Course Outline

MISA 506 : Cyber Law, Cyber Compliance, and Information Assurance

Preview Workflow

Viewing: MISA 506-WW : Cyber Law, Cyber Compliance, and Information Assurance

Last approved: Wed, 20 Jan 2016 14:10:00 GMT

Last edit: Wed, 20 Jan 2016 14:09:59 GMT

MISA 506-WW
Campus
Worldwide
College of Business (WBUAD)
MISA
506
Cyber Law, Cyber Compliance, and Information Assurance
3
Virtually every aspect of the way in which organizations collect, generate, use, modify and dispose of information as a part of their daily operations is quite likely the subject of laws, regulations, government policies, or other aspects of modern society. As governments continuously reset the balance between protecting the rights and needs of the individual citizen, vs. the need for business and government to get things done in cost-effective ways, these laws and regulations place dynamic, evolving functional requirements demands on the information systems that organizations must use. This course examines the many different regulatory regimes levied upon organizations by the marketplaces they operate in -- and guides the student in identifying key management considerations that should drive information systems design and operational use. One key fundamental concept emerges: information assurance, in assuring management that all of these compliance issues are effectively dealt with, is in and of itself a risk management decision. Prerequisites: MISA 501 and MISA 502

This course is designed to introduce students to the fundamentals of Cyber Law as stated in legislation, regulatory guidance and emerging case law. Government policy formulation related to information assurance will be discussed, as will foundations and recent developments various industry-specific regulatory environments. Students will explore the challenges in setting internal cyber security policy that remains consistent with legal and regulatory requirements while considering potential adverse effects on business practices and functional processes. Management’s legal responsibilities for reasonable system maintenance will be explored in light of recent case outcomes. E-Discovery and forensics will be considered in the context of civil and criminal legal environments.

Understand how the enterprise-wide, interdisciplinary nature of information security programs must comply and align with legal and regulatory requirements. Respond to changes in the legal and regulatory landscape to effect changes to systems and architectures. Discuss the interaction between internal governance functions and external legal and regulatory regimes with respect to setting internal security policy. Understand how the risks created or changed by new technology introduction must be considered from legal and regulatory perspectives. Discuss organizational challenges to enforcing internal policy and legal compliance. Understand key elements of regulatory requirements pertaining to information safeguarding. Analyze articles and case studies of actual legal proceedings related to information safeguarding.

Located on the Daytona Beach Campus, the Jack R. Hunt Library is the primary library for all students of the Worldwide Campus. The Chief Academic Officer strongly recommends that every faculty member, where appropriate, require all students in his or her classes to access the Hunt Library or a comparable college-level local library for research. The results of this research can be used for class projects such as research papers, group discussion, or individual presentations. Students should feel comfortable with using the resources of the library. 


Web & Chat: http://huntlibrary.erau.edu
Email:  library@erau.edu
Text: (386) 968-8843
Library Phone:  (386) 226-7656 or (800) 678-9428
Hourshttp://huntlibrary.erau.edu/about/hours.html
 

N/A
N/A

Written assignments must be formatted in accordance with the current edition of the Publication Manual of the American Psychological Association (APA) unless otherwise instructed in individual assignments.

Topic #NameDescriptionApprox. class time

ActivityPercent of Grade
Input Grading Item100

Undergraduate Grade Scale

90 - 100% A
80 - 89% B
70 - 79% C
60 - 69% D
0 - 60% F

Graduate Grade Scale

90 - 100% A
80 - 89% B
70 - 79% C
0 - 69% F
Wendi Kappers - 2/24/2015
KAPPERSW@erau.edu
Aaron Glassman - 2/24/2015
glassf10@erau.edu
Dr. Bobby McMasters - 2/24/2015
mcmas245@erau.edu
PO#NameDescription
1-5 Master of Science in Information Security and Assurance . Understand the interdisciplinary aspects (technical, business, management, and policy) of information assurance and information systems and organizational security.
2. Assess and manage the identification of and response to the changing nature of the information risks and information security challenges that increasingly complex, distributed organizations face.
3. Establish governance policies and management mechanisms necessary to develop, acquire, and operate sustainable, cost-effective secure information infrastructures.
4. Integrate various ethical, legal, technological and professional perspectives, both local and global, along with data protection and information assurance perspectives, throughout the various MIS decision making and managerial and leadership processes.
5. Manage and direct the development and operational use of information security and assurance procedures, policies and technologies throughout the organization.
Key: 331