="Apple-style-span" style="background-color: black; color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Author(s)<o:p></o:p></span></b></div>
</td><td style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 2.25in;" valign="top" width="216"><div align="center" class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt; text-align: center;">
<b><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><span style="background-color: black;">Comments</span><span style="background-color: #d9d9d9;"><o:p></o:p></span></span></b></div>
</td></tr>
<tr><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 1.25in;" valign="top" width="120"><div align="center" class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt; text-align: center;">
<b><span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">1788 – 1789<o:p></o:p></span></span></b></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 135pt;" valign="top" width="180"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">First Amendment to the U.S. Constitution – Freedom of Speech, Freedom of Assembly, Freedom of Worship.<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 103.5pt;" valign="top" width="138"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">James Madison, et al<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 2.25in;" valign="top" width="216"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><o:p><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"></span></o:p></span></div>
</td></tr>
<tr><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 1.25in;" valign="top" width="120"><div align="center" class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt; text-align: center;">
<b><span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">1788 – 1789<o:p></o:p></span></span></b></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 135pt;" valign="top" width="180"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Fourth Amendment to the U.S. Constitution – Freedom from unreasonable search and seizure.<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 103.5pt;" valign="top" width="138"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">James Madison, et al<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 2.25in;" valign="top" width="216"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><o:p><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"></span></o:p></span></div>
</td></tr>
<tr><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 1.25in;" valign="top" width="120"><div align="center" class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt; text-align: center;">
<b><span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">1974<o:p></o:p></span></span></b></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 135pt;" valign="top" width="180"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Privacy Act of 1974 (Public Law 93-579, 5 U.S. Code 552a). – sets limits on the collection and transfer of personal data by government agencies and lets citizens sue agencies that violate the act (Lane, 1997).<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 103.5pt;" valign="top" width="138"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Congress of the U.S.<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 2.25in;" valign="top" width="216"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><o:p><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"></span></o:p></span></div>
</td></tr>
<tr><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 1.25in;" valign="top" width="120"><div align="center" class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt; text-align: center;">
<b><span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">1984<o:p></o:p></span></span></b></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 135pt;" valign="top" width="180"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">“Computer Fraud and Abuse Act – originally enacted as part of the Crime Control Act and was the first statute to specifically address computer crime. In 1990, this was amended it “to coverall computers used in interstate commerce or communications” and to prohibit forms of computer abuse which arise in connection with, and have a significant effect upon, interstate or foreign commerce. (Frackman, Martin and Ray, 2002).”<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 103.5pt;" valign="top" width="138"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Congress of the U.S.<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 2.25in;" valign="top" width="216"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">People were prohibited from accessing computers without authorization.<o:p></o:p></span></span></div>
</td></tr>
<tr><td style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 1.25in;" valign="top" width="120"><div align="center" class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt; page-break-before: always; text-align: center;">
<b><span class="Apple-style-span" style="background-color: black; color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Timeframe<o:p></o:p></span></b></div>
</td><td style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 135pt;" valign="top" width="180"><div align="center" class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt; page-break-before: always; text-align: center;">
<b><span class="Apple-style-span" style="background-color: black; color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Law<o:p></o:p></span></b></div>
</td><td style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 103.5pt;" valign="top" width="138"><div align="center" class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt; page-break-before: always; text-align: center;">
<b><span class="Apple-style-span" style="background-color: black; color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Author(s)<o:p></o:p></span></b></div>
</td><td style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 2.25in;" valign="top" width="216"><div align="center" class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt; page-break-before: always; text-align: center;">
<b><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><span style="background-color: black;">Comments</span><span style="background-color: #d9d9d9;"><o:p></o:p></span></span></b></div>
</td></tr>
<tr><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 1.25in;" valign="top" width="120"><div align="center" class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt; text-align: center;">
<b><span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">1986<o:p></o:p></span></span></b></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 135pt;" valign="top" width="180"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">“Electronic Communications Privacy Act of 1986 – the most comprehensive piece of federal legislation dealing with the interception of and access to electronic communications such as e-mail and voice mail (Frackman, Martin and Ray, 2002).”<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 103.5pt;" valign="top" width="138"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Congress of the U.S.<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 2.25in;" valign="top" width="216"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">“Enacted to amend Title III of the Omnibus Crime Control and Safe Streets Act of 1968. This act provided protection from traditional means of communication, such as the telephone, by placing restrictions on the wiretapping and eavesdropping of these means of communication. The ECPA modernized the 1968 Act to expand upon all forms of electronic communication. It exposes violators to civil penalties and sets out specific exceptions. However, employers have been able to circumvent any constraints imposed by the ECPA by obtaining consent of employees. Courts have uniformly upheld such consent of employees. (Frackman, Martin and Ray, 2002).”<o:p></o:p></span></span></div>
</td></tr>
<tr><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 1.25in;" valign="top" width="120"><div align="center" class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt; text-align: center;">
<b><span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">1987<o:p></o:p></span></span></b></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 135pt;" valign="top" width="180"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">The Computer Security Act of 1987<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 103.5pt;" valign="top" width="138"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">101 STAT. 1724, Public Law 100-235, 100th Congress<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 2.25in;" valign="top" width="216"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">This was the first federal law that was exclusively related to computer security.<o:p></o:p></span></span></div>
</td></tr>
<tr><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 1.25in;" valign="top" width="120"><div align="center" class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt; text-align: center;">
<b><span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">1996<o:p></o:p></span></span></b></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 135pt;" valign="top" width="180"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">“Health Insurance Portability and Accountability Act (HIPAA) of 1996 – required the Department of Health and Human Services to promulgate regulations governing the disclosure of health information (Frackman, Martin and Ray, 2002).”<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 103.5pt;" valign="top" width="138"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Congress of the U.S.<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 2.25in;" valign="top" width="216"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Purpose was to safeguard PII and NPPI data in transit, and in storage, whether it is used for financial transactions or a patient’s medical records.<o:p></o:p></span></span></div>
</td></tr>
<tr><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 1.25in;" valign="top" width="120"><div align="center" class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt; text-align: center;">
<b><span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">1999<o:p></o:p></span></span></b></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 135pt;" valign="top" width="180"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">“Gramm-Leach-Bliley Act – for the purpose of implementing the congressional policy that each financial institution has an affirmative and continuing obligation to respect the privacy of its customers to protect the security and confidentiality of those customers’ nonpublic personal information… (Frackman, Martin and Ray, 2002).”<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 103.5pt;" valign="top" width="138"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Senators Gramm, Leach and Bliley<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 2.25in;" valign="top" width="216"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">President Clinton was on record as being reluctant to sign this into law, because he didn’t believe it was a good law.<o:p></o:p></span></span></div>
<div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Purpose was to safeguard PII and NPPI data in transit, and in storage, whether it is used for financial transactions or a patient’s medical records.<o:p></o:p></span></span></div>
</td></tr>
<tr><td style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 1.25in;" valign="top" width="120"><div align="center" class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt; page-break-before: always; text-align: center;">
<b><span class="Apple-style-span" style="background-color: black; color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Timeframe<o:p></o:p></span></b></div>
</td><td style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 135pt;" valign="top" width="180"><div align="center" class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt; page-break-before: always; text-align: center;">
<b><span class="Apple-style-span" style="background-color: black; color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Law<o:p></o:p></span></b></div>
</td><td style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 103.5pt;" valign="top" width="138"><div align="center" class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt; page-break-before: always; text-align: center;">
<b><span class="Apple-style-span" style="background-color: black; color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Author(s)<o:p></o:p></span></b></div>
</td><td style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 2.25in;" valign="top" width="216"><div align="center" class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt; page-break-before: always; text-align: center;">
<b><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><span style="background-color: black;">Comments</span><span style="background-color: #d9d9d9;"><o:p></o:p></span></span></b></div>
</td></tr>
<tr><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 1.25in;" valign="top" width="120"><div align="center" class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt; text-align: center;">
