LEG 100 WEEK 8 Discussion
Please respond to the following:
- Review the article / video below, which sets the stage for your discussion response.
- Did Target ignore data breach warnings? (2:55)
- Based on the video, did the company presented in the video allow a breach of security based on the laws and ideas discussed in the text? Why or why not? What was done to help remedy the situation, and was it enough based on the legal standard? What legal steps should the company take (or should the company have taken) to avoid personal identity or information from being compromised? Be sure to support your response.
Please respond to the following:
- Review the article / video below, which sets the stage for your discussion response.
- Did Target ignore data breach warnings? (2:55)
- Based on the video, did the company presented in the video allow a breach of security based on the laws and ideas discussed in the text? Why or why not? What was done to help remedy the situation, and was it enough based on the legal standard? What legal steps should the company take (or should the company have taken) to avoid personal identity or information from being compromised? Be sure to support your response.
Please respond to the following:
- Review the article / video below, which sets the stage for your discussion response.
- Did Target ignore data breach warnings? (2:55)
- Based on the video, did the company presented in the video allow a breach of security based on the laws and ideas discussed in the text? Why or why not? What was done to help remedy the situation, and was it enough based on the legal standard? What legal steps should the company take (or should the company have taken) to avoid personal identity or information from being compromised? Be sure to support your response.
Please respond to the following:
- Review the article / video below, which sets the stage for your discussion response.
- Did Target ignore data breach warnings? (2:55)
- Based on the video, did the company presented in the video allow a breach of security based on the laws and ideas discussed in the text? Why or why not? What was done to help remedy the situation, and was it enough based on the legal standard? What legal steps should the company take (or should the company have taken) to avoid personal identity or information from being compromised? Be sure to support your response.
Please respond to the following:
- Review the article / video below, which sets the stage for your discussion response.
- Did Target ignore data breach warnings? (2:55)
- Based on the video, did the company presented in the video allow a breach of security based on the laws and ideas discussed in the text? Why or why not? What was done to help remedy the situation, and was it enough based on the legal standard? What legal steps should the company take (or should the company have taken) to avoid personal identity or information from being compromised? Be sure to support your response.
No comments:
Post a Comment
Note: only a member of this blog may post a comment.