Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your cur

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your cur 1

School of Computer & Information Sciences
COURSE SYLLABUS

Course Name:

ISOL/MSDF 633 – Legal, Regulations, Investigations, and Compliance
Section – 13X
Summer 2019 – Second Bi-term – Online (Asynchronous)

Residency Session Date: Not Applicable
Residency Session Course Site: Not Applicable

Professor:

Dr. Jeff Sallee

Contact Information:

Office Hours: By appointment

E-mail: [email protected]

Online Support (IT) and I-Learn Policy:

All members of the University of the Cumberlands’ community who use the University’s computing, information or communication resources must act responsibly. http://www.ucumberlands.edu/it/downloads/terms.pdf

Course Website:

Access to the course website is required via the iLearn portal on the University of the Cumberlands website: http://www.ucumberlands.edu/ilearn/

Course Description:

The course examines computer crimes, laws and regulations. It includes techniques for investigating a

crime, gathering evidence, and communicating results.

Alignment Matrix

Course Objectives/Learner Outcomes:

Upon completion of this course, the student will:

  • Recognize the legal aspects of information security systems.

  • Examine the concept of privacy and its legal protections.

  • Identify the basic components of the American legal system.

  • Describe legal compliance laws addressing how public and private institutions protect the security and privacy of consumer financial information.

  • Analyze intellectual property laws.

  • Describe the role of contracts in online transactions and cyberspace.

  • Identify cybercrime and tort law issues in cyberspace.

  • Examine the principles requiring governance of information within organizations.

  • Identify risk analysis and incident response procedures.

  • Explain the importance of forensic examination in legal proceedings.

Prerequisites:

There are no prerequisites for this course.

Books and Resources:

Grama, Joanna Lyn. Legal Issues in Information Security, 2nd ed. Burlington, MA: Jones & Bartlett Learning, 2015

Student Lab Manual and Lab Access Key (also known as supplemental Lessons)

Other articles and readings may be assigned by course professor.

Course Expectations

Course Activities and Experiences:

Students are expected to:

• Review any assigned reading material, complementary materials, and weekly lectures and prepare responses to homework assigned.

• Actively participate in activities, assignments, and discussions.

• Evaluate and react to each other’s work in a supportive, constructive manner.

• Complete specific assignments and exams when specified and in a professional manner.

• Utilize learned technologies for class assignments.

• Connect content knowledge from core courses to practical training placement and activities.

Academic Integrity:

At a Christian liberal arts university committed to the pursuit of truth and understanding, any act of academic dishonesty is especially distressing and cannot be tolerated. In general, academic dishonesty involves the abuse and misuse of information or people to gain an undeserved academic advantage or evaluation. The common forms of academic dishonesty include:

  • Cheating – using deception in the taking of tests or the preparation of written work, using unauthorized materials, copying another person’s work with or without consent, or assisting another in such activities.

  • Lying – falsifying, fabricating, or forging information in either written, spoken, or video presentations.

  • Plagiarism—using the published writings, data, interpretations, or ideas of another without proper documentation

Plagiarism includes copying and pasting material from the internet into assignments without properly citing the source of the material. Even if you cite the source, if the majority of your work is someone else’s work, it is considered plagiarism. See https://www.plagiarism.org/article/what-is-plagiarism for more information.


Episodes of academic dishonesty are reported to the Vice President for Academic Affairs. The potential penalty for academic dishonesty includes a failing grade on a particular assignment, a failing grade for the entire course, or charges against the student with the appropriate disciplinary body.

Attendance Policy:

Residency Attendance: If a residency session is required for this course, each student must be in attendance for the entire duration of the required residency weekend.  Late arrivals and/or early departures are not permitted.  Punctuality is important as each student is required to have the documented in-seat time per USCIS regulations.  If a student is not in attendance for the full session, he/she will be counted absent for the entire session, and receive an automatic “F” and will be required to pay the $300.00 make-up fee and attend a residency make-up session.

Disability Accommodations:

University of the Cumberlands accepts students with certified disabilities and provides reasonable accommodations for their certified needs in the classroom, in housing, in food service or in other areas. For accommodations to be awarded, a student must submit a completed Accommodations Application form and provide documentation of the disability to the Disability Services Coordinator (Mr. Jacob Ratliff, Boswell Campus Center, Student Services Office Suite, [email protected]). When all paperwork is on file, a meeting between the student and the Coordinator will be arranged to discuss possible accommodations before accommodations are formally approved. Students must then meet with the Coordinator at the beginning of each semester before any academic accommodations can be certified for that term. Certifications for other accommodations are normally reviewed annually.

Student Responsibilities:

  • The only authorized electronic means of academic, administrative, and co-curricular communication between University of the Cumberlands and its students is through the UCumberlands email system (i.e. Webmail). Each student is responsible for monitoring his/her University email account frequently. This is the primary email account used to correspond with you directly by the University; imperative program information is sent to this email account specifically from campus and program office.

