Skip to main content
iRubric: Information Security and Privacy rubric

iRubric: Information Security and Privacy rubric

find rubric

edit   print   share   Copy to my rubrics   Bookmark   test run   assess...   delete   Do more...
Information Security and Privacy 
This assessment will determine the level of associate knowledge regarding the corporate guidelines for information security as well as the assoc iate's skill level for protecting company and customer information.
Rubric Code: EXW8594
Ready to use
Public Rubric
Subject: Communication  
Type: Assessment  
Grade Levels: Undergraduate

Powered by iRubric Information Security and Privacy
  Distinguished

4 pts

Proficient

3 pts

Basic

2 pts

Below Expectation

1 pts

Non-Performance

0 pts

Knowledge

Distinguished

Precisely recognizes each example of an email phishing scam and can demonstrate the correct process for reporting the scam.
Accurately demonstrates how to send an encrypted email and identifies all information that requires an encrypted email.
Proficient

Precisely recognizes more than half of the examples of an email phishing scam and can demonstrate the correct process for reporting the scam.
Accurately demonstrates how to send an encrypted email and identifies more than half of the information that requires an encrypted email
Basic

Recognizes only half of the examples of an email phishing scam and can demonstrate the correct process for reporting the scam.
Accurately demonstrates how to send an encrypted email and identifies only half of the information that requires an encrypted email
Below Expectation

Recognizes less than half of the examples of an email phishing scam and can partially demonstrate the correct process for reporting the scam.
Partially demonstrates how to send an encrypted email and identifies less than half of the information that requires an encrypted email
Non-Performance

Unable to recognize examples of an email phishing scam and cannot demonstrate the correct process for reporting the scam.
Unable to demonstrate how to send an encrypted email and cannot identify information that requires an encrypted email
Insight/Critical Thinking

Distinguished

Fully comprehends the definition of confidential information and accurately demonstrates how to use and share confidential information in 100% of the situational office settings.
Proficient

Fully comprehends the definition of confidential information and accurately demonstrates how to use and share confidential information in at least 75% of the situational office settings.
Basic

Partially comprehends the definition of confidential information and accurately demonstrates how to use and share confidential information in at least 50% of the situational office settings.
Below Expectation

Partially comprehends the definition of confidential information and accurately demonstrates how to use and share confidential information in at least 25% of the situational office settings.
Non-Performance

Does not comprehend the definition of confidential information and unsuccessfully demonstrates how to use and share confidential information in situational office settings.
Problem Solving

Distinguished

Correctly names all four steps of information classification and protection.
Accurately identifies the four steps in the case study activity.
Proficient

Correctly names all four steps of information classification and protection.
Accurately identifies three of the four steps in the case study activity.
Basic

Correctly names at least three of four steps of information classification and protection.
Accurately identifies three of the the four steps in the case study activity.
Below Expectation

Names no more than two of the four steps of information classification and protection.
Identifies no more than two of the four steps in the case study activity.
Non-Performance

Unable to name any of the four steps of information classification and protection.
Unable to identify any of the four steps in the case study activity.
Accuracy

Distinguished

Competently demonstrates locating the corporate Policy Guide.
Accurately demonstrates the application of corporate best practices to five case based scenarios where a possible privacy breach has occurred.
Proficient

Competently demonstrates locating the corporate Policy Guide.
Accurately demonstrates the application of corporate best practices to four out of five case based scenarios where a possible privacy breach has occurred.
Basic

Competently demonstrates locating the corporate Policy Guide.
Accurately demonstrates the application of corporate best practices to three out of five case based scenarios where a possible privacy breach has occurred.
Below Expectation

Awkwardly demonstrates locating the corporate Policy Guide.
Demonstrates the application of corporate best practices to no more than two of the five case based scenarios where a possible privacy breach has occurred.
Non-Performance

Unable to demonstrate locating the corporate Policy Guide.
Unable to demonstrate the application of corporate best practices to any of the five case based scenarios where a possible privacy breach has occurred.
Mechanics

Distinguished

No grammatical or spelling errors are present.
Writing component of the assessment contains complete sentences that are easy to read.
Proficient

Two or fewer grammatical or spelling errors are present.
Writing component of the assessment contains complete sentences that are easy to read.
Basic

Three or more grammatical or spelling errors are present.
Writing component of the assessment contains complete sentences that are difficult to read.
Below Expectation

Four or more grammatical or spelling errors are present.
Writing component of the assessment contains incomplete sentences that are difficult to read.
Non-Performance

Five or more grammatical or spelling errors are present.
Writing component of the assessment contains incomplete sentences that detract from the result.



Keywords:
  • information, security, privacy, electronic, sharing

Subjects:

Types:





Do more with this rubric:

Preview

Preview this rubric.

Edit

Modify this rubric.

Copy

Make a copy of this rubric and begin editing the copy.


Print

Show a printable version of this rubric.

Categorize

Add this rubric to multiple categories.

Bookmark

Bookmark this rubric for future reference.
Assess

Test run

Test this rubric or perform an ad-hoc assessment.

Grade

Build a gradebook to assess students.

Collaborate

Apply this rubric to any object and invite others to assess.
Share

Publish

Link, embed, and showcase your rubrics on your website.

Email

Email this rubric to a friend.

Discuss

Discuss this rubric with other members.
 

Do more with rubrics than ever imagined possible.

Only with iRubrictm.



Copyright © 2024 Reazon Systems, Inc.  All rights reserved.
n16