Thursday, 24 August 2017

LEG 100 WEEK 8 Discussion

LEG 100 WEEK 8 Discussion


Please respond to the following:
  • Review the article / video below, which sets the stage for your discussion response.

    • Did Target ignore data breach warnings? (2:55)
  • Based on the video, did the company presented in the video allow a breach of security based on the laws and ideas discussed in the text? Why or why not? What was done to help remedy the situation, and was it enough based on the legal standard? What legal steps should the company take (or should the company have taken) to avoid personal identity or information from being compromised? Be sure to support your response.
Please respond to the following:
  • Review the article / video below, which sets the stage for your discussion response.

    • Did Target ignore data breach warnings? (2:55)
  • Based on the video, did the company presented in the video allow a breach of security based on the laws and ideas discussed in the text? Why or why not? What was done to help remedy the situation, and was it enough based on the legal standard? What legal steps should the company take (or should the company have taken) to avoid personal identity or information from being compromised? Be sure to support your response.


























Please respond to the following:
  • Review the article / video below, which sets the stage for your discussion response.

    • Did Target ignore data breach warnings? (2:55)
  • Based on the video, did the company presented in the video allow a breach of security based on the laws and ideas discussed in the text? Why or why not? What was done to help remedy the situation, and was it enough based on the legal standard? What legal steps should the company take (or should the company have taken) to avoid personal identity or information from being compromised? Be sure to support your response.
Please respond to the following:
  • Review the article / video below, which sets the stage for your discussion response.

    • Did Target ignore data breach warnings? (2:55)
  • Based on the video, did the company presented in the video allow a breach of security based on the laws and ideas discussed in the text? Why or why not? What was done to help remedy the situation, and was it enough based on the legal standard? What legal steps should the company take (or should the company have taken) to avoid personal identity or information from being compromised? Be sure to support your response.
Please respond to the following:
  • Review the article / video below, which sets the stage for your discussion response.

    • Did Target ignore data breach warnings? (2:55)
  • Based on the video, did the company presented in the video allow a breach of security based on the laws and ideas discussed in the text? Why or why not? What was done to help remedy the situation, and was it enough based on the legal standard? What legal steps should the company take (or should the company have taken) to avoid personal identity or information from being compromised? Be sure to support your response.

No comments:

Post a Comment

Note: only a member of this blog may post a comment.

FIN 317 Financing an Expansion Assignment

  FIN 317 Financing an Expansion Assignment   Financing an Expansion Overview After 12 years, your business is wildly successful, with multi...