<b><span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">2001<o:p></o:p></span></span></b></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 135pt;" valign="top" width="180"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">USA PATRIOT Act, H.R. 3162<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 103.5pt;" valign="top" width="138"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Frank James Sensenbrenner, Jr.<o:p></o:p></span></span></div>
<div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">(EPIC, 2011)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 2.25in;" valign="top" width="216"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">The USA PATRIOT ACT essentially nullified 5 of the first 10 Amendments to the U.S. Constitution.<o:p></o:p></span></span></div>
<div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Many citizens feel strongly that the powers now granted to the Executive branch of government and its agents are in direct conflict with the 1st, 4th, 5th, 6th and 8th Amendments in the Bill of Rights to the U.S. Constitution (see Bill of Rights, below.). In other words, we now live in such times that many of the rights to privacy that we thought we were guaranteed under the U.S. Constitution, are now preempted, at least temporarily by the PATRIOT Act. In fact, the only way that the PATRIOT Act could be successfully passed in both chambers of Congress was to include a “Sunset Clause,” which caused many of the more far-reaching provisions of the Act to expire automatically, unless they were again reviewed and approved by both chambers of Congress. Though there was a “Sunset Clause" the PATRIOT Act has now been renewed TWICE, once under President Bush and once under President Obama.<o:p></o:p></span></span></div>
</td></tr>
<tr><td style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 1.25in;" valign="top" width="120"><div align="center" class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt; page-break-before: always; text-align: center;">
<b><span class="Apple-style-span" style="background-color: black; color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Timeframe<o:p></o:p></span></b></div>
</td><td style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 135pt;" valign="top" width="180"><div align="center" class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt; page-break-before: always; text-align: center;">
<b><span class="Apple-style-span" style="background-color: black; color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Law<o:p></o:p></span></b></div>
</td><td style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 103.5pt;" valign="top" width="138"><div align="center" class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt; page-break-before: always; text-align: center;">
<b><span class="Apple-style-span" style="background-color: black; color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Author(s)<o:p></o:p></span></b></div>
</td><td style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 2.25in;" valign="top" width="216"><div align="center" class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt; page-break-before: always; text-align: center;">
<b><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><span style="background-color: black;">Comments</span><span style="background-color: #d9d9d9;"><o:p></o:p></span></span></b></div>
</td></tr>
<tr><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 1.25in;" valign="top" width="120"><div align="center" class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt; text-align: center;">
<b><span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">2005<o:p></o:p></span></span></b></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 135pt;" valign="top" width="180"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">H.R. 4127 – Data Acountability and Trust Act (DATA)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 103.5pt;" valign="top" width="138"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">House of Representatives - By Rep. Clifford Stearns [R-FL<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 2.25in;" valign="top" width="216"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Never passed by the Senate. The goal of this legislation was to protect consumers by requiring reasonable security policies and procedures to protect computerized data containing personal information and to provide for nationwide notice in the event of a security breach.<o:p></o:p></span></span></div>
</td></tr>
<tr><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 1.25in;" valign="top" width="120"><div align="center" class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt; text-align: center;">
<b><span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">2005 - 2011<o:p></o:p></span></span></b></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 135pt;" valign="top" width="180"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Breach Notification Act(s)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 103.5pt;" valign="top" width="138"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Various State Legislatures<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 2.25in;" valign="top" width="216"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 9pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">As of 2011, over 42 states in the U.S. have laws that protect the privacy of NPPI and PII.<o:p></o:p></span></span></div>
<div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 9pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Purpose was to safeguard PII and NPPI data in transit, and in storage, whether it is used for financial transactions or a patient’s medical records.<o:p></o:p></span></span></div>
<div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><span style="font-size: 9pt;">On May 12, 2011, President Obama’s administration submitted a legislative proposal to Congress to request the creation of laws to provide greater security for Federal government entities under the Department of Homeland Security as well as mandating Federal legislation that will require all organizations that experience privacy data breaches to notify those that are affected</span><span style="font-size: 10pt;">.<o:p></o:p></span></span></div>
</td></tr>
<tr><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 1.25in;" valign="top" width="120"><div align="center" class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt; text-align: center;">
<b><span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">2009<o:p></o:p></span></span></b></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 135pt;" valign="top" width="180"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">HITECH Act<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 103.5pt;" valign="top" width="138"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">U.S. Congress<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 2.25in;" valign="top" width="216"><div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 9pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Passed as a provision of the American Recovery and Reinvestment Act of 2009. It imposes stiff penalties for HIPAA violations.<o:p></o:p></span></span></div>
<div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 9pt;"><o:p><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"></span></o:p></span></div>
<div class="MsoHeader" style="margin-bottom: 6pt; margin-left: 0in; margin-right: 0in; margin-top: 6pt;">
<span style="font-size: 9pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">The ARRA is a bill to create jobs, restore economic growth, and strengthen America's middle class through measures that modernize the nation's infrastructure, enhance America's energy independence, expand educational opportunities, preserve and improve affordable health care, provide tax relief, and protect those in greatest need, and for other purposes. (U.S. Congress, 2009)<o:p></o:p></span></span></div>
</td></tr>
</tbody></table>
<div style="line-height: 32px; margin-bottom: 0in; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<o:p><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"></span></o:p></div>
<table border="0" cellpadding="0" cellspacing="0" class="MsoNormalTable" style="background-attachment: initial; background-clip: initial; background-color: #d9d9d9; background-image: initial; background-origin: initial; border-collapse: collapse;"><tbody>
<tr><td style="padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 6.65in;" valign="top" width="638"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><b><span style="font-size: 13pt;"><br /></span></b></span><br />
<h3 style="margin-bottom: 12pt; page-break-before: always;">
<span class="Apple-style-span" style="background-color: black; color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Appendix B – State Privacy Laws as of 2010</span></h3>
</td></tr>
</tbody></table>
<div align="center" class="MsoNormal" style="margin-bottom: 12pt; margin-left: 0in; margin-right: 0in; margin-top: 12pt;">
<b><o:p><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"></span></o:p></b></div>
<table border="1" cellpadding="0" cellspacing="0" class="MsoNormalTable" style="border-bottom-style: none; border-collapse: collapse; border-color: initial; border-image: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial; width: 643px;"><thead>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="bottom" width="109"><div align="center" class="Default" style="text-align: center;">
<b><span style="font-size: 11pt;"><span class="Apple-style-span" style="background-color: black; color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">State<o:p></o:p></span></span></b></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1.5pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="bottom" width="102"><div align="center" class="Default" style="text-align: center;">
<b><span style="font-size: 11pt;"><span class="Apple-style-span" style="background-color: black; color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Legislation or State Law<o:p></o:p></span></span></b></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1.5pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="bottom" width="432"><div align="center" class="Default" style="text-align: center;">
<b><span style="font-size: 11pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><span style="background-color: black;">Requires</span><o:p></o:p></span></span></b></div>
</td></tr>
</thead><tbody>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:place st="on"><st1:state st="on"><span style="font-size: 10pt;">Alaska</span></st1:state></st1:place><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">A.S. 45.48.010 (July 1, 2009)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice to consumers of breach in the security of unencrypted, unredacted personal information in physical or electronic form, or encrypted information where the encryption key may also have been compromised. No notice if a reasonable investigation determines there is no reasonable likelihood of harm to consumers. Written documentation of the investigation must be kept for 5 years. Entities subject to compliance with the Gramm-Leach-Bliley Act are exempt.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Arizona</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">A.R.S. 44-7501 (December 31, 2006)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice to consumers of breach in the security of unencrypted, unredacted computerized personal information. No notice if a reasonable investigation determines there is no reasonable likelihood of harm to consumers. If entity complies with federal rules, then it is deemed to be in compliance with <st1:state st="on"><st1:place st="on">Arizona</st1:place></st1:state> law.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Arkansas</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Ark.</span></st1:place></st1:state><span style="font-size: 10pt;"> Code Ann. 4-110-101 to 108 (March 31, 2005)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice to consumers of breach in the security of unencrypted, computerized personal information and medical information in electronic or physical form. Notice is not required if no reasonable likelihood of harm to consumers. If entity complies with state or federal law that provides greater protection, and at least as thorough disclosure and in compliance with the state or federal law, then it is deemed in compliance.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">California</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Civil Code Sec. 1798.80-1798.82 (July 1, 2003)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice to consumers of breach in the security, confidentiality, or integrity of unencrypted, computerized personal information held by a business or a government agency. If the person or business has own notification procedures consistent with timing requirements and provides notice in accordance with its policies or if the person or business abides by state or federal law provides greater protection and disclosure, then it is deemed in compliance.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Colorado</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:place st="on"><span style="font-size: 10pt;">Co.