• Online, Instructor-Led
Course Description

Provides an overview of the ethical challenges faced by individuals and organizations in the information age and introduces the complex and dynamic state of the law as it applies to behavior in cyberspace. Topics include the legal pitfalls of doing business in an interconnected world and an introduction to the various organizations and materials that can be turned to for assistance in understanding how to ethically and legally provide services and operate modern computer-based systems and networks.

Learning Objectives

  • Identify and apply the governance processes required of the statutes and regulations pertaining to information assurance.
  • Analyze and evaluate proposed or extant information security policies, practices and procedures in order to assess, in concert with their organization's legal representatives and advisors, potential legal liabilities that might flow from implementing them.
  • Use basic ethical theories to evaluate the fairness of a proposed or extant collection of policies, laws, regulations, guidelines and practices designed to mitigate the liability risks and punish the misuse of on-line systems.
  • Identify the public policy issues and user expectations regarding privacy and apply privacy rules to management and operation of information infrastructures.
  • Identify and apply the legal and regulatory compliance requirements pertaining to the acquisition, use and licensing of intellectual property.  This includes the federal laws governing copyrights, patents and trade secrets, and both federal and state laws governing trade and service marks.
  • Identify and apply the legal and regulatory compliance requirements pertaining to electronic commerce.
  • Be able to explain the role of scientists and engineering expert witnesses in litigation.
  • Develop legally sound information handling requirements for responding to subpoenas, discovery demands, and cyber attack incident response processes and procedures.

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.