{"id":12265,"date":"2024-02-20T05:04:02","date_gmt":"2024-02-20T05:04:02","guid":{"rendered":"https:\/\/www.writemyessays.app\/blog\/questions\/compliance-legal-requirements-security-awareness-training-and-education-sate-ethical-issues-for-cybersecurity\/"},"modified":"2024-02-20T05:04:02","modified_gmt":"2024-02-20T05:04:02","slug":"compliance-legal-requirements-security-awareness-training-and-education-sate-ethical-issues-for-cybersecurity","status":"publish","type":"questions","link":"https:\/\/www.writemyessays.app\/blog\/questions\/compliance-legal-requirements-security-awareness-training-and-education-sate-ethical-issues-for-cybersecurity\/","title":{"rendered":"Compliance Legal Requirements , Security Awareness Training and Education (SATE) , Ethical Issues for Cybersecurity"},"content":{"rendered":"<section style=\"margin-bottom: 30px; cursor: auto; color: inherit;\">\n<div style=\"margin-bottom: 20px; font-size: 22px; line-height: 1.1; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">COMPETENCIES<\/div>\n<hr style=\"cursor: auto; color: inherit;\"><\/div>\n<div style=\"margin-left: 30px; margin-right: 30px; cursor: auto; color: inherit;\">\n<p style=\"cursor: auto; color: inherit;\"><span style=\"font-weight: 700; cursor: auto; color: inherit;\">4045.1.1<\/span><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>:<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><span style=\"margin-left: 5px; font-weight: 700; cursor: auto; color: inherit;\">Compliance Legal Requirements<\/span><\/p>\n<p style=\"margin-bottom: 10px; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">The graduate describes the legal requirements to address compliance with cybersecurity policies and procedures with an organization.<\/span><\/p>\n<\/div>\n<div style=\"margin-left: 30px; margin-right: 30px; cursor: auto; color: inherit;\">\n<p style=\"cursor: auto; color: inherit;\"><span style=\"font-weight: 700; cursor: auto; color: inherit;\">4045.1.3<\/span><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>:<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><span style=\"margin-left: 5px; font-weight: 700; cursor: auto; color: inherit;\">Security Awareness Training and Education (SATE)<\/span><\/p>\n<p style=\"margin-bottom: 10px; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">The graduate outlines legal issues that should be included within the security awareness training and education (SATE) program of an organization.<\/span><\/p>\n<\/div>\n<div style=\"margin-left: 30px; margin-right: 30px; cursor: auto; color: inherit;\">\n<p style=\"cursor: auto; color: inherit;\"><span style=\"font-weight: 700; cursor: auto; color: inherit;\">4045.1.4<\/span><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>:<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><span style=\"margin-left: 5px; font-weight: 700; cursor: auto; color: inherit;\">Ethical Issues for Cybersecurity<\/span><\/p>\n<p style=\"margin-bottom: 10px; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">The graduate discusses the implications of ethical issues for specific cybersecurity actions within an organization.<\/span><\/p>\n<\/div>\n<\/section>\n<section style=\"margin-bottom: 30px; cursor: auto; color: inherit;\">\n<div style=\"margin-bottom: 20px; font-size: 22px; line-height: 1.1; cursor: auto; color: inherit;\"><a style=\"cursor: auto;\"><\/a><\/p>\n<div style=\"cursor: auto; color: inherit;\">INTRODUCTION<\/div>\n<hr style=\"cursor: auto; color: inherit;\"><\/div>\n<div style=\"margin-left: 30px; margin-right: 30px; cursor: auto; color: inherit;\">Information security professionals must understand how to apply ethical security principles and processes to their organizations. These standards should define the organization\u2019s specific needs and demands to assure data confidentiality, integrity, and availability. An organization\u2019s employees must be aware of the security challenges it is facing.<br style=\"cursor: auto; color: inherit;\"><br style=\"cursor: auto; color: inherit;\">In this task, you will analyze ethical challenges related to information security and develop a training plan for an organization, which will raise awareness of these challenges, convey strategies, and prevent unwanted developments.<\/div>\n<\/section>\n<section style=\"margin-bottom: 30px; cursor: auto; color: inherit;\">\n<div style=\"margin-bottom: 20px; font-size: 22px; line-height: 1.1; cursor: auto; color: inherit;\"><a style=\"cursor: auto;\"><\/a><\/p>\n<div style=\"cursor: auto; color: inherit;\">SCENARIO<\/div>\n<hr style=\"cursor: auto; color: inherit;\"><\/div>\n<div style=\"margin-left: 30px; margin-right: 30px; cursor: auto; color: inherit;\">Review the attached \u201cTechFite Case Study\u201d for information on the company being investigated. You should base your responses on this scenario.