</span></st1:place><span style="font-size: 10pt;"> Rev. Stat. 6-1-716(1)(a) (September 1, 2006)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice to consumers of breach in the security of unencrypted, unredacted computerized personal information. Notice given unless investigation determines misuse of information has not occurred or is not reasonably likely to occur. If entity is regulated by state or federal law and maintains procedures pursuant to laws, rules, regulations or guidelines, it is deemed in compliance.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Connecticut</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">699 Gen. Stat. <st1:state st="on"><st1:place st="on">Conn.</st1:place></st1:state> 36a-701 (January 1, 2006)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice of security breach by persons who conduct business in the state and have a breach of the security of unencrypted computerized data, electronic media or electronic files, containing personal information. Notice is not required if the breached entity determines in consultation with federal, state, and local law enforcement agencies that the breach will not likely result in harm to the individuals. Governmental entities not required to provide notice under this section. Entities are also deemed compliant if notification is in compliance with rules or guidelines established by the primary function of the regulator under the Gramm-Leach Bliley Act.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Delaware</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Del. Code Ann. Title 6 Section 12B-101 to 12-B-106 (June 28, 2005)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice to consumers of breach in the security of unencrypted computerized personal information if the investigation determines that misuse of information about a <st1:state st="on"><st1:place st="on">Delaware</st1:place></st1:state> resident has occurred or is reasonably likely to occur. If the entity is regulated by state or federal law and maintains procedures for a breach pursuant to the laws, rules, regulations, guidances or guidelines established by its primary or functional state or federal regulator, then it is deemed in compliance with this chapter provided it notifies affected residents in accordance with the maintained procedures when a breach occurs.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">District of Columbia</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><span lang="FR" style="font-size: 10pt;">DC Code Sec 28-3851 et seq. </span><span style="font-size: 10pt;">(January 1, 2007)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice to consumers of breach in the security, confidentiality, or integrity of unencrypted computerized or other electronic personal information held by a business or a government agency. This section does not pertain to person or entity subject to the Gramm-Leach Bliley Act. This section also does not apply to a person or business with its own notification procedures with consistent timing requirements in compliance with notification requirements of this section and the person or business provides notice in accordance with its policies and which is reasonably calculated to give actual notice.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Florida</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><span lang="NO-BOK" style="font-size: 10pt;">Fla. Stat. Ann. 817.5681 et seq. </span><span style="font-size: 10pt;">(July 1, 2005)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice to consumers of breach in the security, confidentiality or integrity of computerized, unencrypted personal information held by a person who conducts business in the state. Notice not required if, after appropriate investigation or consultation with law enforcement, person reasonably determines breach has not and will not likely result in harm to individuals. Determination must be documented in writing and maintained for five years. Deemed in compliance if person’s own notification procedure is otherwise consistent with the timing requirements of this section, or “maintaining” notification procedures established by person’s primary or functional federal regulator.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:country-region st="on"><st1:place st="on"><span style="font-size: 10pt;">Georgia</span></st1:place></st1:country-region><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><span lang="NO-BOK" style="font-size: 10pt;">Ga. Code Ann. 10-1-910 et seq. </span><span style="font-size: 10pt;">(May 24, 2007. Covers “information brokers and data collectors”)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice of breach that compromises the security, confidentiality, or integrity of computerized personal information held by an info broker or data collector.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span lang="FR" style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Hawaii<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><span lang="FR" style="font-size: 10pt;">HRS Sec 487N-1 et seq. </span><span style="font-size: 10pt;">(January 1, 2007)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice when unauthorized access to and acquisition of unencrypted or unredacted records or data containing personal information where illegal use of the personal information has occurred, or is reasonably likely to occur and that creates a risk of harm to a person. Notice under this section not required by a financial institution subject to Federal Interagency Guidance on Response Programs for Unauthorized Access to Consumer Information and Consumer Notice or by any health plan or healthcare provider under HIPAA.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Idaho</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Id.</span></st1:place></st1:state><span style="font-size: 10pt;"> Code Ann. 28-51-104 (July 1, 2006)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice to consumers of breach in the security of unencrypted, computerized personal information if after a reasonable investigation, the agency, individual or entity determines that misuse of information of Idaho resident has occurred or is reasonably likely to occur. Notice under this section not required by a person regulated by state or federal law and who complies with procedures under that law.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span lang="FR" style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Illinois<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span lang="FR" style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">ILCS Sec. 530/1 et seq. (January 1, 2006)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice to consumers of breach in the security, confidentiality, or integrity of personal information of the system data held by a person or a government agency. Notice under this section not required if entity maintains own notification procedures as part of an information security policy for the treatment of personal information and is otherwise consistent with the timing requirements of this Act.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span lang="FR" style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Indiana<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><span lang="FR" style="font-size: 10pt;">Ind. Code Sec. 4-1-11 et seq. </span><span style="font-size: 10pt;">(June 30, 2006)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice to consumers of breach in the security, confidentiality, or integrity of computerized personal information held by a government agency.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span lang="FR" style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Indiana<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span lang="FR" style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Ind. Code Sec. 24-2-9 et seq). (June 30, 2006)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice when a data collector knows, should know, or should have known that the unauthorized acquisition of computerized data, including computerized data that has been transferred to another medium, constituting the breach has resulted in or could result in identity deception, ID theft or fraud. Notice not required under this section if entity maintains own disclosure procedures, is under federal USA Patriot Act, Exec. Order 13224, FCRA, Financial Modernization Act, HIPAA or financial institutions that comply with the Federal Interagency Guidance on Response Programs for Unauthorized Access to Member Info and Member Notice.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Iowa</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Iowa</span></st1:place></st1:state><span style="font-size: 10pt;"> Code Chapter 2007-1154 (July 1, 2008)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice to consumers of breach in the security of unencrypted, unredacted personal information electronic form. No notice if a reasonable investigation determines there is no reasonable likelihood of harm to consumers. Written documentation of the investigation must be kept for 5 years. Exempted are those with own notification procedures or procedures under state or federal law providing at least greater protection to personal information and at least as thorough disclosure requirements pursuant to the rules, regulations, procedures, guidance or guidelines established by primary regulator, or state or federal laws. Entities subject to compliance with the Gramm-Leach-Bliley Act are exempt.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Kansas</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Kansas</span></st1:place></st1:state><span style="font-size: 10pt;"> Stat. 50-7a01, 50-7a02 (January 1, 2007)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice to consumers about a breach in the security of unencrypted, unredacted computerized personal information if investigation determines misuse has occurred or is reasonably likely occur.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Louisiana</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:place st="on"><st1:placename st="on"><span style="font-size: 10pt;">La. Rev.</span></st1:placename><span style="font-size: 10pt;"> <st1:placetype st="on">State</st1:placetype></span></st1:place><span style="font-size: 10pt;">. Ann. Sec. 51 3071-3077 (January 1, 2006)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice of a breach of the security, confidentiality, or integrity of unencrypted, computerized, personal information by persons doing business in the state. No notice if, after a reasonable investigation, the data holder determines that there is no reasonable likelihood of harm to customers. Notice not required by financial institutions in compliance with federal guidance.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Maine</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Me. Rev. Stat. Ann. 10-21-B-1346 to 1349 (January 31, 2006. Covers only information brokers)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice of a breach of the security, confidentiality, or integrity of unencrypted, computerized, personal information if the personal information has been or is reasonably believed to have been acquired by an unauthorized person. Notice under this section is not required by persons regulated by state or federal law and which complies with procedures under that law.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Massachusetts</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><span style="font-size: 10pt;">201 CMR 17.00 (March 1, 2010)</span><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice of a breach unauthorized acquisition of unencrypted data, or encrypted electronic data and the confidential process or key that is capable of compromising the security, confidentiality or integrity of the personal information that creates a significant risk of identity theft or fraud.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Michigan</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">2006-PA-0566 (July 2, 2007)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice of a breach of the security, confidentiality, or integrity of unencrypted, computerized, personal information by persons doing business in the state. Notice under this section required unless person/agency determines security breach has not or is not likely to cause substantial loss or injury to, or result in identity theft. Does not apply to financial institutions or HIPAA entities.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Minnesota</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><span lang="NO-BOK" style="font-size: 10pt;">Minn. Stat. 324E.61 et seq. </span><span style="font-size: 10pt;">(January 1, 2006)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice of a breach of the security, confidentiality, or integrity of unencrypted, computerized, personal information by persons doing business in the state. Does not apply to financial institutions or HIPAA entities.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Montana</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Mont.