Cybersecurity and the Law | Albany Law School
  • About
    • Overview
    • ABA Required Disclosures
    • Administration
    • Board of Trustees
    • Campus Policies and Notices
    • Employment
    • Events
    • Fact Sheet
    • General Directory
    • History
    • News
    • Our Affiliation with UAlbany
    • President and Dean Ouellette
    • Staff Directory
    • Strategic Plan
  • Admissions
    • Overview
    • J.D. Admissions
    • Graduate Admissions
    • Special Programs
    • Accepted Students
    • Check Application Status
    • Connect with Admissions
    • Make A Deposit
    • Financial Aid
    • Office of Admissions
  • Academics
    • Overview
    • Courses
    • Areas of Study
    • JD Program
    • Graduate Programs
    • Special Programs
    • Pathways Program
    • Experiential Learning
    • Learning Outcomes
    • Registrar
    • Academic Resources
    • Academic Partnerships
  • Careers
    • Overview
    • Students
    • Employers
    • Alumni
    • Connect to AlbanyLaw Link
    • Employment Outcomes
    • Where Our Graduates Work
    • Career and Professional Development Center
    • Contact the Career and Professional Development Center
    • Women's Leadership Initiative
  • Student Life
    • Overview
    • Campus Resources
    • Commencement
    • Diversity, Equity & Inclusion
    • Health and Wellness
    • Living and Learning in Albany
    • Student Organizations
    • Student Spotlight
    • Veteran Services
  • Centers
    • Overview
    • The Justice Center
    • Government Law Center
    • Center for Excellence in Law Teaching
    • Cybersecurity and Privacy Law Center
    • Center for Judicial Process
    • Institute for Financial Market Regulation
    • Center for Continuing Legal Education
  • Faculty
    • Overview
    • Faculty Directory
    • Faculty Achievements
    • Faculty Scholarship and Research
    • Faculty Spotlight
    • Endowed and Distinguished Professorships
  • Alumni & Giving
    • Overview
    • Upcoming Events
    • Giving
    • Search Directories
    • Regional Alumni Network
    • National Alumni Association
    • Reunion
    • Class Notes
    • Volunteer and Mentor
    • Shared Interest Groups
    • Kate Stoneman
    • Institutional Advancement Team
Turn on more accessible mode
Turn off more accessible mode

COVID-19: Community Updates and Resources

Albany Law School

Calendar
|
Portal
|
Contact Us
|
gift box Donate
Calendar
Donate
Contact Us
Alba
ny
Law School
Back
Sign In
Home / Academics / Areas of Study / Cybersecurity and the Law

Cybersecurity and the Law

  • Academics
    • Courses
    • Areas of StudyCurrently selected
      • Alternative Dispute Resolution
      • Business Law
      • Civil and Constitutional Rights
      • Civil Litigation
      • Criminal Law
      • Cybersecurity and the Law
      • Elder Law
      • Environmental Law
      • Family Law
      • Government Law and Policy
      • Health Law
      • Intellectual Property
      • International Law
      • Labor and Employment Law
      • Social Entrepreneurship and Law
      • Tax Law
      • Trusts and Estates Law
    • JD Program
    • Graduate Programs
    • Special Programs
    • Pathways Program
    • Experiential Learning
    • Learning Outcomes
    • Registrar
    • Academic Resources
      • Academic and Professional Success
      • Academic Calendar
      • Schaffer Law Library
    • Academic Partnerships
      • Study Abroad
SideContent

​

Cybersecurity and the Law

Content-0

Requirements:

15 credits from the following courses and additional experiential credits:

*JD program allows only 15 credits of online classes to be counted towards the degree.

Required:

  • Title
  • Credits
  • Cybersecurity Frameworks
    Credits: 3

    This is the capstone course for the cybersecurity and privacy program. Students successfully completing this course will generate real-world cybersecurity documents including: a risk assessment, risk management strategy, needs analysis, GAP analysis, and risk treatment plan. This graduate-level course outlines the challenges surrounding critical infrastructure sector security and explains how implementing a security program based on the different cybersecurity frameworks can help organizations mitigate these issues. Students will critique the strengths and weaknesses of frameworks such as the NIST Cybersecurity Framework, COBIT 5, NIST 800-53, ISO 270001, and CIS critical security controls for cybersecurity.

