defend laws rules regulations and ethical principles relating to technology and the workplace

Even the smartest students need writing assistance at some point during their academic career. Should you lock yourself in a room and spend the entire weekend trying to write a paper? We promise you that the paper that you pay for won’t be resold or submitted elsewhere. It will also be written according to the instructions that you and your professor provide. Our excellent essays stand out among the rest for a reason. Don’t just take our word, check them out by yourself.


Order a Similar Paper Order a Different Paper

Assignment Instructions and Requirements

First, download the required template for this assignment: Email Template

Use of this template is required. Do not alter the formatting; simply fill in the content as explained below. Failure to submit the assignment using this template will result in zero points.

Scenario:

You are IT manager for 504 Technologies and have discovered a data breach. You have taken the responsibility to contact customers to explain the situation. You realize you must explain the attack in terms the average customer will understand, and need to assuage their fears. Make sure you use professional wording and avoid emotional content.

Research:

Check the list of potential attacks in the Unit Reading PDF. Choose only one kind of attack (for example, just a virus, not also a worm and Trojan). Then find a suitable source online that explains what happens in this kind of attack.

Write in the template:

  • The “to” field has been filled in.
  • CC yourself using your PG student email address.
  • Write a suitable subject line that alerts the recipients to the importance of your email. Do not use all-caps or characters: use meaningful wording.
  • Start the email with a suitable salutation.
  • In the body of the email, include the following, in order. Each item listed below should be placed in a separate paragraph (single spaced with a blank line between each paragraph).
    • What happened – explain the attack in your own words.
    • How this affects the email recipients (customers).
    • What your company is doing to correct the issue and protect the customer from future breaches.
    • Provide one communication venue for questions: direct them to the company website (http://504technologies.net), indicate there is a FAQ sheet attached to the email, or provide a toll-free (made-up) phone number for their questions. Do not actually create a website or FAQ sheet; simply direct them to it.
  • End the email with four short lines: your first and last name, a suitable job title, and the company name, followed by the URL to the source you used to learn about this kind of attack.

Other requirements:

  • Write at least 200 words, but not more than 280 words, not including the salutation and signature. All parts of this assignment must fit on the single page in the template.
  • Write entirely in your own words. Do not copy or quote from your source.
  • Provide the content in paragraph form, without lists or other content.
  • All content in the body of the email must be left-aligned.
  • Since this is an email, in-text citation is not appropriate. However, remember to include the URL to your source at the bottom of the email.
Writerbay.net

Do you need help with this or a different assignment? In a world where academic success does not come without efforts, we do our best to provide the most proficient and capable essay writing service. After all, impressing professors shouldn’t be hard, we make that possible. If you decide to make your order on our website, you will get 15 % off your first order. You only need to indicate the discount code GET15.


Order a Similar Paper Order a Different Paper