School of Science, Technology, Engineering and Math Department of Information TechnologyISSC331: Legal Issues in Information Security 3 Credit Hours 8 Week Course Prerequisite(s): None Table of Contents Course Description Evaluation Procedures Course Scope Grading Scale Course Objectives Course Outline Course Delivery Method Policies Resources Academic Services Course Description (Catalog) This course examines information security issues and the law. The rapid growth of technology has given rise to legal issues surrounding technology. Information security is the practice of protecting information to ensure the goals of confidentiality, integrity and availability are met. Information security makes sure that accurate information is available to authorized individuals when it is needed. When governments, private organizations, and individuals do a poor job of protecting the information entrusted to them, legislatures respond with new laws. The course will examine key conflicts involving technology and the legal system to include: privacy issues, civil, criminal, and administrative law, Children’s Online Privacy Protection Act (COPPA), Sarbanes Oxley, and information security governance. This course examines current literature on such topics. Course Scope This course offers an overview of the legal processes involved in implementing and maintaining an e-commerce Web site. In addition, this course examines security issues involved in maintaining a Web or intranet/Internet site and opportunities for misuse. Course Objectives The successful student will fulfill the following learning objectives: CO-1: Describe common concepts in information security, privacy and the law CO-2: Categorize the basic components and structure of the federal and state court systems CO-3: Analyze the types of crimes that have evolved due to the use of technology and the laws that are in place to support them CO-4: Differentiate between civil, criminal, common, and administrative law CO-5: Analyze the issues surrounding jurisdiction that have been created by technology CO-6: Critique the federal and state laws and legal concepts that affect how governments and organizations think about information security CO-7: Explain reasonable expectations of privacy on the Internet CO-8: Compare and contrast information security programs that address the laws and compliance requirements Course Delivery Method This course offers an overview of the legal processes involved in implementing and maintaining an e-commerce Web site. In addition, this course exa.