information

What laws have been violated?

 What do you think contributed to the problems that could lead to a violation of these laws? 

What are the implications to the individual and organization of these violations?

What are some security controls and mitigation strategies for handling future violations? (Name three to five.) 

 How does privacy law differ from information systems security?