<\/div>\n<\/section>\n<section style=\"margin-bottom: 30px; cursor: auto; color: inherit;\">\n<div style=\"margin-bottom: 20px; font-size: 22px; line-height: 1.1; cursor: auto; color: inherit;\"><a style=\"cursor: auto;\"><\/a><\/p>\n<div style=\"cursor: auto; color: inherit;\">REQUIREMENTS<\/div>\n<hr style=\"cursor: auto; color: inherit;\"><\/div>\n<div style=\"margin-left: 30px; margin-right: 30px; cursor: auto; color: inherit;\">\n<p style=\"cursor: auto; color: inherit;\"><em style=\"cursor: auto; color: inherit;\">Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly.&nbsp;<\/em><em style=\"cursor: auto; color: inherit;\">The similarity report that is provided when you submit your task can be used as a guide.<\/em><\/p>\n<p style=\"cursor: auto; color: inherit;\"><em style=\"cursor: auto; color: inherit;\">&nbsp;<\/em><\/p>\n<p style=\"cursor: auto; color: inherit;\"><em style=\"cursor: auto; color: inherit;\">You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.<\/em><\/p>\n<p style=\"cursor: auto; color: inherit;\"><em style=\"cursor: auto; color: inherit;\">&nbsp;<\/em><\/p>\n<p style=\"cursor: auto; color: inherit;\"><em style=\"cursor: auto; color: inherit;\">Tasks may<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">not<\/strong><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).<\/em><\/p>\n<p style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"margin: 0in 0in 0pt 0.25in; cursor: auto; color: inherit;\">A. &nbsp;Address ethical issues for cybersecurity by doing the following:<\/p>\n<p style=\"margin: 0in 0in 0pt 0.47in; cursor: auto; color: inherit;\">1. &nbsp;Discuss the ethical guidelines or standards relating to information security that should apply to the case study.<\/p>\n<p style=\"margin: 0in 0in 0pt 57px; cursor: auto; color: inherit;\">a. &nbsp;Justify your reasoning.<\/p>\n<p style=\"margin: 0in 0in 0pt 0.47in; cursor: auto; color: inherit;\">2. &nbsp;Identify the behaviors, or omission of behaviors, of the people who fostered the unethical practices.&nbsp;<\/p>\n<p style=\"margin: 0in 0in 0pt 0.47in; cursor: auto; color: inherit;\">3. &nbsp;Discuss what factors at TechFite led to lax ethical behavior.<br style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"margin: 0in 0in 0pt 0.25in; cursor: auto; color: inherit;\">B. &nbsp;Describe ways to mitigate problems and build security awareness by doing the following:<\/p>\n<p style=\"margin: 0in 0in 0pt 0.47in; cursor: auto; color: inherit;\">1. &nbsp;Describe<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><strong style=\"font-weight: bold; cursor: auto; color: inherit;\">two<\/strong><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>information security policies that may have prevented or reduced the criminal activity, deterred the negligent acts, and decreased the threats to intellectual property.&nbsp;<\/p>\n<p style=\"margin: 0in 0in 0pt 0.47in; cursor: auto; color: inherit;\">2. &nbsp;Describe the key components of a Security Awareness Training and Education (SATE) program that could be implemented at TechFite.<\/p>\n<p style=\"margin: 0in 0in 0pt 57px; cursor: auto; color: inherit;\">a. &nbsp;Explain how the SATE program will be communicated to TechFite employees.<\/p>\n<p style=\"margin: 0in 0in 0pt 57px; cursor: auto; color: inherit;\">b. &nbsp;Justify the SATE program\u2019s relevance to mitigating the undesirable behaviors at TechFite.<br style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"margin: 0in 0in 0pt 0.25in; cursor: auto; color: inherit;\">C. &nbsp;Prepare a summary directed to senior management (<em style=\"cursor: auto; color: inherit;\">suggested length of 1\u20132 paragraphs<\/em>) that states TechFite\u2019s ethical issues from Part A and the related mitigation strategies from Part B.<br style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"margin: 0in 0in 0pt 0.25in; cursor: auto; color: inherit;\">D. &nbsp;Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.<br style=\"cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"margin: 0in 0in 0pt 0.25in; cursor: auto; color: inherit;\">E. &nbsp;Demonstrate professional communication in the content and presentation of your submission.<\/p>\n<\/div>\n<div style=\"margin-left: 10px; margin-top: 20px; margin-bottom: 20px; font-weight: 700; line-height: 1.1; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">File Restrictions<\/div>\n<\/div>\n<div style=\"margin-left: 20px; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">File name may contain only letters, numbers, spaces, and these symbols: ! &#8211; _ . * &#8216; ( )<\/span><br style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">File size limit: 200 MB<\/span><br style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">File types allowed: doc, docx, rtf, xls, xlsx, ppt, pptx, odt, pdf, csv, txt, qt, mov, mpg, avi, mp3, wav, mp4, wma, flv, asf, mpeg, wmv, m4v, svg, tif, tiff, jpeg, jpg, gif, png, zip, rar, tar, 7z<\/span><br style=\"cursor: auto; color: inherit;\"><\/div>\n<\/section>\n<section style=\"margin-bottom: 30px; cursor: auto; color: inherit;\">\n<div style=\"margin-bottom: 20px; font-size: 22px; line-height: 1.1; cursor: auto; color: inherit;\"><a style=\"cursor: auto;\"><\/a><\/p>\n<div style=\"cursor: auto; color: inherit;\">RUBRIC<\/div>\n<hr style=\"cursor: auto; color: inherit;\"><\/div>\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"margin-top: 5px; margin-bottom: 5px; padding-top: 17px; font-weight: bold; font-size: 10px; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">A1<\/span><span style=\"cursor: auto; color: inherit;\">:<\/span><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">DISCUSSION OF ETHICAL GUIDELINES OR STANDARDS<\/span><\/span><\/div>\n<div style=\"margin-bottom: 5px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<table style=\"cursor: auto; color: inherit;\">\n<tbody style=\"cursor: auto; color: inherit;\">\n<tr style=\"cursor: auto; color: inherit;\">\n<td style=\"padding: 0px 15px 0px 10px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">NOT EVIDENT<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">A discussion of the ethical guidelines or standards relating to information security that should apply to the case study is not provided.<\/span><\/p>\n<\/div>\n<\/td>\n<td style=\"padding-right: 15px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">APPROACHING COMPETENCE<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">The discussion illogically addresses the ethical guidelines or standards relating to information security that should apply to the case study, or it is unclear how the ethical guidelines or standards relate to the case study.<\/span><\/p>\n<\/div>\n<\/td>\n<td style=\"padding-right: 10px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">COMPETENT<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">The discussion logically addresses the ethical guidelines or standards relating to information security that should apply to the case study.<\/span><\/p>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"margin-top: 5px; margin-bottom: 5px; padding-top: 17px; font-weight: bold; font-size: 10px; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">A1A<\/span><span style=\"cursor: auto; color: inherit;\">:<\/span><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">JUSTIFICATION OF STANDARDS OR GUIDELINES<\/span><\/span><\/div>\n<div style=\"margin-bottom: 5px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<table style=\"cursor: auto; color: inherit;\">\n<tbody style=\"cursor: auto; color: inherit;\">\n<tr style=\"cursor: auto; color: inherit;\">\n<td style=\"padding: 0px 15px 0px 10px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">NOT EVIDENT<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">A justification of the reasoning of the ethical considerations or guidelines is not provided.<\/span><\/p>\n<\/div>\n<\/td>\n<td style=\"padding-right: 15px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">APPROACHING COMPETENCE<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">The justification illogically addresses the reasoning of the ethical considerations or guidelines.<\/span><\/p>\n<\/div>\n<\/td>\n<td style=\"padding-right: 10px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">COMPETENT<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">The justification logically addresses the reasoning of the ethical considerations or guidelines.<\/span><\/p>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"margin-top: 5px; margin-bottom: 5px; padding-top: 17px; font-weight: bold; font-size: 10px; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">A2<\/span><span style=\"cursor: auto; color: inherit;\">:<\/span><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">DESCRIPTION OF UNETHICAL BEHAVIORS<\/span><\/span><\/div>\n<div style=\"margin-bottom: 5px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<table style=\"cursor: auto; color: inherit;\">\n<tbody style=\"cursor: auto; color: inherit;\">\n<tr style=\"cursor: auto; color: inherit;\">\n<td style=\"padding: 0px 15px 0px 10px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">NOT EVIDENT<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">The unethical behavior of individuals or groups is not identified.<\/span><\/p>\n<\/div>\n<\/td>\n<td style=\"padding-right: 15px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">APPROACHING COMPETENCE<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">The identification of unethical behavior of individuals or groups is inaccurate.<\/span><\/p>\n<\/div>\n<\/td>\n<td style=\"padding-right: 10px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">COMPETENT<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">The identification of the unethical behavior of individuals or groups is accurate.