Posts

Lab5 – Legal Regulations, Compliance, And Investigation

Lab5 – Legal Regulations, Compliance, And Investigation

35

 

Introduction

When consumers provide personal information for a product or service, the assumption is the

receiving company will exercise due diligence to protect their information. Bear in mind there is

no all-purpose federal law mandating personal data should be protected, only certain industry-

specific laws, for example, health care and financial. But even without an overarching mandate,

most companies will attempt to protect your personal data just to avoid a charge of negligence

should a privacy breach occur.

One nonprofit organization that monitors how well companies guard personal data—among

other missions—is the Electronic Frontier Foundation (EFF). EFF’s purpose is to defend free

speech, privacy, innovation, and consumer rights. This lab takes a look at a class-action lawsuit

filed by EFF.

In this lab, you will explain the privacy issues related to an EFF case study, you will identify

U.S. privacy law violations and their implications, and you will assess the impact of those

violations on consumer confidential information.

Learning Objectives

Upon completing this lab, you will be able to:

Explain the mission statement of the Electronic Frontier Foundation (EFF).

Relate privacy issues in the case study to any personal or individual laws in the United

States.

Identify U.S. citizen privacy law violations and their implications for privacy and

confidential information in the case study.

Assess the impact of these violations on consumers’ confidential information from a legal,

ethical, and information systems security perspective.

Lab #5 Case Study on Issues Related to Sharing Consumers’ Confidential Information

 

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company – All Rights Reserved.

 

 

36 | LAB #5 Case Study on Issues Related to Sharing Consumers’ Confidential Information

 

Deliverables

Upon completion of this lab, you are required to provide the following deliverables to your

instructor:

1. Lab Report file; 2. Lab Assessments file.

Instructor Demo

The Instructor will present the instructions for this lab. This will start with a general discussion

about privacy law and how this is different from information systems security as well as how

they are related. The Instructor will then present an overview of the Electronic Frontier

Foundation (EFF) and the case study in this lab.

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company – All Rights Reserved.

 

 

37

 

Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com Student Lab Manual

 

 

Hands-On Steps

Note: This is a paper-based lab. To successfully complete the deliverables for this lab, you will need access to Microsoft® Word or another compatible word processor. For some labs, you may also need access to a graphics line drawing application, such as Visio or PowerPoint. Refer to the Preface of this manual for information on creating the lab deliverable files.

 

1. On your local computer, create the lab deliverable files.

2. Review the Lab Assessment Worksheet. You will find answers to these questions as you proceed through the lab steps.

3. Review the following case study on issues related to sharing consumers’ confidential information. Note that this information originated from the following Electronic Frontier

Foundation Web pages: https://www.eff.org/about, https://www.eff.org/cases/hepting, and

https://www.eff.org/nsa/hepting.

From the Internet to the iPod, technologies transform society and empower us as

speakers, citizens, creators, and consumers. When freedoms in the networked world come

under attack, the Electronic Frontier Foundation (EFF) is the first line of defense. EFF

broke new ground when it was founded in 1990—well before the Internet was on most

people’s radar—and continues to confront cutting-edge issues defending free speech,

privacy, innovation, and consumer rights today. From the beginning, EFF has

championed the public interest in every critical battle affecting digital rights.

Blending the expertise of lawyers, policy analysts, activists, and technologists, EFF

achieves significant victories on behalf of consumers and the general public. EFF fights

for freedom primarily in the courts, bringing and defending lawsuits even when that

means taking on the U.S. government or large corporations. By mobilizing more than

61,000 concerned citizens through the Action Center, EFF beats back bad legislation. In

addition to advising policymakers, EFF educates the press and public.

EFF is a donor-funded nonprofit and depends on support to continue successfully

defending digital rights. Litigation is particularly expensive. Because two-thirds of EFF’s

budget comes from individual donors, every contribution is critical to helping EFF

fight—and win—more cases (https://www.eff.org/about).

EFF Case Study Information

The Electronic Frontier Foundation (EFF) filed a class-action lawsuit against AT&T on

January 31, 2006, accusing the telecom giant of violating the law and the privacy of its

customers by collaborating with the National Security Agency (NSA) in its massive, illegal

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company – All Rights Reserved.

 

 

38 | LAB #5 Case Study on Issues Related to Sharing Consumers’ Confidential Information

 

program to wiretap and data-mine Americans’ communications. In May 2006, many other

cases were filed against a variety of telecommunications companies. Subsequently, the

Multi-District Litigation Panel of the federal courts transferred approximately 40 cases to

the Northern District of California federal court.

In Hepting v. AT&T, EFF sued the telecommunications giant on behalf of its customers

for violating privacy law by collaborating with the NSA in the massive, illegal program

to wiretap and data-mine Americans’ communications. Evidence in the case includes

undisputed evidence provided by former AT&T telecommunications technician Mark

Klein showing AT&T routed copies of Internet traffic to a secret room in San Francisco

controlled by the NSA.

