Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your cur
School of Computer & Information Sciences | |||||||||||||||||||||||
Course Name: | ISOL/MSDF 633 – Legal, Regulations, Investigations, and Compliance Residency Session Date: Not Applicable | ||||||||||||||||||||||
Professor: | Dr. Jeff Sallee | ||||||||||||||||||||||
Contact Information: | Office Hours: By appointment E-mail: [email protected] | ||||||||||||||||||||||
Online Support (IT) and I-Learn Policy: | All members of the University of the Cumberlands’ community who use the University’s computing, information or communication resources must act responsibly. http://www.ucumberlands.edu/it/downloads/terms.pdf | ||||||||||||||||||||||
Course Website: | Access to the course website is required via the iLearn portal on the University of the Cumberlands website: http://www.ucumberlands.edu/ilearn/ | ||||||||||||||||||||||
Course Description: | The course examines computer crimes, laws and regulations. It includes techniques for investigating a crime, gathering evidence, and communicating results. | ||||||||||||||||||||||
Alignment Matrix | Course Objectives/Learner Outcomes: Upon completion of this course, the student will:
| ||||||||||||||||||||||
Prerequisites: | There are no prerequisites for this course. | ||||||||||||||||||||||
Books and Resources: | Grama, Joanna Lyn. Legal Issues in Information Security, 2nd ed. Burlington, MA: Jones & Bartlett Learning, 2015 Student Lab Manual and Lab Access Key (also known as supplemental Lessons) Other articles and readings may be assigned by course professor. | ||||||||||||||||||||||
Course Expectations | |||||||||||||||||||||||
Course Activities and Experiences: | Students are expected to: • Review any assigned reading material, complementary materials, and weekly lectures and prepare responses to homework assigned. • Actively participate in activities, assignments, and discussions. • Evaluate and react to each other’s work in a supportive, constructive manner. • Complete specific assignments and exams when specified and in a professional manner. • Utilize learned technologies for class assignments. • Connect content knowledge from core courses to practical training placement and activities. | ||||||||||||||||||||||
Academic Integrity: | At a Christian liberal arts university committed to the pursuit of truth and understanding, any act of academic dishonesty is especially distressing and cannot be tolerated. In general, academic dishonesty involves the abuse and misuse of information or people to gain an undeserved academic advantage or evaluation. The common forms of academic dishonesty include:
Plagiarism includes copying and pasting material from the internet into assignments without properly citing the source of the material. Even if you cite the source, if the majority of your work is someone else’s work, it is considered plagiarism. See https://www.plagiarism.org/article/what-is-plagiarism for more information. Episodes of academic dishonesty are reported to the Vice President for Academic Affairs. The potential penalty for academic dishonesty includes a failing grade on a particular assignment, a failing grade for the entire course, or charges against the student with the appropriate disciplinary body. | ||||||||||||||||||||||
Attendance Policy: | Residency Attendance: If a residency session is required for this course, each student must be in attendance for the entire duration of the required residency weekend. Late arrivals and/or early departures are not permitted. Punctuality is important as each student is required to have the documented in-seat time per USCIS regulations. If a student is not in attendance for the full session, he/she will be counted absent for the entire session, and receive an automatic “F” and will be required to pay the $300.00 make-up fee and attend a residency make-up session. | ||||||||||||||||||||||
Disability Accommodations: | University of the Cumberlands accepts students with certified disabilities and provides reasonable accommodations for their certified needs in the classroom, in housing, in food service or in other areas. For accommodations to be awarded, a student must submit a completed Accommodations Application form and provide documentation of the disability to the Disability Services Coordinator (Mr. Jacob Ratliff, Boswell Campus Center, Student Services Office Suite, [email protected]). When all paperwork is on file, a meeting between the student and the Coordinator will be arranged to discuss possible accommodations before accommodations are formally approved. Students must then meet with the Coordinator at the beginning of each semester before any academic accommodations can be certified for that term. Certifications for other accommodations are normally reviewed annually. | ||||||||||||||||||||||
Student Responsibilities: |
| ||||||||||||||||||||||
Deadlines and Dues Dates: | Recognizing that a large part of professional life is meeting deadlines, it is necessary to develop time management and organizational skills. Failure to meet the course deadlines may result in penalties. Keep in mind that all deadlines are set using Eastern Standard Time (EST). Late assignments will NOT be accepted. | ||||||||||||||||||||||
Writing Expectations: | Learning outcomes for candidates’ writing competencies include clarity of thought, discernment in planning and organization, and integration of evidence and criteria.