<\/span><\/p>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"margin-top: 5px; margin-bottom: 5px; padding-top: 17px; font-weight: bold; font-size: 10px; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">A3<\/span><span style=\"cursor: auto; color: inherit;\">:<\/span><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">FACTORS<\/span><\/span><\/div>\n<div style=\"margin-bottom: 5px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<table style=\"cursor: auto; color: inherit;\">\n<tbody style=\"cursor: auto; color: inherit;\">\n<tr style=\"cursor: auto; color: inherit;\">\n<td style=\"padding: 0px 15px 0px 10px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">NOT EVIDENT<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">A discussion of the factors at TechFite that led to lax ethical behavior is not provided.<\/span><\/p>\n<\/div>\n<\/td>\n<td style=\"padding-right: 15px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">APPROACHING COMPETENCE<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">The discussion of the factors at TechFite that led to lax ethical behavior is unclear or illogical.<\/span><\/p>\n<\/div>\n<\/td>\n<td style=\"padding-right: 10px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">COMPETENT<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">The discussion of the factors at TechFite that led to lax ethical behavior is clear and logical.<\/span><\/p>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"margin-top: 5px; margin-bottom: 5px; padding-top: 17px; font-weight: bold; font-size: 10px; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">B1<\/span><span style=\"cursor: auto; color: inherit;\">:<\/span><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">INFORMATION SECURITY POLICIES<\/span><\/span><\/div>\n<div style=\"margin-bottom: 5px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<table style=\"cursor: auto; color: inherit;\">\n<tbody style=\"cursor: auto; color: inherit;\">\n<tr style=\"cursor: auto; color: inherit;\">\n<td style=\"padding: 0px 15px 0px 10px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">NOT EVIDENT<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">A description of 2 information security policies that may have minimized the criminal activity, negligent acts, and threats to intellectual property is not provided.<\/span><\/p>\n<\/div>\n<\/td>\n<td style=\"padding-right: 15px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">APPROACHING COMPETENCE<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">A description of 2 information security policies that may have minimized the criminal activity, negligent acts, and threats to intellectual property is provided, but<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><em style=\"cursor: auto; color: inherit;\">at least<\/em><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>1 of the policies is not relevant or applicable to the case study.<\/span><\/p>\n<\/div>\n<\/td>\n<td style=\"padding-right: 10px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">COMPETENT<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">The description addresses 2 information security policies, specific to the case study that may have minimized the criminal activity, negligent acts, and threats to intellectual property.<\/span><\/p>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"margin-top: 5px; margin-bottom: 5px; padding-top: 17px; font-weight: bold; font-size: 10px; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">B2<\/span><span style=\"cursor: auto; color: inherit;\">:<\/span><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">SATE KEY COMPONENTS<\/span><\/span><\/div>\n<div style=\"margin-bottom: 5px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<table style=\"cursor: auto; color: inherit;\">\n<tbody style=\"cursor: auto; color: inherit;\">\n<tr style=\"cursor: auto; color: inherit;\">\n<td style=\"padding: 0px 15px 0px 10px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">NOT EVIDENT<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">A description of key components of a SATE program is not provided.<\/span><\/p>\n<\/div>\n<\/td>\n<td style=\"padding-right: 15px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">APPROACHING COMPETENCE<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">The description of key components of a SATE program that could be implemented at TechFite is not relevant or applicable to the case study.<\/span><\/p>\n<\/div>\n<\/td>\n<td style=\"padding-right: 10px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">COMPETENT<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">The description of key components of a SATE program that could be implemented at TechFite is relevant and applicable to the case study.