  • Students should check for e-mail and class announcements using iLearn (primary) and University of the Cumberlands webmail (secondary).

  • Students are expected to find out class assignments for missed classes and make up missed work.

  • Students are expected to find out if any changes have been made in the class or assignment schedule.

  • Written work must be presented in a professional manner. Work that is not
    submitted in a professional manner will not be evaluated and will be returned as unacceptable.

  • There is a craft to writing. Spelling, grammar, punctuation and diction (word usage) are all tools of that craft. Writing at the collegiate level will show careful attention to these elements of craft. Work that does not exhibit care with regard to these elements will be considered as inadequate for college writing and graded accordingly.

  • Students are expected to take the examinations on the designated dates. If you are unable to take the exam on the scheduled date and know in advance, you are to make arrangements with your professor before the designated date. If you miss the exam, you must have a legitimate reason as determined by your professor.

Deadlines and Dues Dates:

Recognizing that a large part of professional life is meeting deadlines, it is necessary to develop time management and organizational skills. Failure to meet the course deadlines may result in penalties. Keep in mind that all deadlines are set using Eastern Standard Time (EST). Late assignments will NOT be accepted.

Writing Expectations:

Learning outcomes for candidates’ writing competencies include clarity of thought, discernment in planning and organization, and integration of evidence and criteria.

  • The instructor expects that students will have knowledge of appropriate forms of documentation and use it where appropriate. APA format is required and style of notation to credit all sources that are not your own.

  • There is a craft to writing. Spelling, grammar, punctuation and diction (word usage) are all tools of that craft. Writing at the collegiate level will show careful attention to these elements of craft. Work that does not exhibit care with regard to these elements will be considered as inadequate for college writing and graded accordingly.

  • All assignments, unless otherwise instructed, should be submitted in APA format.

Participation Policy:

Study after study has linked successful academic performance with good class participation. Those who assume positions of responsibility must “show up” in order to be effective. Therefore, students are expected to actively participate in intelligent discussion of assigned topics in all areas (Discussion Board Activities, Synchronous Sessions, Forums, Shared Papers, etc.) to help process course material and/or to demonstrate understanding of course content. Point adjustments will be taken for non-participation.

Academic Appeals:

Both undergraduate and graduate students have the right to challenge a grade. If discussions with the course instructor and department chair do not lead to a satisfactory conclusion, students may file a formal written appeal with the Vice President for Academic Affairs, who will forward the appeal to the chair of the Academic Appeals Committee. This formal written appeal must be filed by the end of the 4th week of classes in the next regular term following the term in which the course in question was taken. The Academic Appeals Committee then gathers information from the student, the instructor, and any other relevant parties. The Committee will deliver its recommendation on the complaint to the Vice President for Academic Affairs. After reviewing this recommendation and concurring or amending it, the Vice President for Academic Affairs will inform the student and instructor of the disposition of the complaint no later than the last day of classes of the term in which the complaint was filed. Records of all actions regarding academic grade appeals, including their final disposition, are maintained by the Vice President for Academic Affairs and the Academic Appeals Committee. (Undergraduate Catalog/Graduate Catalog)

Links to Support:

Orientation to I-Learn: Student training course on I-Learn, https://ucumberlands.blackboard.com/webapps/portal/frameset.jsp

Book Store: http://cumber.bncollege.com/webapp/wcs/stores/servlet/BNCBHomePage?storeId=50059&catalogId=10001&langId=-1

Library: http://www.ucumberlands.edu/library/

Course Assignments and Evaluation

Evaluation Method:

Graded work will receive a numeric score reflecting the quality of performance. Relative weights assigned to graded work are as follows:

Course Evaluation

Students will be evaluated on:

Description

Weight

1.

Two Exams - Tentative dates for the Exams are given below. Exams may consist of multiple choice, short answer, discussion, and other security related questions.

30% (Midterm)

30% (Final)

2.

Homework Assignments and Quizzes – Assignments and quizzes will be given throughout the term. Assignments will come from the lecture materials, discussion questions, and reading assignments.

19% (Quizzes)

0% (Labs)

3.

Discussion Posts

15%

4.

Practical Connection Assignment

5%

5.

Syllabus Confirmation

1%

6.

For Classes with a residency component, a group paper and a group presentation will be a significant portion of your grade.

N/A

Grading Scale:

Graded work will receive a numeric score reflecting the quality of performance as given above in evaluation methods. The overall course grade will be determined according to the following scale: A= 90 – 100 (90% - 100%)

B= 80 – 89 (80% - 89%)

C = 70 – 79 (70% - 79%)

F < 69 (Below 69%)


Syllabus Disclaimer:

This syllabus is intended as a set of guidelines for this course and the professor reserves the right to make modifications in content, schedule, and requirements as necessary to promote the best education possible within conditions affecting this course. Any changes to the syllabus will be discussed with the students.

