Course Description
This course will focus on an overview of the legal processes involved in implementing and maintaining an e-commerce website. In addition, the course examines security issues involved in maintaining a web or intranet/internet site and potentials for misuse. (3 credits)
Prerequisite
- ITE 145: Fundamentals of Information Systems Security OR CSS 101 Cybersecurity Fundamentals
Student Learning Outcomes (SLOs)
Students who successfully complete this course will be able to:
- Recognize fundamental concepts of information systems security (ISS)
- Examine the concept of privacy and its legal protections.
- Identify the basic components of the American Legal System.
- Describe legal compliance laws addressing how financial institutions protect the security and privacy of consumer financial information.
- Describe the main parts of the Health Information Portability and Accountability Act (HIPAA) and how it protects healthcare information.
- Describe laws that protect children on the Internet and laws that protect information of children in legal settings.
- Describe legal compliance laws that address public and private institutions.
- Identify the key components of the Federal Information Security Management Act.
- Describe state legal compliance laws addressing public and private institutions.
- Analyze intellectual property laws.
- Describe the role of contracts in online transactions and cyberspace.
- Identify cybercrime and tort law issues in cyberspace.
- Examine the principles requiring governance of information within organizations.
- Explain the importance of risk management and contingency planning.
- Explain the importance of forensics examination in legal proceedings.
- Analyze the conception, enforcement and implementation of security policies.
- Use risk analysis to develop a response to any given situation that might arise from a violation of security policies.
Course Activities and Grading
Assignments | Weight |
---|---|
Discussions (Weeks 1-7) | 6% |
Written Assignments (Weeks 1-7) | 20% |
Lab Assignments (Weeks 1-7) | 20% |
Quizzes (Weeks 3, 5 & 6) | 6% |
Project (Week 8) | 24% |
Final Exam (Week 8) | 24% |
Total | 100% |
Required Textbooks
Available through Charter Oak State College's Book Bundle
- Grama, Joanna L (2022). Legal and Privacy Issues in Information Security- with Access Code. 3rd ed., Burlington, MA: Jones & Bartlett. ISBN-13: 9781284220476
- Note: This is a bundle which includes the textbook and the Access Code required for this course. We discourage students from purchasing “used” materials from other sources due to access codes not working properly.
Course Schedule
Week | SLOs | Readings and Exercises | Assignments |
1 | 1,2 | Topic: Information Systems Security Overview
|
|
2 | 3 | Topic: The American Legal System
|
|
3 | 4,5 | Topic: Security & Privacy of Financial & Health Information
|
|
4 | 6,7 | Topics: Security & Privacy Involving Corporation & Educational Institutions
|
|
5 | 8,9,10 | Topic: FISMA, Breach Notification & Intellectual Property Laws
|
|
6 | 11,12,13 | Topic: Cyberspace Law & Information Security Governance
|
|
7 | 14,15 | Topics: Risk Analysis, Incident Response & Computer Forensics
|
|
8 | 16,17 | Topics: Course Review and Final Examination
|
|
COSC Accessibility Statement
Charter Oak State College encourages students with disabilities, including non-visible disabilities such as chronic diseases, learning disabilities, head injury, attention deficit/hyperactive disorder, or psychiatric disabilities, to discuss appropriate accommodations with the Office of Accessibility Services at OAS@charteroak.edu.
COSC Policies, Course Policies, Academic Support Services and Resources
Students are responsible for knowing all Charter Oak State College (COSC) institutional policies, course-specific policies, procedures, and available academic support services and resources. Please see COSC Policies for COSC institutional policies, and see also specific policies related to this course. See COSC Resources for information regarding available academic support services and resources.