<\/span><\/p>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"margin-top: 5px; margin-bottom: 5px; padding-top: 17px; font-weight: bold; font-size: 10px; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">B2A<\/span><span style=\"cursor: auto; color: inherit;\">:<\/span><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">SATE COMMUNICATION<\/span><\/span><\/div>\n<div style=\"margin-bottom: 5px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<table style=\"cursor: auto; color: inherit;\">\n<tbody style=\"cursor: auto; color: inherit;\">\n<tr style=\"cursor: auto; color: inherit;\">\n<td style=\"padding: 0px 15px 0px 10px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">NOT EVIDENT<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">An explanation of how the SATE program will be communicated to TechFite employees is not provided.<\/span><\/p>\n<\/div>\n<\/td>\n<td style=\"padding-right: 15px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">APPROACHING COMPETENCE<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">The explanation of how the SATE program will be communicated to TechFite employees is illogical.<\/span><\/p>\n<\/div>\n<\/td>\n<td style=\"padding-right: 10px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">COMPETENT<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">The explanation of how the SATE program will be communicated to TechFite employees is logical.<\/span><\/p>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"margin-top: 5px; margin-bottom: 5px; padding-top: 17px; font-weight: bold; font-size: 10px; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">B2B<\/span><span style=\"cursor: auto; color: inherit;\">:<\/span><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">SATE RELEVANCE<\/span><\/span><\/div>\n<div style=\"margin-bottom: 5px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<table style=\"cursor: auto; color: inherit;\">\n<tbody style=\"cursor: auto; color: inherit;\">\n<tr style=\"cursor: auto; color: inherit;\">\n<td style=\"padding: 0px 15px 0px 10px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">NOT EVIDENT<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">A justification of the SATE program\u2019s relevance to mitigating the undesirable behaviors at TechFite is not provided.<\/span><\/p>\n<\/div>\n<\/td>\n<td style=\"padding-right: 15px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">APPROACHING COMPETENCE<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">The justification of the SATE program\u2019s relevance to mitigating the undesirable behaviors at TechFite is illogical.<\/span><\/p>\n<\/div>\n<\/td>\n<td style=\"padding-right: 10px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">COMPETENT<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">The justification of the SATE program\u2019s relevance to mitigating the undesirable behaviors at TechFite is logical.<\/span><\/p>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"margin-top: 5px; margin-bottom: 5px; padding-top: 17px; font-weight: bold; font-size: 10px; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">C<\/span><span style=\"cursor: auto; color: inherit;\">:<\/span><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">CHALLENGES AND STRATEGIES SUMMARY<\/span><\/span><\/div>\n<div style=\"margin-bottom: 5px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<table style=\"cursor: auto; color: inherit;\">\n<tbody style=\"cursor: auto; color: inherit;\">\n<tr style=\"cursor: auto; color: inherit;\">\n<td style=\"padding: 0px 15px 0px 10px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">NOT EVIDENT<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">A summary directed to senior management that states TechFite\u2019s ethical issues and the related mitigation strategies is not provided.<\/span><\/p>\n<\/div>\n<\/td>\n<td style=\"padding-right: 15px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">APPROACHING COMPETENCE<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">A summary directed to senior management that states TechFite\u2019s ethical issues and the related mitigation strategies is provided, but the summary is not complete or does not align with the information provided in Parts A and B.<\/span><\/p>\n<\/div>\n<\/td>\n<td style=\"padding-right: 10px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">COMPETENT<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">A complete summary directed to senior management that states TechFite\u2019s ethical issues and the related mitigation strategies is provided, and the summary aligns with the information provided in Parts A and B.<\/span><\/p>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"margin-top: 5px; margin-bottom: 5px; padding-top: 17px; font-weight: bold; font-size: 10px; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">D<\/span><span style=\"cursor: auto; color: inherit;\">:<\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">SOURCES<\/span><span style=\"margin-left: 5px; cursor: auto; color: inherit;\"><\/span><\/a><\/div>\n<div style=\"margin-bottom: 5px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<table style=\"cursor: auto; color: inherit;\">\n<tbody style=\"cursor: auto; color: inherit;\">\n<tr style=\"cursor: auto; color: inherit;\">\n<td style=\"padding: 0px 15px 0px 10px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">NOT EVIDENT<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">The submission does not include both in-text citations and a reference list for sources that are quoted, paraphrased, or summarized.