In June of 2009, a federal judge dismissed Hepting and dozens of other lawsuits against

telecoms, ruling that the companies had immunity from liability under the controversial

Foreign Intelligence Surveillance Act Amendments Act (FISAAA), which was enacted in

response to court victories in Hepting. Signed by President Bush in 2008, the FISAAA

allows the attorney general to require the dismissal of the lawsuits over the telecoms’

participation in the warrantless surveillance program if the government secretly certifies

to the court that the surveillance did not occur, was legal, or was authorized by the

president—certification that was filed in September of 2008.

Note: To read the full order from the federal judge who dismissed the many EFF lawsuits, the order is available here: http://www.eff.org/files/filenode/att/orderhepting6309_0.pdf.

 

EFF plans to appeal the decision to the 9th U.S. Circuit Court of Appeals, primarily

arguing that FISAAA is unconstitutional in granting to the president broad discretion to

block the courts from considering the core constitutional privacy claims of millions of

Americans (http://www.eff.org/cases/hepting; https://www.eff.org/nsa/hepting).

Note: Public proof regarding the case study came in June 2013 when British newspaper The Guardian first published news of massive electronic data collection by the NSA, a U.S. spy agency. Revelations from former NSA contractor and whistleblower Edward Snowden have detailed the extensiveness of data collection.

 

4. In your Lab Report file, describe the EFF’s mission statement.

5. In your Lab Report file, explain the privacy issues in the case study.

6. In your Lab Report file, identify the U.S. citizen privacy law violations in the case study and the implications those violations have on privacy and confidential information.

Note: This completes the lab. Close the Web browser, if you have not already done so.

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company – All Rights Reserved.

 

 

39

 

Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com Student Lab Manual

 

 

Evaluation Criteria and Rubrics

The following are the evaluation criteria for this lab that students must perform:

1. Explain the mission statement of the Electronic Frontier Foundation (EFF). – [25%] 2. Relate privacy issues in the case study to any personal or individual laws in the United

States. – [25%]

3. Identify U.S. citizen privacy law violations and their implications for privacy and confidential information in the case study. – [25%]

4. Assess the impact of these violations on consumers’ confidential information from a legal, ethical, and information systems security perspective. – [25%]

 

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company – All Rights Reserved.

 

 

40 | LAB #5 Case Study on Issues Related to Sharing Consumers’ Confidential Information

 

Lab #5 – Assessment Worksheet

Case Study on Issues Related to Sharing Consumers’ Confidential Information

Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________

Overview

In this lab, you explained the privacy issues related to an EFF case study, you identified U.S.

privacy law violations and their implications, and you assessed the impact of those violations on

consumer confidential information.

Lab Assessment Questions & Answers

1. What is the Electronic Frontier Foundation’s mission statement?

 

2. Did the U.S. government violate the constitutional rights of U.S. citizens by ordering the NSA to review consumer confidential privacy information?

 

 

3. Why is the Hepting v. AT&T case crucial to the long-term posture of how the U.S. government can or cannot review consumer confidential information?

 

 

4. If Hepting v. AT&T results in “Big Brother” being allowed to eavesdrop and/or review the local and toll telephone dialing and bills of individuals, will U.S. citizens and consumers have any

privacy rights left regarding use of communication technologies?

 

 

5. What are the legal implications of consumer privacy information being shared?

 

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company – All Rights Reserved.

 

 

41

 

Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com Student Lab Manual

 

 

6. What are the ethical implications of consumer privacy information being shared?

 

7. What are the information systems security implications of consumer information being shared?

 

8. What law allowed a federal judge to dismiss Hepting v. AT&T and other lawsuits against telecommunication service providers participating in the warrantless surveillance program

authorized by the president?

 

 

9. True or false: EFF claimed that the ruling set forth by FISAAA was unconstitutional.

 

 

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company – All Rights Reserved.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Lab4 – Legal Regulations, Compliance, And Investigation assignment help

Lab4 – Legal Regulations, Compliance, And Investigation assignment help

27

 

Introduction Individuals and customers should normally expect companies and health providers to protect personal information. Custodians of private information should protect it as they would any other asset. Personal information has great market value both to other companies and would-be thieves. Because of this value, numerous examples exist of companies opting to share, sell, or inadequately safeguard their customers’ personal information. The result has been two landmark pieces of legislation.

The purpose of the Gramm-Leach-Bliley Act (GLBA) and the Health Insurance Portability and Accountability Act (HIPAA) is to make organizations responsible and accountable for protecting customer privacy data and implementing security controls to mitigate risks, threats, and vulnerabilities of that data. Both of these laws impact their industries significantly.

In this lab, you will identify the similarities and differences of GLBA and HIPAA compliance laws, you will explain how the requirements of GLBA and HIPAA align with information systems security, you will identify privacy data elements for each, and you will describe security controls and countermeasures that support each.

Learning Objectives Upon completing this lab, you will be able to:

• Identify the similarities between GLBA and HIPAA compliance laws. • Identify the differences between GLBA and HIPAA compliance laws. • Explain how GLBA and HIPAA requirements align with information systems security. • Identify privacy data elements for both GLBA and HIPAA. • Describe specific security controls and security countermeasures that support GLBA and

HIPAA compliance.