| ||||||||||||||||||||||
Participation Policy: | Study after study has linked successful academic performance with good class participation. Those who assume positions of responsibility must “show up” in order to be effective. Therefore, students are expected to actively participate in intelligent discussion of assigned topics in all areas (Discussion Board Activities, Synchronous Sessions, Forums, Shared Papers, etc.) to help process course material and/or to demonstrate understanding of course content. Point adjustments will be taken for non-participation. | ||||||||||||||||||||||
Academic Appeals: | Both undergraduate and graduate students have the right to challenge a grade. If discussions with the course instructor and department chair do not lead to a satisfactory conclusion, students may file a formal written appeal with the Vice President for Academic Affairs, who will forward the appeal to the chair of the Academic Appeals Committee. This formal written appeal must be filed by the end of the 4th week of classes in the next regular term following the term in which the course in question was taken. The Academic Appeals Committee then gathers information from the student, the instructor, and any other relevant parties. The Committee will deliver its recommendation on the complaint to the Vice President for Academic Affairs. After reviewing this recommendation and concurring or amending it, the Vice President for Academic Affairs will inform the student and instructor of the disposition of the complaint no later than the last day of classes of the term in which the complaint was filed. Records of all actions regarding academic grade appeals, including their final disposition, are maintained by the Vice President for Academic Affairs and the Academic Appeals Committee. (Undergraduate Catalog/Graduate Catalog) | ||||||||||||||||||||||
Links to Support: | Orientation to I-Learn: Student training course on I-Learn, https://ucumberlands.blackboard.com/webapps/portal/frameset.jsp Book Store: http://cumber.bncollege.com/webapp/wcs/stores/servlet/BNCBHomePage?storeId=50059&catalogId=10001&langId=-1 Library: http://www.ucumberlands.edu/library/ | ||||||||||||||||||||||
Course Assignments and Evaluation | |||||||||||||||||||||||
Evaluation Method: | Graded work will receive a numeric score reflecting the quality of performance. Relative weights assigned to graded work are as follows: | ||||||||||||||||||||||
Course Evaluation | Students will be evaluated on:
| ||||||||||||||||||||||
Grading Scale: | Graded work will receive a numeric score reflecting the quality of performance as given above in evaluation methods. The overall course grade will be determined according to the following scale: A= 90 – 100 (90% - 100%) B= 80 – 89 (80% - 89%) C = 70 – 79 (70% - 79%) F < 69 (Below 69%) | ||||||||||||||||||||||
|
Syllabus Disclaimer:
This syllabus is intended as a set of guidelines for this course and the professor reserves the right to make modifications in content, schedule, and requirements as necessary to promote the best education possible within conditions affecting this course. Any changes to the syllabus will be discussed with the students.
