FOLLOW THESE INSTRUCTIONS DEMONSTRATED UNDERSTANDING Foundational legal principles, materials discussed in the class Use relevant legal categories, proper subject matter Basic legal concepts involved

If you are looking for affordable, custom-written, high-quality, and non-plagiarized papers, your student life just became easier with us. We are the ideal place for all your writing needs.


Order a Similar Paper Order a Different Paper

FOLLOW THESE INSTRUCTIONS

DEMONSTRATED UNDERSTANDING

Foundational legal principles, materials discussed in the class

Use relevant legal categories, proper subject matter

Basic legal concepts involved correctly used

ARGUMENT

Explanation of the topic, development of the thesis and conclusion

Development of the argument

Thoroughness of discussion, acknowledgement / treatment of counter arguments

Use of research to support

FOLLOW THESE INSTRUCTIONS DEMONSTRATED UNDERSTANDING Foundational legal principles, materials discussed in the class Use relevant legal categories, proper subject matter Basic legal concepts involved
QUESTIO NS 1) What is the guidance of the Supreme Court of Canada in the R. v. Cole decision about the role that an organiza tion’s computer use policy may play in the assessment of whether there is a reasonable expecta tion of privacy in a work la ptop computer where employees are permi tted to use the laptop computer for some personal ma tters? What do you recommend by done be an organiza tion to address this situa tion? 2) Review and cri tique the different decisions of the Supreme Court Jus tices in R. v. Mills in light of the previous Supreme Court decisions that we have discussed. Advise which decision(s) you agree with, if any, and why. 3) Set out in detail the steps that a Court would be likely to look at in con sidering whether a seizure or search of an electronic device gives rise to a breach of sec4on 8 of the Charter of Rights and Freedoms. Following this, describe the steps that a Court would look at to consider whether or not to exclude admission of the evid ence under sec4on 24 of the Charter of Rights and Freedoms. 4) You are the IT systems security manager. It is 3 am in the morning. The CEO just called you. Your company has suffered a cyber breach. What steps should you take? 5) You are the IT systems securi ty manager. Your organiza4on in based in Edmonton but does share some employee data with a benefits service provider in Toronto. A breach has occurred affec4ng both customers and employee informa4on held by your organiza4on. Discuss and contrast your organ iza4on’s obliga4ons to report a breach under Alberta’s Personal Informa3on Protec3on Act (PIPA) and under the federal Personal Informa3on Protec3on Electronic Documents Act (PIPEDA). Discuss the circumstances when the company is subject to report a breach under each of these laws and the variables that may arise in making the assessment. 6) You are the IT systems security manager. The CEO just called you. Your company has suffered a cyber breach in which company data has been encrypted using strong encryp4on . Without the data the company can not con4nue to operate. The criminals demand that the company pay a ransom of 60 bitcoin in 48 hours. What should the organiza4on do to mi4gate the risks? What is your advice to the CEO on whether to pay the ransom and wh at factors support your advice?

Are you stuck with another assignment? Use our paper writing service to score better grades and meet your deadlines. We are here to help!


Order a Similar Paper Order a Different Paper
Writerbay.net