Lab #4 Analyzing and Comparing GLBA and HIPAA

 

© Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION.

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

 

 

28 | LAB #4 Analyzing and Comparing GLBA and HIPAA

 

Deliverables Upon completion of this lab, you are required to provide the following deliverables to your instructor:

1. Lab Report file; 2. Lab Assessments file.

Instructor Demo The Instructor will present the instructions for this lab. This will start with a general discussion about GLBA and HIPAA, their similarities, differences, etc. The Instructor will then present an overview of this lab and reference the overview documents.

© Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION.

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

 

 

29

 

Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual

 

 

Hands-On Steps

Note: This is a paper-based lab. To successfully complete the deliverables for this lab, you will need access to Microsoft® Word or another compatible word processor. For some labs, you may also need access to a graphics line drawing application, such as Visio or PowerPoint. Refer to the Preface of this manual for information on creating the lab deliverable files.

1. On your local computer, create the lab deliverable files.

2. Review the Lab Assessment Worksheet. You will find answers to these questions as you proceed through the lab steps.

3. On your local computer, open a new Internet browser window.

4. Using your favorite search engine, search for information on the Gramm-Leach-Bliley Act.

5. Read about this act.

6. Next, research the privacy and security rules for the Gramm-Leach-Bliley Act.

7. In your Lab Report file, write a thorough description of the Gramm-Leach-Bliley Act’s basic components. Be sure to include the following topics:

• Who co-sponsored the act? • Who is protected by the act? • Who is restricted by the act? • How are financial institutions defined? • What does the act allow? • How would you define the major parts of the privacy requirements: the Financial

Privacy Rule, the Safeguards Rule, and the pretexting provisions? What do each of these spell out in the act? (Write three paragraphs on each of these.)

8. Using your favorite search engine, research the compliance law HIPAA.

9. In your Lab Report file, write a thorough description of HIPAA. Be sure to include the following topics in your discussion:

• Which U.S. government agency acts as the legal enforcement entity for HIPAA compliance violations?

• Who is protected by HIPAA? • Who must comply with HIPAA? • What is the relevance of health care plans, providers, and clearinghouses?

© Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION.

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

 

 

30 | LAB #4 Analyzing and Comparing GLBA and HIPAA

• How would you define the major parts of the Privacy Rule and the Security Rule? What do each of these spell out? (Write three paragraphs on each rule.)

10. In your Lab Report file, describe what the GLBA and HIPAA privacy rules have in common. Then, discuss how the two are different.

11. In your Lab Report file, describe what the GLBA and HIPAA security rules have in common. Then, discuss how the two are different.

Historical Differences Between GLBA and HIPAA GLBA and HIPAA offer up historical similarities and differences. Both acts were drafted and made into law only a few years apart, with HIPAA in 1996 and GLBA in 1999. And both acts tackled gaps in information assurance and privacy, and are constructed similarly. However, HIPAA’s Privacy Rule and Security Rule were published by the U.S. Department of Health and Human Services some four and seven years, respectively, after the act’s passage. GLBA’s Privacy Rule and Safeguards Rule were drafted alongside the original act.

Both acts target their particular industries with rules and control measures to protect information. However, each act’s impact is limited based on where most of its industry is located. For instance, health care providers covered by HIPAA’s mandate to protect information operate within the United States. By contrast, many large banks have locations and headquarters all over the globe, not just within the United States. But GLBA is enforceable only in the United States.

Yet another notable difference between the two acts is how dominant the issue of information confidentiality is to each act. HIPAA has two purposes: to help individuals retain health insurance and to help them control their personal data. GLBA’s primary purpose is unrelated to information assurance altogether. Rather, GLBA was enacted to repeal many restrictions and regulations placed on banks from the Glass-Steagall Act of 1933. Once GLBA was in place, banks were free to consolidate and quickly grow without hindrance from any financial regulatory agency. In fact, popular opinion is that GLBA allowed banks to become “too big to fail,” a phrase coined during the losing argument against GLBA in 1999. Consequently, history was made in 2007 with the U.S. financial crisis. But GLBA also ensured the banks would safeguard personal information.

12. In your Lab Report file, discuss how GLBA and HIPAA requirements align with

information systems security.

13. In you Lab Report file, list two privacy data elements for GLBA and list two privacy data elements for HIPAA that are under compliance.

14. In your Lab Report file, list two security controls or security countermeasures for GLBA and list two security controls or security countermeasures for HIPAA that support compliance.

Note: This completes the lab. Close the Web browser, if you have not already done so.

 

© Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION.

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

 

 

31

 

Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual

 

 

Evaluation Criteria and Rubrics The following are the evaluation criteria for this lab that students must perform:

1. Identify the similarities between GLBA and HIPAA compliance laws. – [20%] 2. Identify the differences between GLBA and HIPAA compliance laws. – [20%] 3. Explain how GLBA and HIPAA requirements align with information systems security. –

[20%] 4. Identify privacy data elements for both GLBA and HIPAA. – [20%] 5. Describe specific security controls and security countermeasures that support GLBA and

HIPAA compliance. – [20%]

© Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION.

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!