    Weaver, Robert III E.

  • Cybersecurity Law and Policy Seminar: Private Entities
    Credits: 3

    This course is designed to expose students to the issues involved in cybersecurity law, both from a national policy standpoint and from a corporate counsel view. Cybersecurity is the protection of electronic data and systems from attack, loss, or other compromise. Electronic data and systems include governmental records, and investor and private firm information, and the hardware and software systems used to generate and maintain that data.

    Haynes, Antony

Electives:

  • Compliance Skills: Auditing, Investigating and Reporting
    Credits: 3

    Katz, Adam J.

  • Cyber War, Intelligence and National Security
    Credits: 3

    This graduate-level course focuses on U.S. and international law governing offensive and defensive cyber effect operations, including those that constitute espionage, sabotage and subversion, as well as those that could lead to physical destruction of property and the loss of human life. In addition, this course addresses the role of various military and intelligence apparatuses in different countries in conducting cyber operations in opposing nations. In addition, this class will examine the interplay between the laws and the practices and policies of the United States Intelligence Community and national security system, both foreign and domestic. While discussion of the history of intelligence activities and laws dating from the origins of our colonial days will necessarily shape the framework of the class, the focus shall particularly be on current debates and challenges faced by the United States in the 21st Century.

    Haynes, Antony

    Wingo, Harry, Esq.

  • Cybercrime
    Credits: 3

    This course is designed to provide students with an overview of the legal, social, and technical impact of global "cybercrime." Cybercrime is loosely defined as a set of illegal activities that are facilitated through the use of computers or other technology devices. Examples of cybercrime include not only "traditional" crimes (e.g. identity theft or stalking) being carried out in a new medium, but a new set of activities in which the computer or computer network itself is a target of the attack. Topics will include the various state, federal and international laws, investigative measures and techniques used to identify, investigate, arrest and prosecute cybercriminals and cyberattacks, and the preventive measures that can be utilized to provide a secure environment for computer hardware and software. Active elements of the cyber underworld, including organized crime, terrorists and state sponsored activity, will be discussed. Students will become familiar with legal processes they may find themselves a part of, litigation, depositions and expert reporting. In addition, this course will address issues impacting the Fourth Amendment, forensics, electronic surveillance, computer hacking and cracking, intellectual property crimes, espionage, cyberterrorism, privacy, "forced disclosure," and the challenge of cross-jurisdiction enforcement.

    Deyo, Michael W., Esq.

    Skiba, Michael J.

  • Cybersecurity and Supply Chain Management
    Credits: 3

    This course exposes students to management practices for assessing the risk of cybersecurity in the supply chain across many industries and processes. Supply chain processes account for a significant portion of a company's costs ultimately resulting in delivery of goods or services to customers. Critical supply chain metrics and processes are required to make supply chain decisions. The Course will also investigate topics, such as vendor supply chain design logistics and security planning. Threats to the global supply chain are significant and costs billions of dollars per year. The Course will examine the cybersecurity threats to the supply chain and develop risk strategies in working with vendors as part of the supply chain. Key issues include organizational cyber intrusion incident response planning in the supply chain, developing a risk planning methodology, and cost associated with corporate breaches.

    Cobello, Rick

  • Cybersecurity Law and Policy: Public Entities
    Credits: 3

    This course is designed to expose students to the issues involved in cybersecurity law, both from a national policy standpoint and from a corporate counsel view. Cybersecurity is the protection of electronic data and systems from attack, loss, or other compromise. Electronic data and systems include governmental records, and investor and private firm information, and the hardware and software systems used to generate and maintain that data.

  • Cyberspace Law
    Credits: 3

    ​Focuses on the legal requirements of electronic commerce including issues of electronic contracting, tort, defamation, constitutional law, intellectual property, procedural, domestic and international conflicts and regulation.

    Students who have taken Internet Law will not receive credit for this class.

    Heverly, Robert

    Ferraro, Monique

  • Global Privacy Law
    Credits: 3

    This graduate-level course examines global data protection and privacy issues, with particular focus on the balance between an individual’s control of his/her personal information and the right of others to collect and use the individual’s personal information. The aim of the course is to understand the cultural, social, economic and political factors that influence data privacy and data protection laws around the world, including the European Union, Russia, China, Australia and Canada. The course will examine issues that include collection of data for commercial and governmental purposes, including but not limited to marketing. Attention will be paid to the new European General Data Protection Regulation, new data localization laws in China and Russia, and other current developments. US data privacy law will be addressed only in comparison to non-US approaches. Note: This course does NOT focus on US data privacy, which is instead the focus of Technology Privacy and the Law.

