Q1. Once again, let us look at the electric power companies. Use web resources to find an information security (or cybersecurity) policy of a utility company and list some of its key features in the context of what you have learned in this module. Make sure to provide a complete citation of the source. Your answer should not exceed a page.
Q2. Look into the security rule of HIPAA and summarize the technical safeguards that it recommends (or enforces) as part of security standards. Once again, use web resources and make sure to provide a complete citation with URL. Your answer should be limited to one page.
Q3. All educational institutions have to comply with FERPA. Use web resources to write a brief summary of the security implications of FERPA from the institution’s perspective. Make sure to provide a complete citation with URL. Your answer should be limited to one page.