Evan Anderson
IS3350
Security Issues in Legal Context
ITT Technical Institute
IS3350
Security Issues in Legal Context
Onsite Course
SYLLABUS
—————————————————
Credit hours: 4.5
Contact/lnstructional hours: 60 (30 Theory Hours, 30 Lab Hours)
Prerequisites:
NT2580 Introduction to Information Security or equivalent
IS3110 Risk Management in Information Technology Security or equivalent
Course Description:
This course provides an overview of legal processes involved in implementing and maintaining information systems security. Students will study security violations and breaches in relation to pertinent laws and regulations, and will use case studies to analyze legal impacts of information security issues.
Instructor: Evan Anderson
Phone: 360-399-6115 (text messages preferred)
Email: evan@eranga.net (work)
eranderson@itt-tech.edu (school)
Class Hours: Tuesday evenings, 6:00 PM – 11:20 PM
Office Hours: Monday, Tuesday, Thursday, and Friday 3:30 PM – 5:30 PM
COURSE OUTLINE
Unit 1
Date: Tuesday, June 14, 2016
Title: Information Systems Security Overview
Assigned Reading:
Legal Issues in
Information
Security
, Chapter 1.Activities:
- Discussion 1.1: Availability, Integrity, and Confidentiality (1%)
- Lab 1.2: Create an IT Infrastructure Asset List and Identify Where Privacy Data Resides (2%)
- Assignment 1.3: Executive Summary on Risk Analysis (2%)
Unit 2
Date: Tuesday, June 21, 2016Title: Privacy Overview
Assigned Reading:
Legal Issues in
Information
Security
; Chapter 2Activities:
- Quiz 2.1: Quiz 1 covers chapters 1 and 2 from the course textbook (2%)
- Lab 2.2: Case Study on U.S. Veteran Affairs and Loss of Privacy Information (2%)
- Assignment 2.3: Executive Summary on VA and Loss of Private Information (2%)
Unit 3
Date: Tuesday, June 28, 2016
Title: The American Legal System
Assigned Reading:
Legal Issues in
Information
Security
, Chapter 3.Activities:
- Discussion 3.1: Bill of Rights (1%)
- Lab 3.2: Case Study on PCI DSS Non-Compliance - CardSystems Solutions (2%)
- Assignment 3.3: Fourth Amendment (2%)
Unit 4
Date: Tuesday, July 5, 2016
Title: Security and Privacy of Financial and Health Information
Assigned Reading:
Legal Issues in
Information
Security
, Chapters 4 and 6.Activities:
- Quiz 4.1: Quiz 2 covers chapters 3, 4, and 5 from the course textbook (2%)
- Lab 4.2: Analysis and Comparison of GLBA and HIPAA (2%)
- Assignment 4.3: Privacy or Security Complaint to the Office of Civil Rights (2%)
Unit 5
Date: Tuesday, July 12, 2016Title: Security and Privacy Involving Corporations and Educational Institutions
Assigned Reading:
Legal Issues in
Information
Security
, Chapters 5 and 7.Activities:
- Discussion 5.1: Privacy in the Workplace (1%)
- Lab 5.2: Case Study on Issues Related to Sharing Consumers’ Confidential Information (2%)
- Assignment 5.3: Protect Children on the Internet (2%)
Unit 6
Date: Tuesday, July 19, 2016Title: Federal and State Laws on Privacy, Information Security, and Breach Notification
Assigned Reading:
Legal Issues in
Information
Security
, Chapters 8 and 9.Activities:
- Quiz 6.1: Quiz 3 covers chapters 5, 7, and 8 from the course textbook (2%)
- Lab 6.2: Identify the Scope of Your State’s Data & Security Breach Notification Law (2%)
- Assignment 6.3: Analysis of the Breach Notification Law Letter (2%)
Unit 7
Date: Tuesday, July 26, 2016Title: Intellectual Property Rights
Assigned Reading:
Legal Issues in
Information
Security
, Chapter 10.Activities:
- Discussion 7.1: Copyright and its Various Owner Rights (1%)
- Lab 7.2: Case Study on Digital Millennium Recording Act – Napster (2%)
- Assignment 7.3: Violation of Copyright Privileges (2%)
- Course Project: Litigation Hold Notice Assigned (22%)
Unit 8
Date: Tuesday, August 2, 2016Title: Cyberspace and the Law
Assigned Reading:
Legal Issues in
Information
Security
, Chapters 11 and 12.Activities:
- Quiz 8.1: Quiz 4 covers chapters 10, 11, and 12 from the course textbook (2%)
- Lab 8.2: Cyber Stalking or Cyber Bullying and Laws to Protect Individuals
- Assignment 8.3: Organized Cybercrimes (2%)
Unit 9
Date: Tuesday, August 9, 2016
Title: Information Security Governance
Assigned Reading:
Legal Issues in
Information
Security
, Chapter 13.Activities:
- Discussion 9.1: Risk Analysis (1%)
- Lab 9.2: Recommend IT Security Policies to Help Mitigate Risk (2%)
- Assignment 9.3: Executive Summary on Risk Mitigation (2%)
Unit 10
Date: Tuesday, August 16, 2016
Title: Risk Analysis, Incident Response and Computer Forensics
Assigned Reading:
Legal Issues in
Information
Security
, Chapters 14 and 15.Activities:
- Discussion 10.1: Computer Forensics (1%)
- Lab 10.2: Case Study in Computer Forensics – Pharmaceutical Company (2%)
- Assignment 10.3: Executive Summary on Computer Forensics Suites (2%)
Unit 11
Date: Tuesday, August 23, 2016
Title: Course Review and Final Examination
Activities:
- Project 11.1: Document Retention Policy and Litigation Hold Notices (22%)
- Exam 11.2: Final Exam (24%)
EVALUATION AND GRADING
Graded assignments will be evaluated using the following weighted categories:
- Assignment 20%
- Lab 20%
- Project 22%
- Discussion 6%
- Quiz 8%
- Exam 24%