</span></st1:place></st1:state><span style="font-size: 10pt;"> Code Ann. 31-3-115 (March 1, 2006)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice to consumers of breach in security, confidentiality, or integrity of computerized personal information held by a person or business if the breach causes or is reasonably believed to have caused loss or injury to a <st1:state st="on"><st1:place st="on">Montana</st1:place></st1:state> resident. Notice under this section is not required if the entity maintains own notification procedures as part of an information security policy for the treatment of personal information and is otherwise consistent with the timing requirements of this section.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Nebraska</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Neb.</span></st1:place></st1:state><span style="font-size: 10pt;"> Rev. Stat. 87-801 et seq. (July 16, 2006)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice to consumers of a breach in the security of unencrypted, computerized personal information if an investigation determines use of information has occurred or is reasonably likely to occur. Deemed in compliance if person’s own notification procedure is otherwise consistent with the timing requirements of this section, or if notification procedures established by person’s primary or functional federal regulator.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Nevada</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Nev. Rev. Stat. 607A.010 et seq. (January 1, 2006)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice of breach of the security, confidentiality, or integrity of unencrypted computerized personal information by data collectors, which are defined to include government, business entities and associations who handle, collect, disseminate or otherwise deal with nonpublic personal information. Notice under this section is not required if the entity maintains own notification procedures as part of an information security policy for the treatment of personal information and is otherwise consistent with the timing requirements of this section, or is subject to compliance with the Gramm-Leach-Bliley Act.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span lang="FR" style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">New Hampshire<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><span lang="FR" style="font-size: 10pt;">NH RS 359-C: 19 et seq. </span><span style="font-size: 10pt;">(January 1, 2007)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice of unauthorized acquisition if determined likelihood information has been or will be misused. Notice must be given if there is a determination that misuse of information has occurred or is reasonably likely to occur or if a determination cannot be made. Notice under this section not required if the entity maintains own notification procedures as part of an information security policy for the treatment of personal information and is otherwise consistent with the timing requirements of this section or if the entity is a person engaged in trade or commerce under RSA 358-A:3 and maintains notification procedures established by its primary or functional regulator.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">New Jersey</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">NJ Stat 56:8-163 (July 2, 2006)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice of breach of security of unencrypted computerized personal information held by a business or public entity. No notice if a thorough investigation finds misuse of the information is not reasonably possible. Written documentation of the investigation must be kept for 5 years. Notice under this section not required if entity maintains own notification procedures as part of an information security policy for the treatment of personal information and is otherwise consistent with the timing requirements of this section.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">New York</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">NY Bus. Law Sec. 899-aa. (December 8, 2005)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice of breach of security of computerized unencrypted, or encrypted with acquired encryption key, personal information held by both public and private entities.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">North Carolina</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">N.C. Gen. Stat. 75-65 (December 1, 2005)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice of breach of security of unencrypted and unredacted written, drawn, spoken, visual or electromagnetic personal information, and encrypted personal information with the confidential process or key held by a private business if the breach causes, is reasonably likely to cause, or creates a material risk of harm to residents of North Carolina. Financial institutions subject to compliance with Federal Interagency Guidance on Response Programs for Unauthorized Access to Member Info and Member Notice are exempt.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">North Dakota</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span lang="FR" style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">N.D. Cent. Code 51-30 (June 1, 2005)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice of a breach of the security of unencrypted, computerized, personal information by persons doing business in the state. Includes an expanded list of sensitive personal information, including date of birth, mother’s maiden name, employee ID number, and electronic signature. Exception for those financial institutions which are in compliance with federal guidance.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span lang="NO-BOK" style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Ohio<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><span lang="NO-BOK" style="font-size: 10pt;">O.R.C. Ann. 1349.19 et seq. </span><span style="font-size: 10pt;">(February 17, 2006)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice of breach of the security or confidentiality of computerized personal information, held by a state agency, political subdivision or business where reasonably believed it will cause a material risk of identity theft or fraud to a person or property of a resident of <st1:state st="on"><st1:place st="on">Ohio</st1:place></st1:state>. Notice under this section is not required by financial institutions, trust companies or credit unions or any affiliate required by federal law to notify customers of information security breach and who is in compliance with federal law.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Oklahoma</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Okla.</span></st1:place></st1:state><span style="font-size: 10pt;"> Stat. 74-3113.1 (June 8, 2006)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Requires state government agencies to give notice of breach of the security of the system following discovery or notification of the breach in the security of the data to any resident of <st1:state st="on"><st1:place st="on">Oklahoma</st1:place></st1:state> whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person. Notice is not required under this section by a state agency, board, commission, or unit or subdivision of government if the entity maintains own notification procedures as part of an information security policy for the treatment of personal information and is otherwise consistent with the timing requirements of this section.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Oregon</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">O.R.S. 646A.604 (October 1, 2007)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice when unauthorized acquisition of computerized data that materially compromises the security, confidentiality or integrity of personal information maintained by the person. Notice not required if after an appropriate investigation or after consultation with federal, state or local agencies responsible for law enforcement, the person determines no reasonable likelihood of harm to consumers whose personal info has been acquired has resulted or will result from the breach. Determination must be in writing and kept for 5 years. Exempted are those with own notification procedures under state or federal law providing at least greater protection to personal information and at least as thorough disclosure requirements pursuant to the rules, regulations, procedures, guidance or guidelines established by primary regulator, or state or federal laws, and financial institutions which are in compliance with federal guidance.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Pennsylvania</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">73 <st1:state st="on"><st1:place st="on">Pa.</st1:place></st1:state> Cons. Stat. 2303 (June 30, 2006)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice of breach of the security or confidentiality of computerized personal information, held by a state agency, political subdivision or business and is reasonably believed to have been accessed or acquired by an unauthorized person. Notice under this section not required if entity maintains its own notification procedures as part of an information security policy for the treatment of personal information and is otherwise consistent with the timing requirements of this section. Financial institutions subject to compliance with Federal Interagency Guidance on Response Programs for Unauthorized Access to Member Info and Member Notice are exempt.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span lang="ES-AR" style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Puerto Rico<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><span lang="ES-AR" style="font-size: 10pt;">10 L.P.R.A. 4051 et seq. </span><span style="font-size: 10pt;">(January 5, 2006)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice of breach of the security, confidentiality and integrity of unencrypted personal information, where access has been permitted to unauthorized persons or it is known or reasonably suspected that authorized persons have accessed the information with intent to use it for illegal purposes.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Rhode Island</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">RI Gen. Law 11-49.2-3 to 11.49.2-7 (March 1, 2006)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice of a breach of the security, confidentiality or integrity of unencrypted, computerized, personal information by persons and by state agencies if breach poses significant risk of identity theft when unencrypted personal information was, or is reasonably believed to have been acquired by an unauthorized person. No notice is required if after an appropriate investigation or after consultation with relevant federal, state, and local law enforcement agencies, determine the breach has not and will not likely result in harm to individuals. Does not apply to HIPAA entities or financial institutions in compliance with Federal Interagency Guidelines. Entities covered by another state or federal law are exempt only if that other law provides greater protection to consumers.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span lang="FR" style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">South Carolina<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><span lang="FR" style="font-size: 10pt;">SC Code §1-11-490 et seq. </span><span style="font-size: 10pt;">(January 1, 2009)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice of the security of computerized, unencrypted and unredacted personal information, or encrypted information with a key that has also been compromised, when illegal use of the information has occurred or is reasonably likely to occur or use of the information creates a "material risk of harm" to the consumer. Notice under this section is not required if entity maintains its own notification procedures as part of an information security policy for the treatment of personal information and is otherwise consistent with the timing requirements of this section.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Tennessee</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Tenn.</span></st1:place></st1:state><span style="font-size: 10pt;"> Code. Ann. 47-18-21 (July 1, 2005)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice of the unauthorized acquisition of unencrypted computerized data that materially compromises the security, confidentiality, or integrity of personal information. Does not apply to persons subject to Title V of the Gramm-Leach-Bliley Act.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Texas</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Tex.</span></st1:place></st1:state><span style="font-size: 10pt;"> Bus & Com. Code Ann. 4-48-103 (September 1, 2005)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice of a breach of the security, confidentiality, or integrity of unencrypted, computerized, personal information by persons who conduct businesses in the state. Notice under this section not required if the entity maintains its own notification procedures as part of an information security policy for the treatment of personal information and is otherwise consistent with the timing requirements of this section.