IS3350

Security Issues in Legal Context

ITT Technical Institute
IS3350
Security Issues in Legal Context
Onsite Course

SYLLABUS
Credit hours: 4.5
Contact/lnstructional hours: 60 (30 Theory Hours, 30 Lab Hours)
Prerequisites:
          NT2580 Introduction to Information Security or equivalent
          IS3110 Risk Management in Information Technology Security or equivalent
Course Description:
This course provides an overview of legal processes involved in implementing and maintaining information systems security. Students will study security violations and breaches in relation to pertinent laws and regulations, and will use case studies to analyze legal impacts of information security issues.

Instructor: Evan Anderson
Phone: 360-399-6115 (text messages preferred)
Email: evan@eranga.net (work)
            eranderson@itt-tech.edu (school)
Class Hours: Tuesday evenings, 6:00 PM – 11:20 PM
Office Hours: Monday, Tuesday, Thursday, and Friday 3:30 PM – 5:30 PM

COURSE OUTLINE
Unit 1 
Date: Tuesday, June 14, 2016
Title: Information Systems Security Overview
Assigned Reading: 
Legal Issues in 
Information 
Security
Chapter 1.
Activities:
  • Discussion 1.1: Availability, Integrity, and Confidentiality (1%)
  • Lab 1.2: Create an IT Infrastructure Asset List and Identify Where Privacy Data Resides (2%)
  • Assignment 1.3: Executive Summary on Risk Analysis (2%)
Unit 2
Date: Tuesday, June 21, 2016
Title: Privacy Overview
Assigned Reading: 
Legal Issues in 
Information 
Security
Chapter 2
Activities:
  • Quiz 2.1: Quiz 1 covers chapters 1 and 2 from the course textbook (2%)
  • Lab 2.2: Case Study on U.S. Veteran Affairs and Loss of Privacy Information (2%)
  • Assignment 2.3: Executive Summary on VA and Loss of Private Information (2%)
Unit 3
Date: Tuesday, June 28, 2016
Title: The American Legal System
Assigned Reading: 
Legal Issues in 
Information 
Security
Chapter 3.
Activities:
  • Discussion 3.1: Bill of Rights (1%)
  • Lab 3.2: Case Study on PCI DSS Non-Compliance - CardSystems Solutions (2%)
  • Assignment 3.3: Fourth Amendment (2%)
Unit 4
Date: Tuesday, July 5, 2016
Title: Security and Privacy of Financial and Health Information
Assigned Reading: 
Legal Issues in 
Information 
Security
Chapters 4 and 6.
Activities:
  • Quiz 4.1: Quiz 2 covers chapters 3, 4, and 5 from the course textbook (2%)
  • Lab 4.2: Analysis and Comparison of GLBA and HIPAA (2%)
  • Assignment 4.3: Privacy or Security Complaint to the Office of Civil Rights (2%)
Unit 5
Date: Tuesday, July 12, 2016
Title: Security and Privacy Involving Corporations and Educational Institutions
Assigned Reading: 
Legal Issues in 
Information 
Security
Chapters 5 and 7.
Activities:
  • Discussion 5.1: Privacy in the Workplace (1%)
  • Lab 5.2: Case Study on Issues Related to Sharing Consumers’ Confidential Information (2%)
  • Assignment 5.3: Protect Children on the Internet (2%)
Unit 6
Date: Tuesday, July 19, 2016
Title: Federal and State Laws on Privacy, Information Security, and Breach Notification
Assigned Reading: 
Legal Issues in 
Information 
Security
Chapters 8 and 9.
Activities:
  • Quiz 6.1: Quiz 3 covers chapters 5, 7, and 8 from the course textbook (2%)
  • Lab 6.2: Identify the Scope of Your State’s Data & Security Breach Notification Law (2%)
  • Assignment 6.3: Analysis of the Breach Notification Law Letter (2%)
Unit 7
Date: Tuesday, July 26, 2016
Title: Intellectual Property Rights
Assigned Reading: 
Legal Issues in 
Information 
Security
Chapter 10.
Activities:
  • Discussion 7.1: Copyright and its Various Owner Rights (1%)
  • Lab 7.2: Case Study on Digital Millennium Recording Act – Napster (2%)
  • Assignment 7.3: Violation of Copyright Privileges (2%)
  • Course Project: Litigation Hold Notice Assigned (22%)
Unit 8
Date: Tuesday, August 2, 2016
Title: Cyberspace and the Law
Assigned Reading: 
Legal Issues in 
Information 
Security
Chapters 11 and 12.
Activities:
  • Quiz 8.1: Quiz 4 covers chapters 10, 11, and 12 from the course textbook (2%)
  • Lab 8.2: Cyber Stalking or Cyber Bullying and Laws to Protect Individuals
  • Assignment 8.3: Organized Cybercrimes (2%)
Unit 9
Date: Tuesday, August 9, 2016
Title: Information Security Governance
Assigned Reading: 
Legal Issues in 
Information 
Security
Chapter 13.
Activities:
  • Discussion 9.1: Risk Analysis (1%)
  • Lab 9.2: Recommend IT Security Policies to Help Mitigate Risk (2%)
  • Assignment 9.3: Executive Summary on Risk Mitigation (2%)
Unit 10
Date: Tuesday, August 16, 2016
Title: Risk Analysis, Incident Response and Computer Forensics
Assigned Reading: 
Legal Issues in 
Information 
Security
Chapters 14 and 15.
Activities:
  • Discussion 10.1: Computer Forensics (1%)
  • Lab 10.2: Case Study in Computer Forensics – Pharmaceutical Company (2%)
  • Assignment 10.3: Executive Summary on Computer Forensics Suites (2%)
Unit 11
Date: TuesdayAugust 23, 2016
Title: Course Review and Final Examination
Activities:
  • Project 11.1: Document Retention Policy and Litigation Hold Notices (22%)
  • Exam 11.2: Final Exam (24%)
EVALUATION AND GRADING
Graded assignments will be evaluated using the following weighted categories:
  • Assignment 20%
  • Lab 20%
  • Project 22%
  • Discussion 6%
  • Quiz 8%
  • Exam 24%
(Click here for a PDF copy of the entire student syllabus.)
Your browser is out-of-date!

You need to update your browser to view Foliotek correctly. Update my browser now

×