principles and the relationship between them as well as regulatory and compliance requirements
related to cyber security incidents for a corporate organisation. This is an individual assessment
task. You are required to submit your solution for givn problems along with the exhibits to support
findings, and a bibliography
Q1.2: Analyse and interpret information in the table
Provide a brief critical analysis, interpretation and discussion of the data in the table. Support
your analysis with good evidence and examples.
Question 2: Carole left her company-issued laptop in a locked car while running an errand. The
car was broken into, and the laptop stolen. Analyse and reflect on the laptop incident under
appropriate privacy legislation by considering the following questions:
• _Why should XYZRG consider the incident may have violated privacy legislation?
• _What obligations does XYZRG have under privacy legislation, if any, what those obligations
are, and why XYZRG need to comply to those obligations?
Fig: 1