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span lang="FR" style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Utah<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><span lang="FR" style="font-size: 10pt;">Utah Code 13-44-101 et seq. </span><span style="font-size: 10pt;">(January 1, 2007)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice of a breach of the security of computerized personal information that is not protected by a method that makes the information unusable. Entities covered by another state or federal law are exempt if the person notifies each affected <st1:state st="on"><st1:place st="on">Utah</st1:place></st1:state> resident in accordance with law.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Vermont</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span lang="SV" style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Vt. Stat. Tit 9 Sec. 2435 (January 1, 2007)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice if investigation reveals misuse of personal information for identity theft or fraud has occurred, or is reasonably likely to occur. Notice is not required if the data collector establishes that misuse of personal information is not reasonably possible. Must provide notice and explanation to the Attorney General or department of banking, insurance, securities and health care administration in the event data collector is a person/entity licensed with that department. Financial institutions subject to compliance with Federal Interagency Guidance on Response Programs for Unauthorized Access to Member Info and Member Notice are exempt.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span lang="FR" style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Virgin Islands<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span lang="FR" style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">14 V.I.C. 2208 et seq. (October 17, 2005)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice of a breach of the security, confidentiality, or integrity of unencrypted, computerized, personal information reasonably believed to have been acquired by unauthorized persons. Notice under this section not required if entity maintains own notification procedures as part of an information security policy for the treatment of personal information and is otherwise consistent with the timing requirements of this section.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Virginia</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">VA Code 18.2-186.6 (July 1, 2008)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice of any breach of the security of computerized, unencrypted and unredacted personal information, or encrypted information with a key that has also been compromised, if an individual or entity reasonably believes such information has been accessed and acquired by an unauthorized person and has caused or will cause identity theft or other fraud. Notice under this section is not required if an entity maintains its own notification procedures as part of an information security policy for the treatment of personal information and is otherwise consistent with the timing requirements of this section, or if the entity has notification procedures established by a federal regulator. This section does not apply to any entity that is subject to compliance with the Gramm-Leach-Bliley Act.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Washington</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">RCW 42.17 et seq. (July 24, 2005)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice of a breach of the security, confidentiality, or integrity of unencrypted, computerized, personal information by persons, businesses and government agencies. Notice is not required when there is a technical breach of the security of the system which does not seem reasonably likely to subject customers to a risk of criminal activity. Notice under this section not required if entity maintains own notification procedures as part of an information security policy for the treatment of personal information and is otherwise consistent with the timing requirements of this section.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">West Virginia</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><span lang="FR" style="font-size: 10pt;">WV Code 46A-2A-101 et seq. </span><span style="font-size: 10pt;">(June 26, 2008)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice of any breach of the security of computerized, unencrypted and unredacted personal information, or encrypted information with a key that has also been compromised, reasonably believed to have been accessed and acquired by an unauthorized person and has caused, or will cause, identity theft or other fraud. Financial institutions subject to compliance with Federal Interagency Guidance on Response Programs for Unauthorized Access to Member Info and Member Notice are exempt.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Wisconsin</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Wis.</span></st1:place></st1:state><span style="font-size: 10pt;"> Stat. 895.507 (March 16, 2006)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice to the consumer when personal information is taken in a security breach that is not encrypted, redacted or altered in any manner rendering the information unreadable. This includes DNA and biometric data. Notice not required if the acquisition of personal information does not create a material risk of ID theft or fraud.<o:p></o:p></span></span></div>
</td></tr>
<tr style="page-break-inside: avoid;"><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-image: initial; border-left-color: windowtext; border-left-style: solid; border-left-width: 1pt; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: windowtext; border-top-style: solid; border-top-width: 1pt; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 81.9pt;" valign="top" width="109"><div class="Default">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><st1:state st="on"><st1:place st="on"><span style="font-size: 10pt;">Wyoming</span></st1:place></st1:state><span style="font-size: 10pt;"><o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 76.5pt;" valign="top" width="102"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">W.S. 40-12-501 to 509 (July 1, 2007)<o:p></o:p></span></span></div>
</td><td style="border-bottom-color: windowtext; border-bottom-style: solid; border-bottom-width: 1pt; border-left-color: initial; border-left-style: none; border-left-width: initial; border-right-color: windowtext; border-right-style: solid; border-right-width: 1pt; border-top-color: initial; border-top-style: none; border-top-width: initial; padding-bottom: 0in; padding-left: 5.4pt; padding-right: 5.4pt; padding-top: 0in; width: 4.5in;" valign="top" width="432"><div class="Default">
<span style="font-size: 10pt;"><span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Notice of the unauthorized acquisition of computerized data that materially compromises the security, confidentiality, or integrity of personal identifying information of an investigation determines misuse of the personal identifying information has occurred or is reasonably likely to occur. Financial institutions subject to the Gramm-Leach-Bliley Act or credit unions under 12 USC §1752 are exempt from providing notice under this section.<o:p></o:p></span></span></div>
</td></tr>
</tbody></table>
<div class="MsoNormal" style="line-height: 32px; margin-bottom: 0in; text-align: -webkit-auto;">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><br />(Jacobs, 2011)<o:p></o:p></span></div>
<div style="line-height: 32px; margin-bottom: 0in; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><br /></span></div>
<div style="line-height: 32px; margin-bottom: 0in; margin-left: 58.3pt; margin-right: 0in; margin-top: 0in; text-align: -webkit-auto; text-indent: -58.3pt;">
<span class="Apple-style-span" style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><br /></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"></span></div>
<div class="MsoNormal" style="font-size: 12pt; text-align: -webkit-auto;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">= = = = = = = = = = = = = = = = = = = = = = =</span></div>
<div style="text-align: -webkit-auto;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
</div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">= = = = = = = = = = = = = = = = = = = = = = =<br /><span style="font-size: 9pt;">William Favre Slater, III<o:p></o:p></span></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<span style="font-size: 9pt;"><span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">MBA, M.S., PMP, CISSP, SSCP, CISA, ISO 27002, ISO 20000, ITIL v3, Cloud Computing Foundation<o:p></o:p></span></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<span style="font-size: 9pt;"><span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Project Manager / Program Manager<o:p></o:p></span></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<br /></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<span style="font-size: 9pt;"><span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">M.S. in Cybersecurity Program at Bellevue University<o:p></o:p></span></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<span style="font-size: 9pt;"><span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><a href="http://cybersecuritymsbellevue.blogspot.com/">http://cybersecuritymsbellevue.blogspot.com</a><o:p></o:p></span></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<br /></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<span style="font-size: 9pt;"><span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">CIS 537 Introduction to Cyber Ethics<o:p></o:p></span></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<span style="font-size: 9pt;"><span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><a href="http://cis537-wfs.blogspot.com/">http://cis537-wfs.blogspot.com</a><o:p></o:p></span></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<br /></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<span style="font-size: 9pt;"><span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">CIS 608 Information Security Management<o:p></o:p></span></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<span style="font-size: 9pt;"><span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><a href="http://cis608.blogspot.com/">http://cis608.blogspot.com</a><o:p></o:p></span></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<br /></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<span style="font-size: 9pt;"><span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">CYBR 515 - Security Architecture and Design<o:p></o:p></span></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<span style="font-size: 9pt;"><span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><a href="http://cybr515.blogspot.com/">http://cybr515.blogspot.com</a><o:p></o:p></span></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<br /></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<span style="font-size: 9pt;"><span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">CYBR 510 Physical, Operations, and Personnel Security<o:p></o:p></span></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<span style="font-size: 9pt;"><span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><a href="http://cybr510.blogspot.com/">http://cybr510.blogspot.com</a><o:p></o:p></span></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<br /></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<span style="font-size: 9pt;"><span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Career<o:p></o:p></span></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<span style="font-size: 9pt;"><span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><a href="http://billslater.com/career">http://billslater.com/career</a><o:p></o:p></span></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<br /></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<span style="font-size: 9pt;"><span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Certifications<o:p></o:p></span></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<span style="font-size: 9pt;"><span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><a href="http://billslater.com/certifications">http://billslater.com/certifications</a><o:p></o:p></span></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<br /></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<span style="font-size: 9pt;"><span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Credentials<o:p></o:p></span></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<span style="font-size: 9pt;"><span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><a href="http://on.fb.me/fW3wH0">http://on.fb.me/fW3wH0</a><o:p></o:p></span></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<br /></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<span style="font-size: 9pt;"><span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">ISO 27001<o:p></o:p></span></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<span style="font-size: 9pt;"><span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;"><a href="http://billslater.com/iso27001">http://billslater.com/iso27001</a><o:p></o:p></span></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<br /></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<span style="font-size: 9pt;"><span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">Chicago, IL<o:p></o:p></span></span></div>
