Skip to main content
sign in
Username
Password
forgot?
Sign up
Share
help_outline
help
Pricing
Request Info
Please enable JavaScript on your web browser
menu
iRubric: Information Security and Privacy rubric
find rubric
Your browser does not support iframes.
edit
print
share
Copy to my rubrics
Bookmark
test run
assess...
delete
Do more...
Information Security and Privacy
This assessment will determine the level of associate knowledge regarding the corporate guidelines for information security as well as the assoc iate's skill level for protecting company and customer information.
Rubric Code:
EXW8594
By
sdaywiley
Ready to use
Public Rubric
Subject:
Communication
Type:
Assessment
Grade Levels:
Undergraduate
Your browser does not support iframes.
Desktop Mode
Mobile Mode
Information Security and Privacy
Distinguished
4 pts
Proficient
3 pts
Basic
2 pts
Below Expectation
1 pts
Non-Performance
0 pts
Knowledge
Distinguished
Precisely recognizes each example of an email phishing scam and can demonstrate the correct process for reporting the scam.
Accurately demonstrates how to send an encrypted email and identifies all information that requires an encrypted email.
Proficient
Precisely recognizes more than half of the examples of an email phishing scam and can demonstrate the correct process for reporting the scam.
Accurately demonstrates how to send an encrypted email and identifies more than half of the information that requires an encrypted email
Basic
Recognizes only half of the examples of an email phishing scam and can demonstrate the correct process for reporting the scam.
Accurately demonstrates how to send an encrypted email and identifies only half of the information that requires an encrypted email
Below Expectation
Recognizes less than half of the examples of an email phishing scam and can partially demonstrate the correct process for reporting the scam.
Partially demonstrates how to send an encrypted email and identifies less than half of the information that requires an encrypted email
Non-Performance
Unable to recognize examples of an email phishing scam and cannot demonstrate the correct process for reporting the scam.
Unable to demonstrate how to send an encrypted email and cannot identify information that requires an encrypted email
Insight/Critical Thinking
Distinguished
Fully comprehends the definition of confidential information and accurately demonstrates how to use and share confidential information in 100% of the situational office settings.
Proficient
Fully comprehends the definition of confidential information and accurately demonstrates how to use and share confidential information in at least 75% of the situational office settings.
Basic
Partially comprehends the definition of confidential information and accurately demonstrates how to use and share confidential information in at least 50% of the situational office settings.
Below Expectation
Partially comprehends the definition of confidential information and accurately demonstrates how to use and share confidential information in at least 25% of the situational office settings.
Non-Performance
Does not comprehend the definition of confidential information and unsuccessfully demonstrates how to use and share confidential information in situational office settings.
Problem Solving
Distinguished
Correctly names all four steps of information classification and protection.
Accurately identifies the four steps in the case study activity.
Proficient
Correctly names all four steps of information classification and protection.
Accurately identifies three of the four steps in the case study activity.
Basic
Correctly names at least three of four steps of information classification and protection.
Accurately identifies three of the the four steps in the case study activity.
Below Expectation
Names no more than two of the four steps of information classification and protection.
Identifies no more than two of the four steps in the case study activity.
Non-Performance
Unable to name any of the four steps of information classification and protection.
Unable to identify any of the four steps in the case study activity.
Accuracy
Distinguished
Competently demonstrates locating the corporate Policy Guide.
Accurately demonstrates the application of corporate best practices to five case based scenarios where a possible privacy breach has occurred.
Proficient
Competently demonstrates locating the corporate Policy Guide.
Accurately demonstrates the application of corporate best practices to four out of five case based scenarios where a possible privacy breach has occurred.
Basic
Competently demonstrates locating the corporate Policy Guide.
Accurately demonstrates the application of corporate best practices to three out of five case based scenarios where a possible privacy breach has occurred.
Below Expectation
Awkwardly demonstrates locating the corporate Policy Guide.
Demonstrates the application of corporate best practices to no more than two of the five case based scenarios where a possible privacy breach has occurred.
Non-Performance
Unable to demonstrate locating the corporate Policy Guide.
Unable to demonstrate the application of corporate best practices to any of the five case based scenarios where a possible privacy breach has occurred.
Mechanics
Distinguished
No grammatical or spelling errors are present.
Writing component of the assessment contains complete sentences that are easy to read.
Proficient
Two or fewer grammatical or spelling errors are present.
Writing component of the assessment contains complete sentences that are easy to read.
Basic
Three or more grammatical or spelling errors are present.
Writing component of the assessment contains complete sentences that are difficult to read.
Below Expectation
Four or more grammatical or spelling errors are present.
Writing component of the assessment contains incomplete sentences that are difficult to read.
Non-Performance
Five or more grammatical or spelling errors are present.
Writing component of the assessment contains incomplete sentences that detract from the result.
Keywords:
information, security, privacy, electronic, sharing
Subjects:
Communication
Types:
Assessment
Discuss this rubric
You may also be interested in:
More rubrics by this author
More Communication rubrics
More Assessment rubrics
Do more with this rubric:
Preview
Preview this rubric.
Edit
Modify this rubric.
Copy
Make a copy of this rubric and begin editing the copy.
Print
Show a printable version of this rubric.
Categorize
Add this rubric to multiple categories.
Bookmark
Bookmark this rubric for future reference.
Assess
Test run
Test this rubric or perform an ad-hoc assessment.
Grade
Build a gradebook to assess students.
Collaborate
Apply this rubric to any object and invite others to assess.
Share
Publish
Link, embed, and showcase your rubrics on your website.
Email
Email this rubric to a friend.
Discuss
Discuss this rubric with other members.
Do more with rubrics than ever imagined possible.
Only with iRubric
tm
.
Copyright © 2024
Reazon Systems, Inc.
All rights reserved.
n16
Your browser does not support iframes.
Your browser does not support iframes.
Your browser does not support iframes.