The Master’s degree requires 30 credits, the LL.M. 24 credits, and the Certificate program 9 credits. To earn a concentration at least 18 credits must be completed from courses within the concentration. The Master’s and LL.M. require a Thesis course and the Master’s requires Introduction to Law and Legal Methods. That leaves room for either completing additional courses within the concentration or taking some electives. The programs are built for flexibility.
This course is designed to expose students to the issues involved in cybersecurity law, both from a national policy standpoint and from a corporate counsel view. Cybersecurity is the protection of electronic data and systems from attack, loss, or other compromise. Electronic data and systems include governmental records, and investor and private firm information, and the hardware and software systems used to generate and maintain that data.
This course examines the impact of technology on information privacy law, while examining the evolution of the right to information privacy and personal autonomy under Constitutional, tort, statutory and international law. This course will explore how the law should balance privacy rights with national security concerns, given the advent of new technologies and information structures. This course will examine modern privacy developments involving, inter alia, social media, video surveillance, “big data” practices, DNA databanking, the collection of health information, cybersecurity, airport body scanning, drone technology, and Internet privacy and cryptography. This course is required to complete the Concentration in Law and Cybersecurity.
This course introduces students in the M.S in Legal Studies program to the basics of the U.S. Legal System, including the structure of the federal courts, use of precedent, and methods of
reading, analyzing and synthesizing case law. Basic terminology and principles of common law subjects - including torts, contracts and property - are introduced and explored through
case law readings. In addition, the course will provide experience in the research and writing skills necessary for effective legal analysis and clear oral and written communication, including
hands-on experience using Schaffer Law Library and electronic resources.
This graduate-level course examines global data protection and privacy issues, with particular focus on the balance between an individual’s control of his/her personal information and the right of others to collect and use the individual’s personal information. The aim of the course is to understand the cultural, social, economic and political factors that influence data privacy and data protection laws around the world, including the European Union, Russia, China, Australia and Canada. The course will examine issues that include collection of data for commercial and governmental purposes, including but not limited to marketing. Attention will be paid to the new European General Data Protection Regulation, new data localization laws in China and Russia, and other current developments. US data privacy law will be addressed only in comparison to non-US approaches. Note: This course does NOT focus on US data privacy, which is instead the focus of Technology Privacy and the Law.
This course primarily focuses on the intersection of U.S.
public policy and cybersecurity at the local, state, and federal levels,
broadly covering e-government and policy implications as viewed through a constitutional lens.
This focused survey course examines U.S. privacy laws in several significant contexts, including (1) telecommunications and marketing, (2) workplace and employment, and (3) civil litigation and governmental law enforcement investigations. The course will explore how commercial marketing activities that involve telemarketing and email are regulated, and we'll examine laws such as the CAN-SPAM Act, the CCPA, and the VPPA to understand how they are intended to protect consumers. We will examine the privacy concerns that affect employees in the workplace, both private and public, and identify those areas that are important for prospective employers and employees alike to be aware of in today's work environment. Where civil litigation and government investigations affect specific privacy concerns for individuals, the course will examine to what degree disclosures and discovery are allowable in the civil litigation context, and will review the roles of privacy professionals in the realms of law enforcement and national security. Lastly, the course addresses emerging issues in the topics covered throughout the class, and will consider insight and reflections from industry practitioners to equip students with actionable, relevant, and timely concepts by which to evaluate current or future privacy policies.
This is the capstone course for the cybersecurity and privacy program. Students successfully completing this course will generate real-world cybersecurity documents including: a risk assessment, risk management strategy, needs analysis, GAP analysis, and risk treatment plan. This graduate-level course outlines the challenges surrounding critical infrastructure sector security and explains how implementing a security program based on the different cybersecurity frameworks can help organizations mitigate these issues. Students will critique the strengths and weaknesses of frameworks such as the NIST Cybersecurity Framework, COBIT 5, NIST 800-53, ISO 270001, and CIS critical security controls for cybersecurity.
This course exposes students to management practices for
assessing the risk of cybersecurity in the supply chain across many industries
and processes. Supply chain processes account for a significant portion of a company's costs
ultimately resulting in delivery of goods or services to customers. Critical
supply chain metrics and processes are required to make supply chain decisions. The Course will also investigate topics,
such as vendor supply chain design logistics and security planning. Threats to
the global supply chain are significant and costs billions of dollars per year. The Course will examine the
cybersecurity threats to the supply chain and develop risk strategies in
working with vendors as part of the supply chain. Key issues include organizational cyber intrusion incident response
planning in the supply chain, developing a risk planning methodology, and cost
associated with corporate breaches.
This course is designed to provide students
with an overview of the legal, social, and technical impact of global
"cybercrime." Cybercrime is loosely defined as a set of illegal activities that are facilitated through the use of computers
or other technology devices. Examples of cybercrime include not only
"traditional" crimes (e.g. identity theft or stalking) being carried
out in a new medium, but a new set of activities in which the computer or computer
network itself is a target of the attack. Topics will include the various
state, federal and international laws, investigative measures and techniques
used to identify, investigate, arrest and prosecute cybercriminals and
cyberattacks, and the preventive measures that can be utilized to provide a
secure environment for computer hardware and software. Active elements of the
cyber underworld, including organized crime, terrorists and state sponsored
activity, will be discussed. Students will become familiar with legal processes
they may find themselves a part of, litigation, depositions and expert
reporting. In addition, this course will address issues impacting the Fourth
Amendment, forensics, electronic surveillance, computer hacking and cracking,
intellectual property crimes, espionage, cyberterrorism, privacy, "forced
disclosure," and the challenge of cross-jurisdiction enforcement.
Focuses on the legal requirements of electronic commerce including issues of electronic contracting, tort, defamation, constitutional law, intellectual property, procedural, domestic and international conflicts and regulation.
Students who have taken Internet Law will not receive credit for this class.
Financial markets are rapidly changing, and new products, strategies, and investment vehicles are popping up everywhere. This course will examine emerging products, strategies and technologies such crypto currency, blockchain and initial coin offerings; algorithmic trading; high frequency trading; new digital payment systems; and robo advisors, with a focus on what the future of the industry holds and how we can prepare today for future developments.
This course allows students to explore multiple layers of HIPAA compliance as it covers the entities and information to which HIPAA applies, consent, types of health information requiring heightened protection, individual rights required
under the Privacy Rule and administrative, physical and technical safeguards under the Security Rule. Classroom exercises give students the opportunity to apply newly obtained knowledge to facts and analyze whether the situation meets
the standards for compliance with HIPAA. Upon completion of this course, students will have an in-depth understanding of the federal law designed to protect the privacy and security of health information.
This course explores the legal aspects of health care compliance. At both the federal and state levels, the course addresses the statutory, regulatory, and case law that comprises the
complex legal backdrop in which the healthcare industry operates. The course introduces the history, purpose, and substance of healthcare regulatory compliance programs and addresses
legal doctrines concerning protected information, patient's rights, HIPAA security and breach, compliance issues in healthcare business transactions, and special topics related to
substance use, mental health, HIV, genetic information, and minors.
This course focuses on the critical function of Compliance Officers at financial institutions. The legal framework and strategies relevant to the position will be explored. This includes supervision, risk management, Extraterritorial application, and a discussion on the Committee of Foreign Investments in the United States.