<div class="MsoNormal" style="text-align: -webkit-auto;">
<span style="font-size: 9pt;"><span style="color: #cccccc; font-family: 'Trebuchet MS', sans-serif;">United States of America</span></span></div>
</div>
<div class="MsoNormal" style="font-size: 12pt;">
<o:p> </o:p></div>
<br />
<div class="MsoNormal">
<span style="font-size: 16pt;"><o:p> </o:p></span></div>
</div>
</div>William Favre Slater, IIIhttp://www.blogger.com/profile/05247248094266294971noreply@blogger.com0Aleje Jerozolimskie 31, 01-001 Warsaw, Poland52.2296756 21.012228752.0740671 20.6963717 52.3852841 21.328085700000003tag:blogger.com,1999:blog-2656669920870314927.post-2665811178451624822011-12-06T12:06:00.000-08:002011-12-06T13:07:43.965-08:00Post 004 - CYBR 510<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRmXaez9V7O-U5dlEzcLyp_5cLljB6efynDy6JS8jtJmo8k49EHoEvNGXfrE8dS4vE4MyaXrZx5Y-C2yBeq8S0xznUhHSP_mBDKkSsn8mJqe4MazdL5PibmwUpYeXTidswt2wVCxeETQA/s1600/Roman_Numeral_Turquoise_02.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 91px; height: 122px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRmXaez9V7O-U5dlEzcLyp_5cLljB6efynDy6JS8jtJmo8k49EHoEvNGXfrE8dS4vE4MyaXrZx5Y-C2yBeq8S0xznUhHSP_mBDKkSsn8mJqe4MazdL5PibmwUpYeXTidswt2wVCxeETQA/s400/Roman_Numeral_Turquoise_02.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5683114392217640306" /></a><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhS9HThpZ5Xe4wLtly0qWsdGVeSwpZU5Dcky5XmkzDmC5SvUxXqJWPJWbmzBuv7lq6XKe1gyu_HManKmacHtJB9zQziKBxQUu9R2yl_ygxm6TKf7ttZ_wOpmBwD4-6uqASkQ2ij7Uki6jk/s1600/Cybersecurity_Curriculum_CYBR_510.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 107px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhS9HThpZ5Xe4wLtly0qWsdGVeSwpZU5Dcky5XmkzDmC5SvUxXqJWPJWbmzBuv7lq6XKe1gyu_HManKmacHtJB9zQziKBxQUu9R2yl_ygxm6TKf7ttZ_wOpmBwD4-6uqASkQ2ij7Uki6jk/s400/Cybersecurity_Curriculum_CYBR_510.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5683114385458134994" /></a><div style="text-align: left;"><br /></div><div><div><span class="Apple-style-span"><b>Week Two Assignments</b></span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span"> <span class="Apple-tab-span" style="white-space:pre"> </span>Week 1 Summary</span></div><div><span class="Apple-style-span">Theme for the Week- Core Competencies in Managing a Security Operation</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">This week: </span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">Measuring importance</span></div><div><span class="Apple-style-span">The driving force of a security operation</span></div><div><span class="Apple-style-span">Threats</span></div><div><span class="Apple-style-span">Laws</span></div><div><span class="Apple-style-span">Learning Objectives: </span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">Describe the design and evaluation process of physical security protection systems.</span></div><div><span class="Apple-style-span">Examine how personnel security has changed over the years to become an effective tool within the security field.</span></div><div><span class="Apple-style-span">Assess the methods for how security executives rank priorities.</span></div><div><span class="Apple-style-span">Relate the similarities and differences between contract security services and in-house security.</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span"> <span class="Apple-tab-span" style="white-space:pre"> </span>Readings</span></div><div><span class="Apple-style-span">Week 2 Reading Assignments</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">Security Operations Management, Chapter 2 </span></div><div><span class="Apple-style-span">Effective Physical Security, Chapter 2</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span"> <span class="Apple-tab-span" style="white-space:pre"> </span>Week #2 Class Discussion Board</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">On Week 2 Forum, post your response to one of the following questions:</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">Discuss the three biggest problems you feel a management team would have with a contract security service. Contrast this with the three biggest problems you feel a management team would have with a proprietary or in-house security service.</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">How have contract security services and proprietary security services changed since the 9/11 terrorist attacks?</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">Describe federal laws that have helped form security practices.</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">Corporate security managers place workplace violence at or near the top of their concerns. Is this likely to change? What factors could influence different types of industries to report different security priorities?</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">Why are some operational contingencies considered "core"? What would be an example of a non-core competency?</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">Discuss the different security concerns for different industries and why there is a difference between them.</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">The textbook describes a list of "What drives security operations?" Is this list complete or is there something missing? Do you agree with the list? Explain your answer.</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">Try not to repeat a topic already chosen by another student. Your answer should be 2-3 paragraphs in length with proper attention given to spelling and grammar. You can use the textbook and supplemental reading, but you should also include at least one Internet sites that provide information on your topic. Once you have submitted your initial post (by Friday night), read each of your classmates' initial posts and respond to at least two of them. In your response, provide your comments and any additional information you might have. Remember to cite your sources.</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">Directions: Each student must respond to a minimum of four other students’ threaded discussion postings in a “substantive and meaningful” manner. Do not simply agree or disagree – provide a quality response that reflects critical thinking. To foster learning, “professional and constructive” criticism is encouraged when responding to your classmates.</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">The weekly discussion questions, to allow time for students to respond, must be answered by 6:00 p.m. on Sunday of each week. Please see the discussion evaluation section in the syllabus for detailed expectations and directions of how your discussion board postings and overall participation is evaluated. </span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">Reminders: Each student must respond to the weekly questions. Discussion postings should reflect some new or original information – do not just regurgitate data or opinion posted by previous students. The quality of your effort will be considered when grading discussion postings.</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">This assignment is worth 100 points total.</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span"> <span class="Apple-tab-span" style="white-space:pre"> </span>Week 2 Written Assignments</span></div><div><span class="Apple-style-span">Your written assignment this week is to write a paper addressing both of the following:</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">Discuss how the Rand Report (p. 32-33 of Security Operations Management textbook) has changed the security field and the law enforcement field.</span></div><div><span class="Apple-style-span">How has the modern protective industry grown in recent history? How does it compare with law enforcement today?</span></div><div><span class="Apple-style-span">Reminders: Students are required to submit assignments with a name, course name/number and page numbers on your assignments. Please double space your work, and re-state the question. Grading is facilitated when the assignment submission is well structured, and the questions (opposed to your answers) have been bolded. File Naming Convention: Students are required to submit assignments with their last name, followed by the week’s assignment; e.g. smith1.2. Microsoft Word documents only. Late submitters will be penalized.</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">Weekly written assignments will be due by 11:59 p.m. on Sunday at the end of each week. Specific assignments will be posted each week throughout the course. Your grade will be predicated on the quality of your thinking and writing - NOT the length of your writing. Too many words are usually a sign of poor editing, and too few words are a sign of poor analysis. (Submit for grading use the link below)</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">This assignment is worth 100 points total.</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span"> <span class="Apple-tab-span" style="white-space:pre"> </span>Week 2 Journal</span></div><div><span class="Apple-style-span">Each student will complete “weekly” entries into a well-organized journal that reflects how the weekly coursework (reading and assignment) and discussion has impacted their personal and professional lives. Essentially, the journal - akin to a personal diary, should capture the meaningful and significant aspects of the course which generated student analysis and thought. Your weekly journal entry will be due by 11:59 p.m. on Sunday at the end of each week. (Submit for grading using the link below)</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">This assignment is worth 100 points total.</span></div><div><span class="Apple-style-span"><br /></span></div><div><p class="MsoNormal"><span class="Apple-style-span">= = = = = = = = = = = = = = = = = = = = = = =</span></p> <p class="MsoNormal"><span class="Apple-style-span"><span class="Apple-style-span" style="font-size: 12px; ">William Favre Slater, III<br /></span><span class="Apple-style-span" style="font-size: 12px; ">MBA, M.S., PMP, CISSP, SSCP, CISA, ISO 27002, ISO 20000, ITIL v3, Cloud Computing Foundation<br /></span><span class="Apple-style-span" style="font-size: 12px; ">Project Manager / Program Manager<br /></span><span class="Apple-style-span" style="font-size: 11px; ">CYBR 510 Blog: </span><a href="http://cybr510.blogspot.com/" style="font-size: 11px; ">http://cybr510.blogspot.com</a><br /><a href="http://billslater.com/career" style="font-size: 12px; ">http://billslater.com/career</a><br /><span class="Apple-style-span" style="font-size: 12px; ">Chicago, IL<br /></span><span class="Apple-style-span" style="font-size: 12px; ">United States of America</span></span></p> <p class="MsoNormal"><o:p><span class="Apple-style-span"> </span></o:p></p> <p class="MsoNormal"><o:p><span class="Apple-style-span"> </span></o:p></p></div><div><span class="Apple-style-span"><br /></span></div><div><br /></div></div>William Favre Slater, IIIhttp://www.blogger.com/profile/05247248094266294971noreply@blogger.com0tag:blogger.com,1999:blog-2656669920870314927.post-86536986122577217802011-12-05T07:03:00.000-08:002011-12-05T07:13:52.468-08:00Post 003 - CYBR 510<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzMlq4D6QkW-gopV_XOFlyU5o8psJJvqGJHcppweaLYN55DZLfrnm932-N5qUROG70YVO2GX9jINpDjTOzfgZRFIYPOZtFqa4DDs8tHjYS4ibb78JypB-Wd-lXC8QTPRRX-AwxeKnsuJc/s1600/isms_and_management_support.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 275px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzMlq4D6QkW-gopV_XOFlyU5o8psJJvqGJHcppweaLYN55DZLfrnm932-N5qUROG70YVO2GX9jINpDjTOzfgZRFIYPOZtFqa4DDs8tHjYS4ibb78JypB-Wd-lXC8QTPRRX-AwxeKnsuJc/s400/isms_and_management_support.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5682661484152830690" /></a><div><span class="Apple-style-span" style="color: rgb(204, 204, 204); font-family: 'trebuchet ms'; line-height: 25px; font-size: medium; ">Week 1 Discussion Question</span></div><div> <p class="MsoNormal" style="margin-left: 0.25in; "><span class="Apple-style-span"><b>Why is it important for security professionals to understand security management? </b><o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.25in; "><span class="Apple-style-span">Information Security Professionals must understand security management because without the proper management of a security implementation in an organization, the organization will know know with any certainty that it is doing an adequate job of properly using its resources to reduce risk to a level that is acceptable for the organization’s operations.<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.25in; "><o:p><span class="Apple-style-span"> </span></o:p></p> <p class="MsoNormal" style="margin-left: 0.25in; "><span class="Apple-style-span">Here’s additional information about managing information security using an ISMS.