    Meyer, Christopher W.

  • Healthcare Compliance
    Credits: 3

    This course explores the legal aspects of health care compliance. At both the federal and state levels, the course addresses the statutory, regulatory, and case law that comprises the complex legal backdrop in which the healthcare industry operates. The course introduces the history, purpose, and substance of healthcare regulatory compliance programs and addresses legal doctrines concerning protected information, patient's rights, HIPAA security and breach, compliance issues in healthcare business transactions, and special topics related to substance use, mental health, HIV, genetic information, and minors.

    Zambri, Melissa M., Esq. '98

  • Independent Study in Cybersecurity & Privacy Law
    Credits: 3

    A qualifying Independent Research Paper (or Papers) allows a student to earn two, three or four academic credits for research and writing that produces a substantive paper, note, article or series of white papers on a legal topic. At least 12 or more pages of writing are required per credit. For LL.M. students, the written product must rely on the student’s original research, be of publishable quality, and include proper legal citation. For M.S. students, the written product must rely on the student’s original research, be of publishable quality, and include proper APA, MLA, Chicago-style or blue-book citation. To register for an Independent Legal Research Paper (or Papers), the student must draft a description of the proposed writing project; confer with, and secure the consent of, a supervising faculty member; and complete the Independent Legal Research Paper form (PDF). The completed Independent Research Paper form must be signed by the faculty member and submitted along with the project description to the Registrar for enrollment. Students completing an Independent Legal Research Paper must submit timesheets to the supervising faculty member every two weeks and must demonstrate a total of at least 42.5 hours per credit were devoted to the research and writing of the paper (or papers).

  • Technology, Privacy and the Law
    Credits: 3

    This course examines the impact of technology on information privacy law, while examining the evolution of the right to information privacy and personal autonomy under Constitutional, tort, statutory and international law. This course will explore how the law should balance privacy rights with national security concerns, given the advent of new technologies and information structures. This course will examine modern privacy developments involving, inter alia, social media, video surveillance, “big data” practices, DNA databanking, the collection of health information, cybersecurity, airport body scanning, drone technology, and Internet privacy and cryptography. This course is required to complete the Concentration in Law and Cybersecurity.

    Sundquist, Christian

    Roman, Marc. S., Esq. '08

    Brandt, Allen

Experiential Requirement:

Participation in at least one of the​ following experiential programs:​

Related Clinic, Field Placement or Summer/Semester in Practice (approval by concentration advisor).

Writing Requirement:

Students are required to complete one significant piece of writing in the concentration area. The writing requirement does not require that students earn any credits beyond the required credits described above. The topic and the arrangement for fulfilling the writing requirement, however, must be approved in advance by the Concentration Advisor. The paper could be written to fulfill the requirements of a course, an independent study, or a law journal note and comment. It may also be possible to fulfill this requirement by completing a substantial piece of writing in conjunction with an experiential course, clinic, or Field Placement, such as a brief, a series of Motions, or a significant legal memorandum. It could also be fulfilled by writing a paper independently, such as a submission to a writing competition or an article for publication. In all of these arrangements, the prior approval of the Concentration Advisor is required.

(Effective December 18, 2018)

​​​​​
Content-1
Content-2
Content-3
Content-4
Third Column

J.D. Admissions Office

80 New Scotland Ave
Albany, NY 12208-3494

Phone:
518-445-2326

Email: admissions@albanylaw.edu

Learn More:
Request More Information
Application Instructions

Albany Law School Building Logo

Albany Law School

Better Opportunities. Bigger Impact.
80 New Scotland Avenue
Albany, NY 12208-3494
PHONE: 518-445-2311
  • Consumer Information (ABA Required Disclosures)
  • Events
  • Employment
  • News
  • Fact Sheet
  • Law Library
  • Faculty Directory
  • General Directory
  • Staff Directory
© Albany Law School | Site Map | Campus Policies | Privacy Policy | Contact Us