Tentative Course Expectations (specific due dates are listed in the course module)
Week | Topic | Assignments |
1 | Information Security Overview Concepts of confidentiality, integrity, and availability (the C-I-A triad) associated with information system security Basic information systems security concepts Risk analysis and mitigation Mechanisms for organizational information security Data classifications requiring specialized legal consideration Reading: Chapter 1 | Lab #1 Creating an IT Infrastructure Asset List and Identifying Where Privacy Data Resides |
Privacy Overview Why is privacy an issue? How is privacy different from information security? Privacy laws Threats to privacy in the information age Principles of privacy protection in information systems Reading: Chapter 2 | Lab #2 Case Study on U.S. Veterans Affairs and Loss of Privacy Information Quiz Due Sunday, July 7 Confirmation of Syllabus, July 7 | |
2 | The American Legal System Components of the American legal system Code versus common law Categories of law How precedent affects the law Security, privacy, compliance, and auditing Reading: Chapter 3 | |
Security and Privacy of Consumer Financial Information Financial institutions and the protection of information they collect Financial regulatory laws and government regulatory bodies The Gramm-Leach-Bliley Act and financial institutions The Federal Trade Commission Red Flags Rule Payment Card Industry (PCI) Standards Reading: Chapter 4 | Lab # 3 Case Study on PCI DSS Noncompliance: CardSystems Solutions Quiz Due Sunday, July 14 Discussion #1 Due, July 14 | |
3 | Security and Privacy of Information Belonging to Children and in Educational Records Protecting children on the Internet Family Educational Rights and Privacy Act (FERPA) Children’s Online Privacy Protection Act (COPPA) Children’s Internet Protection Act (CIPA) Understand differences between purpose and scope of FERPA, COPPA, CIPA Reading: Chapter 5 | |
Security and Privacy of Health Information The health care industry and information privacy Health Information Portability and Accountability Act (HIPAA) State laws regarding confidentiality and privacy of records Why health care information is sensitive Reading: Chapter 6 | Lab #4 Analyzing and Comparing GLBA and HIPAA Quiz Due Sunday, July 21 Discussion #2 Due, July 21 | |
4 | Corporate Information Security and Privacy Regulation Sarbanes-Oxley (SOX) Act Compliance and security controls Corporate privacy issues Public and private companies Influence of law on security practices Reading: Chapter 7 | Lab #5 Case Study on Issues Related to Sharing Consumers’ Confidential Information |
Federal Government Information Security and Privacy Regulations Federal government information security and privacy regulation Federal Information Security Management Act (FISMA) Import and export laws for information technology Security challenges facing the federal government Office of Management and Budget (OMB) Reading: Chapter 8 | Midterm Due Sunday, July 28 | |
5 | State Laws Protecting Citizen Information and Breach Notification Laws State regulation of privacy and information security State data breach notification State encryption regulations State data disposal regulations History of state privacy protection laws Reading: Chapter 9 | Lab #6 Identifying the Scope of Your State’s Data and Security Breach Notification Law |
Intellectual Property Law The importance of protecting intellectual property Legal ownership and its protection Patents Trademarks Copyright Reading: Chapter 10 | Lab #7 Case Study on Digital Millennium Recording Act: Napster Quiz Due Sunday, Aug 4 Discussion #3 Due, Aug 4 | |
6 | The Role of Contracts General principles of contract law Contracts in cyberspace and online transactions Shrinkwrap, clickwrap, and browsewrap agreements End user license agreements (EULAs) Information security provision Reading: Chapter 11 | |
Criminal Law and Tort Law Issues in Cyberspace General principles of criminal law Cybercrime General principles of tort law Tort concepts in cyberspace Laws governing cybercrime Reading: Chapter 12 | Lab #8 Cyberstalking or Cyberbullying and Laws to Protect Individuals Practical Connection Assignment Due Sunday, Aug 11 Quiz Due Sunday, Aug 11 Discussion #4 Due, Aug 11 | |
7 | Information Security Governance High-level policies Information security standards Use of security guidelines Security procedures Military and civilian governance of information Reading: Chapter 13 | |
Risk Analysis, Incident Response, and Contingency Planning Risk analysis Incident response procedures Disaster recovery plans Contingency planning Business continuity planning Reading: Chapter 14 | Lab #9 Recommending IT Security Policies to Help Mitigate Risk Quiz Due Sunday, Aug 18 | |
8 | Computer Forensics and Investigations Cybercrime investigations Digital evidence Chain of custody Laws affecting collection of digital evidence Role of computer forensic examiner Final evaluations Reading: Chapter 15 | Lab #10 Case Study on Computer Forensics: Pharmaceutical Company |
Semester Summary Final evaluations | FINAL EXAM Exam Due Tuesday, August 20. |
6