<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.25in; "><o:p><span class="Apple-style-span"> </span></o:p></p> <p class="MsoNormal" style="margin-top: 12pt; margin-right: 0in; margin-left: 0in; margin-bottom: 0.0001pt; "><span class="Apple-style-span">The fast-paced, electronically-enabled business environment of the 21<sup>st</sup> century is characterized by the tactical and strategic uses of information as business enablers. In most modern organizations, information is now seen as a primary asset and as such, it must be protected. Yet the proliferation and reliance on information in an organization also introduces responsibilities and risks which if not addressed, can subject the organization to extraordinary risks that could severely impact the viability of the business. The best strategy for an organization to manage these new business realities is to adopt a strong posture aimed at compliance management, risk management and information security management to ensure that its information assets are protected in the most comprehensive, standardized manner possible. Presently, the best tool to manage the challenges of Information Security is an enterprise Information Security Management System (ISMS). The ISMS is a centralized system of policies, procedures, and guidelines that when created and uniformly applied will provide the best practices to help ensure that an organization’s Information Security is being managed in a standardized way using documented best practices. The introduction of an ISMS into organization’s business operations will serve to identify, document and classify information assets and risks and then document the mitigation of risks using established, documented controls. It will also establish a framework to monitor the effectiveness of these controls and for continuous reporting and improvement. <o:p></o:p></span></p> <p class="MsoNormal" style="margin-top: 12pt; margin-right: 0in; margin-left: 0in; margin-bottom: 0.0001pt; "><span class="Apple-style-span">For a typical organization that implements an ISO 27001-based ISMS, the key benefits will be:<o:p></o:p></span></p> <p class="MsoListParagraphCxSpFirst" style="margin-top: 6pt; margin-right: 0in; margin-bottom: 6pt; margin-left: 0.5in; text-indent: -0.25in; "><!--[if !supportLists]--><span class="Apple-style-span">·<span style="font:7.0pt "Times New Roman""> </span><!--[endif]-->Better management and fulfillment of the Information Security requirements from the organization’s clients, because in many cases they have already adopted ISO 27001<o:p></o:p></span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top: 6pt; margin-right: 0in; margin-bottom: 6pt; margin-left: 0.5in; text-indent: -0.25in; "><!--[if !supportLists]--><span class="Apple-style-span">·<span style="font:7.0pt "Times New Roman""> </span><!--[endif]-->Reduction of risk of loss of existing customers<o:p></o:p></span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top: 6pt; margin-right: 0in; margin-bottom: 6pt; margin-left: 0.5in; text-indent: -0.25in; "><!--[if !supportLists]--><span class="Apple-style-span">·<span style="font:7.0pt "Times New Roman""> </span><!--[endif]-->Increased opportunities for new business<o:p></o:p></span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top: 6pt; margin-right: 0in; margin-bottom: 6pt; margin-left: 0.5in; text-indent: -0.25in; "><!--[if !supportLists]--><span class="Apple-style-span">·<span style="font:7.0pt "Times New Roman""> </span><!--[endif]-->Reduction of risk to regulatory penalties<o:p></o:p></span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top: 6pt; margin-right: 0in; margin-bottom: 6pt; margin-left: 0.5in; text-indent: -0.25in; "><!--[if !supportLists]--><span class="Apple-style-span">·<span style="font:7.0pt "Times New Roman""> </span><!--[endif]-->Reduction of risk reputational damage<o:p></o:p></span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top: 6pt; margin-right: 0in; margin-bottom: 6pt; margin-left: 0.5in; text-indent: -0.25in; "><!--[if !supportLists]--><span class="Apple-style-span">·<span style="font:7.0pt "Times New Roman""> </span><!--[endif]-->The creation of an Information Security-aware culture throughout the organization<o:p></o:p></span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top: 6pt; margin-right: 0in; margin-bottom: 6pt; margin-left: 0.5in; text-indent: -0.25in; "><!--[if !supportLists]--><span class="Apple-style-span">·<span style="font:7.0pt "Times New Roman""> </span><!--[endif]-->Because it is an international standard, the adoption of ISO 27001 enables ISO 27001-compliant branches and subsidiaries that are outside the U.S. to communicate and conduct business in a standard way that ensures information security is well-managed<o:p></o:p></span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top: 6pt; margin-right: 0in; margin-bottom: 6pt; margin-left: 0.5in; text-indent: -0.25in; "><!--[if !supportLists]--><span class="Apple-style-span">·<span style="font:7.0pt "Times New Roman""> </span><!--[endif]-->Better management of IT assets and their associated risks<o:p></o:p></span></p> <p class="MsoListParagraphCxSpMiddle" style="margin-top: 6pt; margin-right: 0in; margin-bottom: 6pt; margin-left: 0.5in; text-indent: -0.25in; "><!--[if !supportLists]--><span class="Apple-style-span">·<span style="font:7.0pt "Times New Roman""> </span><!--[endif]-->The ability to have an Information Security Management System that is based on the Deming model of Plan – Do – Check – Act for continuous process improvement<o:p></o:p></span></p> <p class="MsoListParagraphCxSpLast" style="margin-top: 6pt; margin-right: 0in; margin-bottom: 6pt; margin-left: 0.5in; text-indent: -0.25in; "><!--[if !supportLists]--><span class="Apple-style-span">·<span style="font:7.0pt "Times New Roman""> </span><!--[endif]-->The adoption of the most widely recognized international standard for implementing an ISMS<o:p></o:p></span></p> <p class="MsoNormal" style="margin-bottom: 0.0001pt; "><o:p><span class="Apple-style-span"> </span></o:p></p> <p class="MsoNormal" style="margin-bottom: 0.0001pt; "><span class="Apple-style-span">Note that the Information Security has rapidly risen to the forefront as a serious business issue. Because of its rapid rise to prominence and the dynamic and evolving nature of threats and the associated risk management efforts, the models to measure and quantify the value of such projects can often seem frustrating at best. So while this ISMS project may difficult to quantify using traditional methods such as return on investment, it is clear that the benefits of continued customer relationships as well as the ability to attract future customers through a demonstrated strong and continually improving posture of Information Security compliance management will far outweigh the costs associated with an ISO 27001-based ISMS implementation project.<o:p></o:p></span></p> <p class="MsoNormal" style="margin-bottom: 0.0001pt; "><o:p><span class="Apple-style-span"> </span></o:p></p> <p class="MsoNormal" style="margin-bottom: 0.0001pt; "><span class="Apple-style-span">Indeed, after implementing the ISMS under ISO 27001 standards, an organization will have better control of the Information that is the lifeblood of its business, and it will be able to demonstrate to its customers and its business partners that it too has adopted a strong posture of compliance management, risk management and information security management.<br /></span><br /><b>Does understanding classical management theories help security professionals?</b></p> <p class="MsoNormal"><o:p><span class="Apple-style-span"> </span></o:p></p> <p class="MsoNormal"><span style="line-height: 115%; "><span class="Apple-style-span">Yes. Classical management theories suggest that resources must be controlled and managed and that people in organizations should be held accountable, so I would suggest that Information Security Professionals can benefit greatly be studying classical management theories and that managers can likewise benefit by studying Information Security.<o:p></o:p></span></span></p> <p class="MsoNormal"><span style="line-height: 115%; "><o:p><span class="Apple-style-span"> </span></o:p></span></p> <p class="MsoNormal"><span style="line-height: 115%; "><o:p><span class="Apple-style-span"> </span></o:p></span></p> <p class="MsoNormal"><span style="line-height: 115%; "><span class="Apple-style-span">References:<o:p></o:p></span></span></p> <p class="MsoNormal"><span style="line-height: 115%; "><o:p><span class="Apple-style-span"> </span></o:p></span></p> <p class="MsoNormal"><span style="line-height: 115%; "><span class="Apple-style-span">Calder, A. (2009). Implementing Information Security based on ISO 27001 / ISO 27002. Zalthommel, Netherlands: Van Haren Publishing.<o:p></o:p></span></span></p> <p class="MsoNormal"><span style="line-height: 115%; "><o:p><span class="Apple-style-span"> </span></o:p></span></p> <p class="MsoNormal"><span style="line-height: 115%; "><span class="Apple-style-span">Calder, A. (2005). Nine Steps to Success: An ISO 27001 Implementation Overview. London, U.K.: IT Governance Publishing.<o:p></o:p></span></span></p> <p class="MsoNormal"><span style="line-height: 115%; "><o:p><span class="Apple-style-span"> </span></o:p></span></p> <p class="MsoNormal"><span style="line-height: 115%; "><span class="Apple-style-span">Calder, A. (2005). the Case for ISO 2700. London, U.K.: IT Governance Publishing.<o:p></o:p></span></span></p> <p class="MsoNormal"><span style="line-height: 115%; "><o:p><span class="Apple-style-span"> </span></o:p></span></p> <p class="MsoNormal"><span style="line-height: 115%; "><span class="Apple-style-span">Fennelly, L. J. (2004). Effective Physical Security, third edition. Burlington, MA: Elsevier.<o:p></o:p></span></span></p> <p class="MsoNormal"><span style="line-height: 115%; "><o:p><span class="Apple-style-span"> </span></o:p></span></p> <p class="MsoNormal"><span style="line-height: 115%; "><span class="Apple-style-span">Hintzbergen, J., et al. (2010). Foundations of Information Security: Based on ISO27001 and ISO27002. Zalthommel, Netherlands: Van Haren Publishing.<o:p></o:p></span></span></p> <p class="MsoNormal"><span style="line-height: 115%; "><o:p><span class="Apple-style-span"> </span></o:p></span></p> <p class="MsoNormal"><span style="line-height: 115%; "><span class="Apple-style-span">ISO. (2005) “Information technology – Security techniques – Information security management systems – Requirements”, ISO/IEC 27001:2005. Retrieved from <a href="http://www.ansi.org/">www.ansi.org</a> on March 20, 2011.<o:p></o:p></span></span></p> <p class="MsoNormal"><span style="line-height: 115%; "><o:p><span class="Apple-style-span"> </span></o:p></span></p> <p class="MsoNormal"><span style="line-height: 115%; "><span class="Apple-style-span">McCrie, R. D. (2007). Security Operations Management, second edition. Burlington, MA: Elsevier.<o:p></o:p></span></span></p><p class="MsoNormal"><span style="line-height: 115%; "><span class="Apple-style-span"><br /></span></span></p> <p class="MsoNormal"><a name="_MailAutoSig"><span class="Apple-style-span"><span class="Apple-style-span" style="font-family: 'trebuchet ms'; font-size: medium; line-height: 115%; ">==============</span><br /><span class="Apple-style-span"><span class="Apple-style-span" style="font-size: 12px; line-height: 14px;"><br /></span></span></span></a></p><p class="MsoNormal"><span class="Apple-style-span"><span style="font-size: 9pt; line-height: 115%; font-family: Arial, sans-serif; "> William Favre Slater, III<br /></span><span style="font-size: 8pt; line-height: 115%; font-family: Arial, sans-serif; ">MBA, M.S., PMP, CISSP, SSCP, CISA, ISO 27002, ISO 20000, ITIL v3, Cloud Computing Foundation<br /></span><span style="font-size: 8pt; line-height: 115%; font-family: Arial, sans-serif; ">CYBR 510 Blog: </span><a href="http://cybr510.blogspot.com/"><span style="font-size:8.0pt;mso-bidi-font-size:9.0pt;line-height:115%;font-family: "Arial","sans-serif";mso-no-proof:yes">http://cybr510.blogspot.com</span></a><span style="font-size: 8pt; line-height: 115%; font-family: Arial, sans-serif; "><br />slater@billslater.com<br />williamslater@gmail.com<br /></span><a href="mailto:wfslater@bellevue.edu"><span style="font-size:8.0pt;mso-bidi-font-size:9.0pt;line-height: 115%;font-family:"Arial","sans-serif";mso-no-proof:yes">wfslater@bellevue.edu</span></a><span style="font-size: 8pt; line-height: 115%; font-family: Arial, sans-serif; "><br />http://billslater.com/career<br />773 - 235 - 3080 – Home<br />312 - 758 - 0307 – Mobile<br />1337 N. Ashland Ave. No. 2<br />Chicago, IL 60622<br />United States of America</span></span><span style="font-size:8.0pt;mso-bidi-font-size: 9.0pt;line-height:115%;font-family:"Arial","sans-serif";color:#002060; mso-no-proof:yes"><o:p></o:p></span></p></div>William Favre Slater, IIIhttp://www.blogger.com/profile/05247248094266294971noreply@blogger.com0tag:blogger.com,1999:blog-2656669920870314927.post-13135346663457837362011-12-04T17:06:00.000-08:002011-12-05T19:13:41.623-08:00Post 002 - CYBR 510<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgW9spP4UHCmfnEWZ492WKFm_hplX8Ogn0IhRKPjcF2drUOm1H2bv-YU_yAII11i24853hxmiXge8vPVruI_KusHPLiPcGZNl142u9J1Xk45FcwQTU9Ezw_TKXAQgY8hUPIwRpKYwqz4WU/s1600/Roman_Numeral_Turquoise_01.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 59px; height: 122px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgW9spP4UHCmfnEWZ492WKFm_hplX8Ogn0IhRKPjcF2drUOm1H2bv-YU_yAII11i24853hxmiXge8vPVruI_KusHPLiPcGZNl142u9J1Xk45FcwQTU9Ezw_TKXAQgY8hUPIwRpKYwqz4WU/s400/Roman_Numeral_Turquoise_01.