Tentative Course Expectations (specific due dates are listed in the course module)


Week

Topic

Assignments

1

Information Security Overview Concepts of confidentiality, integrity, and availability (the C-I-A triad) associated with information system security Basic information systems security concepts Risk analysis and mitigation Mechanisms for organizational information security Data classifications requiring specialized legal consideration Reading: Chapter 1 Lab #1 Creating an IT Infrastructure Asset List and Identifying Where Privacy Data Resides
Privacy Overview Why is privacy an issue? How is privacy different from information security? Privacy laws Threats to privacy in the information age Principles of privacy protection in information systems

Reading: Chapter 2

Lab #2 Case Study on U.S. Veterans Affairs and Loss of Privacy Information
Quiz Due Sunday, July 7 Confirmation of Syllabus, July 7

2

The American Legal System Components of the American legal system Code versus common law Categories of law How precedent affects the law Security, privacy, compliance, and auditing

Reading: Chapter 3


Security and Privacy of Consumer Financial Information Financial institutions and the protection of information they collect Financial regulatory laws and government regulatory bodies The Gramm-Leach-Bliley Act and financial institutions The Federal Trade Commission Red Flags Rule Payment Card Industry (PCI) Standards

Reading: Chapter 4

Lab # 3 Case Study on PCI DSS Noncompliance: CardSystems Solutions
Quiz Due Sunday, July 14 Discussion #1 Due, July 14

3

Security and Privacy of Information Belonging to Children and in Educational Records Protecting children on the Internet Family Educational Rights and Privacy Act (FERPA) Children’s Online Privacy Protection Act (COPPA) Children’s Internet Protection Act (CIPA) Understand differences between purpose and scope of FERPA, COPPA, CIPA

Reading: Chapter 5


Security and Privacy of Health Information The health care industry and information privacy Health Information Portability and Accountability Act (HIPAA) State laws regarding confidentiality and privacy of records Why health care information is sensitive

Reading: Chapter 6

Lab #4 Analyzing and Comparing GLBA and HIPAA
Quiz Due Sunday, July 21 Discussion #2 Due, July 21

4

Corporate Information Security and Privacy Regulation Sarbanes-Oxley (SOX) Act Compliance and security controls Corporate privacy issues Public and private companies Influence of law on security practices

Reading: Chapter 7

Lab #5 Case Study on Issues Related to Sharing Consumers’ Confidential Information
Federal Government Information Security and Privacy Regulations Federal government information security and privacy regulation Federal Information Security Management Act (FISMA) Import and export laws for information technology Security challenges facing the federal government Office of Management and Budget (OMB)

Reading: Chapter 8


Midterm Due Sunday, July 28

5



State Laws Protecting Citizen Information and Breach Notification Laws State regulation of privacy and information security State data breach notification State encryption regulations State data disposal regulations History of state privacy protection laws

Reading: Chapter 9

Lab #6 Identifying the Scope of Your State’s Data and Security Breach Notification Law
Intellectual Property Law The importance of protecting intellectual property Legal ownership and its protection Patents Trademarks Copyright

Reading: Chapter 10

Lab #7 Case Study on Digital Millennium Recording Act: Napster
Quiz Due Sunday, Aug 4 Discussion #3 Due, Aug 4

6

The Role of Contracts General principles of contract law Contracts in cyberspace and online transactions Shrinkwrap, clickwrap, and browsewrap agreements End user license agreements (EULAs) Information security provision

Reading: Chapter 11


Criminal Law and Tort Law Issues in Cyberspace General principles of criminal law Cybercrime General principles of tort law Tort concepts in cyberspace Laws governing cybercrime

Reading: Chapter 12

Lab #8 Cyberstalking or Cyberbullying and Laws to Protect Individuals Practical Connection Assignment Due Sunday, Aug 11
Quiz Due Sunday, Aug 11 Discussion #4 Due, Aug 11

7

Information Security Governance High-level policies Information security standards Use of security guidelines Security procedures Military and civilian governance of information

Reading: Chapter 13


Risk Analysis, Incident Response, and Contingency Planning Risk analysis Incident response procedures Disaster recovery plans Contingency planning Business continuity planning

Reading: Chapter 14

Lab #9 Recommending IT Security Policies to Help Mitigate Risk
Quiz Due Sunday, Aug 18

8

Computer Forensics and Investigations Cybercrime investigations Digital evidence Chain of custody Laws affecting collection of digital evidence Role of computer forensic examiner Final evaluations

Reading: Chapter 15

Lab #10 Case Study on Computer Forensics: Pharmaceutical Company
Semester Summary Final evaluations FINAL EXAM Exam Due Tuesday, August 20.


6