We are a society of laws, that regulate and guide the process of development of our human experience. Many of the existing laws can be applied to the new field of Cyber Law. Yet there is innovation on a daily basis, and with it new dangers and attacks created by those who wish to do harm. In an effort to defend society from these dangers, governments struggle to keep up and enact appropriate governing laws. Understanding the existing laws and interpreting the new laws as they come in to being, perhaps even contributing to their creation, is an important responsibility of the cyber security professional. Understanding those rules, laws, statutes, and regulations is this piece of our puzzle.
Purpose of Class:
This course is designed to provide fundamental skills needed to understand cyber law concepts such as trademark, copyright, patents, digital rights, computer crimes, privacy issues, hacking and prosecution etc. Given the rapid changes in technology, and the corresponding changes in crime and the law, the course will regularly include discussions of current events. There are no prerequisites, and there will be a final examination.
Course Learning Outcomes:
Students who successfully complete this class will be able to:
- Describe laws governing cyberspace and analyze the role of Internet Governance in framing policies for Internet security
- Discuss different types of cybercrimes and analyze legal frameworks of different countries to deal with these cybercrimes
- Explain the importance of jurisdictional boundaries and identify the measures to overcome cross jurisdictional cyber crimes
- Illustrate the importance of ethics in legal profession and determine the appropriate ethical and legal behavior according to legal frameworks
- Identify intellectual property right issues in the cyberspace and design strategies to protect your intellectual property
- Assess the legal issues with online trading, and analyze applicable e-contracting and taxation regulations
- Create security policy to comply with laws governing privacy and develop the policies to ensure secure communication
- Recognize the importance of digital evidence in prosecution and compare laws of different countries that govern Standard Operating Procedures (SOP) for handling evidence
Project Management in IT Security
The Hacker Mind: Profiling the IT Criminal
Introduction to Cloud Computing