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5682444945090390530" /></a><br /><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyBeVeeqvMhbN9nHws2qvgG9hqztVK326_NwbkMZJ02HaW7hNY4HR-q-83Ou0mApz3-x1cTMhYHT0sppHhKogjI8ug7yYNlwl0_thSkjjnohzRa_wEaifDgILXMVBZAd3NHcTuIBpzQXw/s1600/Cybersecurity_Curriculum_CYBR_510.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 107px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyBeVeeqvMhbN9nHws2qvgG9hqztVK326_NwbkMZJ02HaW7hNY4HR-q-83Ou0mApz3-x1cTMhYHT0sppHhKogjI8ug7yYNlwl0_thSkjjnohzRa_wEaifDgILXMVBZAd3NHcTuIBpzQXw/s400/Cybersecurity_Curriculum_CYBR_510.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5682444948389423394" /></a><div style="text-align: left;"><br /></div><div><span class="Apple-style-span"><b>Week One Assignments</b></span></div><div><span class="Apple-style-span"> <span class="Apple-tab-span" style="white-space:pre"> </span>Week One Welcome Video</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">Click here to view the Week One Welcome Video.<span class="Apple-tab-span" style="white-space:pre"> </span></span></div><div><span class="Apple-style-span"> <span class="Apple-tab-span" style="white-space:pre"> </span>Week 1 Summary</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">Theme for the Week- Organizational Structure, Strategies, and Management Process</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">This week: </span></div><div><span class="Apple-style-span">•<span class="Apple-tab-span" style="white-space:pre"> </span>Security operations in the management environment;</span></div><div><span class="Apple-style-span">•<span class="Apple-tab-span" style="white-space:pre"> </span>Core competencies to initiate effective protection programs;</span></div><div><span class="Apple-style-span">•<span class="Apple-tab-span" style="white-space:pre"> </span>Report of the task force on private security.</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">Learning Objectives: </span></div><div><span class="Apple-style-span">•<span class="Apple-tab-span" style="white-space:pre"> </span>Identify and explain the general fundamentals and core competencies of a security program.</span></div><div><span class="Apple-style-span">•<span class="Apple-tab-span" style="white-space:pre"> </span>Evaluate the strategy of management and the security management process.</span></div><div><span class="Apple-style-span">•<span class="Apple-tab-span" style="white-space:pre"> </span>Assess organizational structures in relation to the security functions. <span class="Apple-tab-span" style="white-space:pre"> </span></span></div><div><span class="Apple-style-span"> <span class="Apple-tab-span" style="white-space:pre"> </span>Readings</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">Week 1 Reading Assignments</span></div><div><span class="Apple-style-span">•<span class="Apple-tab-span" style="white-space:pre"> </span>Security Operations Management, Chapter 1</span></div><div><span class="Apple-style-span">•<span class="Apple-tab-span" style="white-space:pre"> </span>Security Operations Management, Appendix C- Report of the Task Force of Private Security</span></div><div><span class="Apple-style-span">•<span class="Apple-tab-span" style="white-space:pre"> </span>Effective Physical Security, Chapter 6 - Physical Security<span class="Apple-tab-span" style="white-space:pre"> </span></span></div><div><span class="Apple-style-span"> <span class="Apple-tab-span" style="white-space:pre"> </span>Week 1 Discussion Post</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">On Week 1 Forum, post your response to one of the following questions:</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">•<span class="Apple-tab-span" style="white-space:pre"> </span>How do organizations today adapt to the needs of people who are in the field of security management? Do you agree with layers of management with this concept?</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">•<span class="Apple-tab-span" style="white-space:pre"> </span>Does it matter where security (physical and information) is located in the organizational chart? Thoroughly explain your reasoning.</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">•<span class="Apple-tab-span" style="white-space:pre"> </span>Does a person's or position's title make a difference? Explain if job title's for security change it's potential or real influence in an organization.</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">•<span class="Apple-tab-span" style="white-space:pre"> </span>Why is it important for security professionals to understand security management? Does understanding classical management theories help security professionals?</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">•<span class="Apple-tab-span" style="white-space:pre"> </span>Where is the optimal place for security in an organization? Where does security normally reside? If there's a difference, explain why. </span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">•<span class="Apple-tab-span" style="white-space:pre"> </span>Should information security be in the same department as physical security or should they be separate functions / roles? </span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">•<span class="Apple-tab-span" style="white-space:pre"> </span>Is there a difference between security roles/departments in for-profit organizations versus not-for-profit? Explain your answer and give examples of security in each.</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">•<span class="Apple-tab-span" style="white-space:pre"> </span>How does "outsourcing" affect current security practices?</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">Try not to pick a topic already discussed on the forum. Your answer should be 2-3 paragraphs in length with proper attention given to spelling and grammar. You can use the textbook and supplemental reading, but you should also include at least one Internet site that provides information on your topic. Once you have submitted your initial post, read each of your classmates' initial posts and respond to at least four of them. In your response, provide your comments and any additional information you might have. Remember to cite your sources.</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">Directions: Each student must respond to a minimum of four other students’ threaded discussion postings in a “substantive and meaningful” manner. Do not simply agree or disagree – provide a quality response that reflects critical thinking. To foster learning, “professional and constructive” criticism is encouraged when responding to your classmates.</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">The weekly discussion questions, to allow time for students to respond, must be answered by 6:00 p.m. on Sunday of each week. Please see the discussion evaluation section in the syllabus for detailed expectations and directions of how your discussion board postings and overall participation is evaluated. </span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">Reminders: Each student must respond to the weekly questions. Discussion postings should reflect some new or original information – do not just regurgitate data or opinion posted by previous students. The quality of your effort will be considered when grading discussion postings. </span></div><div><span class="Apple-style-span">This assignment is worth 100 points, weight: 48%.</span></div><div><span class="Apple-tab-span" style="white-space:pre"><span class="Apple-style-span"> </span></span></div><div><span class="Apple-style-span"> <span class="Apple-tab-span" style="white-space:pre"> </span>Week 1 Written Assignment</span></div><div><span class="Apple-style-span"> Discuss the organizational concerns a corporation has today when entering the mid-20th century with a different mindset of security and how it is to assist with that organization.</span></div><div><span class="Apple-style-span">Reminders: Students are required to submit assignments with a name, course name/number and page numbers on your assignments. Please double space your work, and re-state the question. Grading is facilitated when the assignment submission is well structured, and the questions (opposed to your answers) have been bolded. File Naming Convention: Students are required to submit assignments with their last name, followed by the week’s assignment; e.g. smith1.2. Microsoft Word documents only. Late submitters will be penalized.</span></div><div><span class="Apple-style-span">Weekly written assignments will be due by 11:59 p.m. CST on Sunday at the end of each week. Specific assignments will be posted each week throughout the course. Your grade will be predicated on the quality of your thinking and writing - NOT the length of your writing. Too many words are usually a sign of poor editing, and too few words are a sign of poor analysis. </span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">This assignment is worth 100 points, weight, 40%.</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span"> <span class="Apple-tab-span" style="white-space:pre"> </span>Week 1 Journal</span></div><div><span class="Apple-style-span">Each student will complete “weekly” entries into a well-organized journal that reflects how the weekly coursework (reading and assignment) and discussion has impacted their personal and professional lives. Essentially, the journal - akin to a personal diary, should capture the meaningful and significant aspects of the course which generated student analysis and thought. See the Journal Guidelines on the main Assignments page. Your weekly journal entry will be due by 11:59 p.m. CST on Sunday at the end of each week.</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">This assignment is worth 100 points, weight, 12%.</span></div>William Favre Slater, IIIhttp://www.blogger.com/profile/05247248094266294971noreply@blogger.com0tag:blogger.com,1999:blog-2656669920870314927.post-52101431266654233762011-11-27T16:11:00.000-08:002011-11-27T16:26:15.570-08:00Post 001 - CYBR 510<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0fd505-0Z_yq1lu-q-MDu8DpAOWOsQDHnDeGqkXs6OU1GhyI0k3cOYHE8ELiMb0q_tW-H5mD_uhR4ZYnnTC4Zo5wctVYoMJc2BHuUgkLE1Sm4phD9zWgIB11FTJJPzm4Nhx577mQd-KE/s1600/bellevue_university_ball_01.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 362px; height: 352px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0fd505-0Z_yq1lu-q-MDu8DpAOWOsQDHnDeGqkXs6OU1GhyI0k3cOYHE8ELiMb0q_tW-H5mD_uhR4ZYnnTC4Zo5wctVYoMJc2BHuUgkLE1Sm4phD9zWgIB11FTJJPzm4Nhx577mQd-KE/s400/bellevue_university_ball_01.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5679835830783511954" /></a><br /><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span"><b>Blog for CYBR 510 - Physical, Operations and Personnel Security - First Posting</b></span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">Hello, on the eve of the official start of CYBR 510 - Physical, Operations and Personnel Security taught online at Bellevue University in their 12-course M.S. in Cybersecurity program, I thought I would start this blog with the announcement that I intend to have a ball in this class. I just completed the CIS 608 - Information Security Management class and the CYBR 515 - Security Architecture and Design class.</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">I am already familiar with several concepts that will be covered in this class. Visit these three web pages and you will see what I mean:</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">My ISO 27001 web page: <a href="http://billslater.com/iso27001">http://billslater.com/iso27001</a></span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">My Data Center Manager Page: <a href="http://billslater.com/datacentermanager">http://billslater.com/datacentermanager</a></span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">My Career Page: <a href="http://billslater.com/career">http://billslater.com/career</a></span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span">So here's to a fun Winter 2012 Semester!</span></div><div><span class="Apple-style-span"><br /></span></div><div><span class="Apple-style-span"><br /></span></div><div><div><span class="Apple-style-span">===========</span></div></div><div><span class="Apple-style-span" style="font-size: 12px; "><span class="Apple-style-span"> </span></span></div><div> <p class="MsoNormal"><span class="Apple-style-span"><span style="font-size: 9pt; ">Bill<br /></span><span class="Apple-style-span" style="font-size: 12px; ">William Favre Slater, III<br /></span><span class="Apple-style-span" style="font-size: 11px; ">MBA, M.S., PMP, CISSP, SSCP, CISA, ISO 27002, ISO 20000, ITIL v3, Cloud Computing Foundation<br /></span><span class="Apple-style-span" style="font-size: x-small; ">CYBR 510 Blog: http://cybr510.blogspot.com<br /></span><span class="Apple-style-span" style="font-size: 11px; ">http://billslater.com/career<br /></span><span class="Apple-style-span" style="font-size: 11px; ">Chicago, IL<br /></span><span class="Apple-style-span" style="font-size: 11px; ">United States of America</span></span></p></div>William Favre Slater, IIIhttp://www.blogger.com/profile/05247248094266294971noreply@blogger.com0