• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Digital Systems

Department of Management Information Systems, Temple University

Digital Systems

MIS 2101.730 ■ Spring 2023 ■ Steven E. Sclarow, AIA
  • Home
  • About
    • Course Materials
    • Course Requirements
    • Email Policy
    • Grading
    • Gradebook
    • Instructor
    • Temple and COVID-19
    • Zoom Requirements
    • Zoom Links
  • Canvas Content
  • Coding Files
  • Helpdesk
  • Zoom Links
  • Video Vault
  • Diamond Peer Corner
  • Posts
    • 1a Questions
    • 1b Questions
    • 2a Questions
    • 2b Questions
    • 3a Questions
    • 3b Questions
    • 4a Questions
    • 4b Questions
    • 5a Questions
    • 5b Questions
    • 6a Questions
    • 6b Questions
    • 7a Questions

Data Protection and Cybersecurity Regulations 4B

Madeline Elia - February 28, 2023 1 Comment

There are so many people in the U.S., and each person has important personal data. In order to keep their information private and secure, there are a few regulations in place. In terms of privacy and personal data, there is the California Consumer Privacy Act (CCPA) and the General Data Protection Regulation (GDPR). Surprisingly, even though technology is so vast, there aren’t that many federal laws covering cybersecurity. The ones that do exist include the Gramm-Leach-Bliley Act (1999), the 2002 Homeland Security Act, which includes the Federal Information Security Management Act, and the Health Insurance Portability and Accountability Act (HIPAA), created in 1996. There are also some bills being enacted at the state level, but according to the map that we looked at in class, many states do not have regulations established. The states that I do see with signed statutes/bills (indicated in red) are California, Utah, Colorado, Virginia, and Connecticut. For Pennsylvania, it looks like we have something in committee, indicated by the light blue.

Reader Interactions

Comments

  1. Leonid Kovalchuk says

    March 1, 2023 at 2:11 pm

    Hey Madeline,
    I think you did a great explanation of how important is to protect your personal data. I have 2FA turned on all my social media accounts. I think it is super important to secure and protect any account that you may have. I have an authentication app for all of my passwords for security purposes.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

ANNOUNCEMENTS & POSTS

What is HTML and how it is used in our everyday lives! Part 2

The coding language that adds design elements to a web page is Cascading … [More...] about What is HTML and how it is used in our everyday lives! Part 2

What is HTML and how it is used in our everyday lives! Part 1

The coding language that adds structure to a web page is HTML (Hypertext … [More...] about What is HTML and how it is used in our everyday lives! Part 1

What are Loops?

Why do we use loops? Loops are used in programming to execute a set of … [More...] about What are Loops?

Importance of IF/ELSE Statements!

Why do we use if/else statements? We use if/else statements in programming … [More...] about Importance of IF/ELSE Statements!

The Functioning of JavaScript

A function in JavaScript is a block of code designed to perform a specific … [More...] about The Functioning of JavaScript

What does JavaScript mean to you? Read more to find out what it means to Shivam Joshi!

A variable in JavaScript is a container that holds a value, which can be a … [More...] about What does JavaScript mean to you? Read more to find out what it means to Shivam Joshi!

ITA CONTACT INFO

Tarisha Sarker - Diamond Peer

Email: tarisha.sarker@temple.edu
Office Hours: Monday, 3-5 PM
Zoom Link: https://temple.zoom.us/j/91454347337

Instructor

Steven E. Sclarow, AIA

Email: sclarow@temple.edu
Office Hours Availability: M | W, 9:30 - 10:30 AM, or by appointment. Please email me if you need to schedule an appointment outside of my normal office hours.
Zoom Link: https://temple.zoom.us/j/96464375557

Helpful Links

FOX Laptop Policy

Gradebook

Installing-VS-Code-Windows
Installing-VS-Code-Mac-OS

Copyright © 2025 · Department of Management Information Systems · Fox School of Business · Temple University