Course Outline

MGMT 402 : Legal Issues in Information Security

Preview Workflow

Viewing: MGMT 402-WW : Legal Issues in Information Security

Last approved: Wed, 20 Jan 2016 13:31:45 GMT

Last edit: Wed, 20 Jan 2016 13:31:44 GMT

MGMT 402-WW
Campus
Worldwide
College of Business (WBUAD)
MGMT
402
Legal Issues in Information Security
3
This course addresses the area where law and information security concerns intersect. Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous information security and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers.

The purpose of this course is to introduce students to a variety of information security legal issues. The course discusses common concepts in information security, privacy, and the law. It also introduces the federal and state laws and legal concepts that affect how government and organizations think about information security. In addition, the course introduces how to create an effective information security program that addresses the laws and compliance requirements.

Upon course completion, the student will be able to:

1. Discuss information security key concepts, terms, goals, concerns, and protection mechanism.

2. Describe basic privacy principles and explain privacy threats and key principles for privacy protection in information security.

3. Examine how security, privacy, and compliance fit together within the American legal system and describe common criminal law concepts and principles and their use in cybercrimes.

4. Recognize the business challenges facing financial institutions and other private and public companies with regard to information security.

5. List some of the challenges with cyber security and protecting children on the internet.

6. Outline the laws protecting medical records and health care information.

7. Articulate information security challenges and requirements at the federal government and the state level, and explain how the federal government and the state protect privacy and personal information in information systems.

8. Explain the basic concept and importance of intellectual property law and legal ownership.

9. Explain traditional contract law principles and their information security provisions.

10. Recognize key concepts and terms associated with information security governance and contingency planning.

Located on the Daytona Beach Campus, the Jack R. Hunt Library is the primary library for all students of the Worldwide Campus. The Chief Academic Officer strongly recommends that every faculty member, where appropriate, require all students in his or her classes to access the Hunt Library or a comparable college-level local library for research. The results of this research can be used for class projects such as research papers, group discussion, or individual presentations. Students should feel comfortable with using the resources of the library. 


Web & Chat: http://huntlibrary.erau.edu
Email:  library@erau.edu
Text: (386) 968-8843
Library Phone:  (386) 226-7656 or (800) 678-9428
Hourshttp://huntlibrary.erau.edu/about/hours.html
 

N/A
N/A

Written assignments must be formatted in accordance with the current edition of the Publication Manual of the American Psychological Association (APA) unless otherwise instructed in individual assignments.

ActivityPercent of Grade
Input Grading Item100

Undergraduate Grade Scale

90 - 100% A
80 - 89% B
70 - 79% C
60 - 69% D
0 - 60% F

Graduate Grade Scale

90 - 100% A
80 - 89% B
70 - 79% C
0 - 69% F
Augustus Hudson - 2/11/2015
hudsoa5db@erau.edu
Peter O’Reilly - 2/11/2015
oreilleyp@erau.edu
Aaron Glassman - 2/11/2015
glassf10@erau.edu
Bobby McMasters
mcmas245@erau.edu
Key: 399