Family Educational Rights and Privacy Act (FERPA).

 

Choose one of the following regulatory frameworks and discuss in detail its impacts on a particular enterprise or organization, ideally based on your own personal or professional experience.

Focus your discussion on how compliance with the regulation drove (or could drive) the design of network modification or the deployment of a security control. Alternately, you can discuss a case of regulatory noncompliance and its consequences. Consider the following:

Family Educational Rights and Privacy Act (FERPA).
Federal Information Security Management Act (FISMA)
Gramm–Leach–Bliley Act (GLBA).
Health Insurance Portability and Accountability Act (HIPAA).
Payment Card Industry Data Security Standard (PCI DSS).
Sarbanes–Oxley Act (SOX).
Another of your choosing.

Sample Solution

The Family Educational Rights and Privacy Act (FERPA) is a federal law that protects the privacy of student education records. It is applicable to any school that receives funding from the US Department of Education and applies to all educational institutions such as public schools, private schools, universities and colleges (U.S. Department of Education 2020). As part of compliance with this regulation, organizations must ensure they have adequate policies in place when it comes to collecting, managing, storing and disclosing student data.

I was personally involved in a project where my team had to design network modifications for an institution’s IT infrastructure in order to comply with FERPA regulations. In particular, we had to create access control lists which restricted access only to authorized personnel based on their roles within the organization (Bell et al., 2019). Additionally ,we also implemented security controls such as multi-factor authentication for accessing sensitive information pertaining to students’ educational records thereby decreasing the risk of unauthorised disclosure or use (U.S. Department of Education 2020).

Another key element was increasing visibility into data protection activities by creating audit trails which monitored user behavior when accessing highly confidential information . This step allowed our team greater oversight into any security incidents which may occur while simultaneously providing traceability if there were ever any violations in terms of regulatory noncompliance (Hassan et al., 2018).

Overall , complying with FERPA requires organizations invest a significant amount efforts related developing new policies in addition deploying additional security measures aimed at protecting students’ personal information.

In addition, Vittola expresses the extent of military tactics used, but never reaches a conclusion whether it’s lawful or not to proceed these actions, as he constantly found a middle ground, where it can be lawful to do such things but never always (Begby et al (2006b), Page 326-31). This is supported by Frowe, who measures the legitimate tactics according to proportionality and military necessity. It depends on the magnitude of how much damage done to one another, in order to judge the actions after a war. For example, one cannot simply nuke the terrorist groups throughout the middle-east, because it is not only proportional, it will damage the whole population, an unintended consequence. More importantly, the soldiers must have the right intention in what they are going to achieve, sacrificing the costs to their actions. For example: if soldiers want to execute all prisoners of war, they must do it for the right intention and for a just cause, proportional to the harm done to them. This is supported by Vittola: ‘not always lawful to execute all combatants…we must take account… scale of the injury inflicted by the enemy.’ This is further supported by Frowe approach, which is a lot more moral than Vittola’s view but implies the same agendas: ‘can’t be punished simply for fighting.’ This means one cannot simply punish another because they have been a combatant. They must be treated as humanely as possible. However, the situation is escalated if killing them can lead to peace and security, within the interests of all parties.
Overall, jus in bello suggests in wars, harm can only be used against combatants, never against the innocent. But in the end, the aim is to establish peace and security within the commonwealth. As Vittola’s conclusion: ‘the pursuit of justice for which he fights and the defence of his homeland’ is what nations should be fighting for in wars (Begby et al (2006b), Page 332). Thus, although today’s world has developed, we can see not much different from the modernist accounts on warfare and the traditionists, giving another section of the theory of the just war. Nevertheless, we can still conclude that there cannot be one definitive theory of the just war theory because of its normativity.

This question has been answered.

Get Answer
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, Welcome to Compliant Papers.