<\/span><\/p>\n<\/div>\n<\/td>\n<td style=\"padding-right: 15px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">APPROACHING COMPETENCE<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">The submission includes in-text citations for sources that are quoted, paraphrased, or summarized and a reference list; however, the citations or reference list is incomplete or inaccurate.<\/span><\/p>\n<\/div>\n<\/td>\n<td style=\"padding-right: 10px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">COMPETENT<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">The submission includes in-text citations for sources that are properly quoted, paraphrased, or summarized and a reference list that accurately identifies the author, date, title, and source location as available. Or the candidate does not use sources.<\/span><\/p>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"margin-top: 5px; margin-bottom: 5px; padding-top: 17px; font-weight: bold; font-size: 10px; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">E<\/span><span style=\"cursor: auto; color: inherit;\">:<\/span><a style=\"cursor: auto;\"><span style=\"cursor: auto; color: inherit;\">PROFESSIONAL COMMUNICATION<\/span><span style=\"margin-left: 5px; cursor: auto; color: inherit;\"><\/span><\/a><\/div>\n<div style=\"margin-bottom: 5px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<table style=\"cursor: auto; color: inherit;\">\n<tbody style=\"cursor: auto; color: inherit;\">\n<tr style=\"cursor: auto; color: inherit;\">\n<td style=\"padding: 0px 15px 0px 10px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">NOT EVIDENT<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">Content is unstructured, is disjointed, or contains pervasive errors in mechanics, usage, or grammar. Vocabulary or tone is unprofessional or distracts from the topic.<\/span><\/p>\n<\/div>\n<\/td>\n<td style=\"padding-right: 15px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">APPROACHING COMPETENCE<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">Content is poorly organized, is difficult to follow, or contains errors in mechanics, usage, or grammar that cause confusion. Terminology is misused or ineffective.<\/span><\/p>\n<\/div>\n<\/td>\n<td style=\"padding-right: 10px; cursor: auto; color: inherit;\">\n<div style=\"padding: 8px 8px 8px 17px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<p style=\"margin-right: 0px; margin-bottom: 5px; margin-left: 0px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">COMPETENT<\/span><\/b><\/p>\n<p style=\"line-height: 1.6rem; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">Content reflects attention to detail, is organized, and focuses on the main ideas as prescribed in the task or chosen by the candidate. Terminology is pertinent, is used correctly, and effectively conveys the intended meaning. Mechanics, usage, and grammar promote accurate interpretation and understanding.<\/span><\/p>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section style=\"margin-bottom: 30px; cursor: auto; color: inherit;\">\n<div style=\"margin-bottom: 20px; font-size: 22px; line-height: 1.1; cursor: auto; color: inherit;\"><a style=\"cursor: auto;\"><\/a><br style=\"cursor: auto; color: inherit;\"><\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>COMPETENCIES 4045.1.1&nbsp;:&nbsp;Compliance Legal Requirements The graduate describes the legal requirements to address compliance with cybersecurity policies and procedures with an organization. 4045.1.3&nbsp;:&nbsp;Security Awareness Training and Education (SATE) The graduate outlines legal issues that should be included within the security awareness training and education (SATE) program of an organization. 4045.1.4&nbsp;:&nbsp;Ethical Issues for Cybersecurity The graduate discusses [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"disciplines":[62],"paper_types":[],"tagged":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/12265"}],"collection":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions"}],"about":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/types\/questions"}],"author":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/comments?post=12265"}],"version-history":[{"count":0,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/12265\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/media?parent=12265"}],"wp:term":[{"taxonomy":"disciplines","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/disciplines?post=12265"},{"taxonomy":"paper_types","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/paper_types?post=12265"},{"taxonomy":"tagged","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/tagged?post=12265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}