M4A2: Lab: Identifying the Scope of Your States Data and Security Breach Notification Law

Introduction

The United States does not have a unified data privacy law at the national level as, for example, many countries in Europe do. Laws such as the Health Insurance Portability and Accountability Act (HIPAA) and Gramm-Leach-Bliley Act (GLBA) are comprehensive and effective, but only protect consumers in a single industry.

So, what if an individuals private data is subjected to a security breach not covered by HIPAA or GLBA? Without an overarching federal mandate in effect, a company that discovered its data had been compromised is not compelled to notify all the affected individuals. Notification, and possible liability to provide identity theft protection, comes only in laws including mandated security breach notifications. To bridge the gap in privacy protection, most states have enacted their own privacy laws.

With the help of the Internet, you can research these gaps and find out what your state does to protect your privacy. For instance, the purpose of the National Conference of State Legislatures (NCSL) is, according to its Web site, to provide access to current state and federal legislation and a comprehensive list of state documents, including state statutes, constitutions, legislative audits, and research reports.

Instruction

In this lab, you will review the data security breach notification laws for your state and you will assess the scope and depth of the privacy protection rights of a citizen in your state.

Currently, 47 states, the District of Columbia, Guam, Puerto Rico, and the Virgin Islands have data and security breach notification laws that define what organizations must do if they have had data or security breached that impact citizen privacy data. The National Conference of State Legislatures (NCSL) Web site tracks and organizes telecommunication and information technology state legislation.

Step by Step Instructions:

    Go to NCSL Web site and review data and security breach notification laws for each state https://www.ncsl.org/research/telecommunications-and-information-technology/security-breach-notification-laws.aspx.
    Find Virginias Notification Laws to get started. Open the attached document for steps by steps instruction.
    Click the Back button on your browser (or, if the Va. Code link opened a new window, close that window).
    After you have returned to the list of states, scroll to find your state.
    Review the Breach of personal information notification law.
    Click and download the security breach notification laws for your state. If you cannot download your states security breach laws, return to the state of Virginia and use that information to complete this lab.

Deliverables:

Review and analyze your states security breach laws and include the following in your Lab Report File:

    Relate state government data security breach notification laws to individual privacy. Explain why state governments have data security breach notification laws.
    Find a specific states data and security breach notification law.
    Download a copy of a specific states data and security breach notification law.
    Assess the scope and depth of the privacy protection rights of a citizen of any particular state.

Odyssey

Odysseus is ever described as a man of many wiles, and he often lies.  Is it possible to make sense out of the narrative of the Odyssey if we were to assume that every supernatural adventure Odysseus narrates in the Great Wanderings (Books 9-12) is a lie?  Are there any elements of those stories that are vouched for by “Homer” as the narrator of the Odyssey?  Conversely, in the sections of the later books, when we as readers know that Odysseus is lying to Eumaios, Euryclea, and Penelope about his identity, his stories are totally devoid of all fairy-tale elements, and are completely plausible, though in fact false. Can you work out any consistent standard to judge when Odysseus is telling the truth and when he may be lying?  And in a different, though related direction, when, in Book 24, Odysseus encounters his father Laertes, there is no longer any danger, and no longer any need for Odysseus to be careful or deceitful;  why then does the bard make Odysseus decide to lie to his father?

Short Paper: Analysis of the Breach Notification Law Letter

Required Resources

    Complete the Module Notes: Federal and State Laws on Information Security and Breach Notification

Assignment Requirements

Using the library and other available Internet sources, search for an example of an official breach notification letter. Analyze the notification letter. Write a summary of your findings. The summary must include:

    The specific laws alleged to have been violated in the breach notification letter
    The roles/responsibilities each department possesses in relation to the breach based on your state-specific data breach policy
    An appropriate response to the specific breach notification letter to be sent to the victims of the data breach

Argonautika, Jason

In his celebrated essay Short on Heroics, the classicist J.F. Carspecken states that Jason is chosen leader because his superior declines the honour, subordinate to his comrades, except once, in every trial of strength, skill or courage, a great warrior only with the help of magical charms, jealous of honour but incapable of asserting it, passive in the face of crisis, timid and confused before trouble, tearful at insult, easily despondent, gracefully treacherous in his dealings with the love-sick Medea.
Such a reading of Jason’s character prompts one to question just what a hero is.  We have seen several different examples of them throughout our reading, yet Apollonius Argonautica clearly challenges these pre-existing notions both of what heroic conduct is and how heroic character is revealed.  How then does the heroism of Jason stand in relationship to that of, say, Odysseus?  How does it stand to that of Heracles?  How do these different characters reveal their heroic character, and what might Apollonius be suggesting about his own times by his obviously deliberate challenge to these norms?