Free Essay

Itinfo Security Law and Ethics Course Syllabus

In: Computers and Technology

Submitted By gmdupras
Words 891
Pages 4
Course Description | This course, geared to non-attorney managers and executives, provides a broad survey of federal and state laws and judicial systems governing and/or affecting information security. Topics include the effects on information security of cyber-business regulation, doing business on the Internet, privacy laws, taxation, protection of intellectual property, electronic privacy, wiretapping, and cyber-squatting. In addition, students examine ethical issues, forensics, and evidence of cyber-crime. (No Prerequisite) | | | Terminal Course Objectives | DeVry University course content is constructed from curriculum guides developed for each course that are in alignment with specific Terminal Course Objectives (TCOs). The TCOs define the learning objectives that the student will be required to comprehend and demonstrate by course completion. The TCOs that will be covered in detail each week can be found in the Objectives section for that particular week. Whenever possible, a reference will be made from a particular assignment or discussion back to the TCO that it emphasizes. A | Given the importance of Law, Investigation, and Ethics in Computer Security, develop an understanding of the operation of the American legal system, including how the interpretation of statutes, judicial precedents, and legal reasoning affect information security. | B | Given the global nature of the Internet, evaluate how doing business on the Internet may subject you and your company to the laws, regulatory agencies, and judicial systems of multiple states and/or foreign countries. | C | Given that the Internet is owned by no one, consider how information security is affected by governmental regulation, specifically, privacy laws, taxation, assignment of Internet addresses, and the regulation of pornography and gambling. | D | Given the value of information, explain the concept of information as property and demonstrate how rules and concepts controlling intellectual property, such as Patents, Trade Secrets, Copyrights, Trademarks, Domain Names, and Anti Cyber-Squatting laws can be used to protect information and security processes. | E | Given the value of information and the need to keep it secure, establish steps to use contractual agreements to protect information. | F | Given the Constitutional protection of privacy, describe the limits on federal and state law enforcement agencies' ability to monitor the collection, dissemination, and protection of information and online activities. | G | Given that the law does not cover every aspect of information security, express the need for ethical conduct and apply ethical analysis to real-life case studies. | H | Given the increased threat of cyber-attacks, define the elements of a computer crime and establish the steps to collect and provide evidence to authorities. | |

Week, TCOs, and Topics | Readings and Class Preparation | Activities and Assignments | Week 1
TCO ALegal Environment, Courts, Jurisdiction | Chapter 1: The Legal Environment of Business in the Information Age
Chapter 2: The Court System and Jurisdiction | Assignment * Review and Analysis: Question 1 - Page 27 * Review and Analysis: Questions 3 and 4 - Pages 56–57 Postings | Week 2
TCOs B and C Real Space and Cyberspace | Chapter 18: Consumer Protection Legislation and Electronic Transactions
Chapter 23: Real Space and Cyberspace: Jurisdiction, Taxation, and International Law Issues | Assignment * Review and Analysis: Question 3 - Page 606 * Review and Analysis: Questions 1 and 5 - Page 773 Graded Discussion Topics | Week 3
TCO EContract and Commercial Law, E-Commerce | Chapter 7: Basic Contract Law
Chapter 8: Commercial Law: The Uniform Commercial Code UCC
Chapter 9: Current and Future Contract Law for E-Commerce | Assignment * You Decide: Contract Creation and Management Postings | Week 4
TCO FCybertorts, Privacy, and Regulation | Chapter 5: Application of Constitutional Law to Business
Chapter 11: Cybertorts, Privacy, and Government Regulation | Assignment * Review and Analysis: Question 4 - Page 153 * Review and Analysis: Questions 1 and 2 - Page 357 Graded Discussion Topics Midterm | Week 5
TCO DReal, Personal, and Intellectual Property; Copyright; Trademarks | Chapter 12: Property: Real, Personal, and Intellectual
Chapter 13: Copyright, Trademark, and Protection of Software | Assignment * Review and Analysis: Question 5 - Page 395 * Review and Analysis: Questions 3 and 5 - Page 431 Graded Discussion Topics | Week 6
TCO GCyber Ethics | Chapter 6: Government Regulation of Business and Ethics | Assignment * Business Ethics Simulation: Bribery Graded Discussion Topics | Week 7
TCO HComputer Crime | Chapter 22: Computer Crime: Pornography, Fraud, Hacking, and Gambling | Assignment * Review and Analysis: Questions 3, 4, and 5 - Page 739 Postings | Week 8 | Final Exam |
The maximum score in this class is 1,000 points. The categories, which contribute to your final grade, are weighted as follows. Assignment | Points | Weighting | Discussions
(40 pts, Weeks 1–7) | 280 | 28% | Assignments (Weeks 1, 2, 4, 5, and 7 @ 30 pts) | 150 | 15% | You Decide (Week 3) | 100 | 10% | Business Ethics Simulation (Week 6) | 100 | 10% | Midterm (Week 4) | 120 | 12% | Final Exam | 250 | 25% | Total Points | 1,000 | 100% |

All of your course requirements are graded using points. At the end of the course, the points are converted to a letter grade using the scale in the table below. Letter Grade | Points | Percentage | A | 930–1,000 | 93% to 100% | A- | 900–929 | 90% to 92.9% | B+ | 870–899 | 87% to 89.9% | B | 830–869 | 83% to 86.9% | B- | 800–829 | 80% to 82.9% | C+ | 770–799 | 77% to 79.9% | C | 730–769 | 73% to 76.9% | C- | 700–729 | 70% to 72.9% | D+ | 670–699 | 67% to 69.9% | D | 630–669 | 63% to 66.9% | D- | 600–629 | 60% to 62.9% | F | 599 and below | Below 60% |

Similar Documents