550 Legal Issues of Cybersecurity and Data Breach Response

This course will cover the dynamic and rapidly evolving legal field of cybersecurity and data breach response.  The course will focus on the workflow during the aftermath of any sort of data security incident, a rapidly growing legal practice area, where legal professionals have emerged as critical decision-makers. Every class will begin with a 15-20 minute discussion of current events.  The course will be broken up into two parts.   The first part of the course will cover the foundation of the legal aspects of data breach response, in the form of traditional discussion.  The second part of the course will involve a fictional fact pattern/simulation of a data security incident at a financial firm, with student teams conducting various tasks, with “real-life” outside legal experts playing various roles.  The tasks will include: intake; board briefing; law enforcement liaison; federal/state regulatory interphase; insurance company updates; and vendor/third party/employee briefings.

Course Areas of Practice
Evaluation Methods
  • Research and/or analytical paper(s), 10-15 pages
  • Practical exercises
  • Class participation
Degree Requirements
Course Type
  • Seminar
Learning Outcomes
  • Legal analysis and reasoning, legal research, problem-solving, and written and oral communication in the legal context

Sample Syllabi

Fall 2021

2021
Course Number Course Credits Evaluation Method Instructor Meeting Days/Times Room

550.01 2
  • Research and/or analytical paper(s), 10-15 pages
  • Practical exercises
  • Class participation
John Stark Th 2:00 PM-3:50 PM 3000

This course will cover the dynamic and rapidly evolving legal field of cybersecurity and data breach response.  The course will focus on the workflow during the aftermath of any sort of data security incident, a rapidly growing legal practice area, where legal professionals have emerged as critical decision-makers. Every class will begin with a 15-20 minute discussion of current events.  The course will be broken up into two parts.   The first part of the course will cover the foundation of the legal aspects of data breach response, in the form of traditional discussion.  The second part of the course will involve a fictional fact pattern/simulation of a data security incident at a financial firm, with student teams conducting various tasks, with “real-life” outside legal experts playing various roles.  The tasks will include: intake; board briefing; law enforcement liaison; federal/state regulatory interphase; insurance company updates; and vendor/third party/employee briefings.

Grading Basis: Graded

Pre/Co-requisites
None

Fall 2020

2020
Course Number Course Credits Evaluation Method Instructor Meeting Days/Times Room

550.01 2
  • Research and/or analytical paper(s), 10-15 pages
  • Practical exercises
  • Class participation
John Stark Th 2:00 PM-3:50 PM

This course will cover the dynamic and rapidly evolving legal field of cybersecurity and data breach response.  The course will focus on the workflow during the aftermath of any sort of data security incident, a rapidly growing legal practice area, where legal professionals have emerged as critical decision-makers. Every class will begin with a 15-20 minute discussion of current events.  The course will be broken up into two parts.   The first part of the course will cover the foundation of the legal aspects of data breach response, in the form of traditional discussion.  The second part of the course will involve a fictional fact pattern/simulation of a data security incident at a financial firm, with student teams conducting various tasks, with “real-life” outside legal experts playing various roles.  The tasks will include: intake; board briefing; law enforcement liaison; federal/state regulatory interphase; insurance company updates; and vendor/third party/employee briefings.

Grading Basis: Graded

Syllabus: 550.01.Fall2020-syllabus.pdf178.96 KB

Pre/Co-requisites
None

Fall 2019

2019
Course Number Course Credits Evaluation Method Instructor Meeting Days/Times Room

550.01 2
  • Research and/or analytical paper(s), 10-15 pages
  • Practical exercises
  • Class participation
John Stark Th 2:00-3:50PM 4046

This course will cover the dynamic and rapidly evolving legal field of cybersecurity and data breach response.  The course will focus on the workflow during the aftermath of any sort of data security incident, a rapidly growing legal practice area, where legal professionals have emerged as critical decision-makers. Every class will begin with a 15-20 minute discussion of current events.  The course will be broken up into two parts.   The first part of the course will cover the foundation of the legal aspects of data breach response, in the form of traditional discussion.  The second part of the course will involve a fictional fact pattern/simulation of a data security incident at a financial firm, with student teams conducting various tasks, with “real-life” outside legal experts playing various roles.  The tasks will include: intake; board briefing; law enforcement liaison; federal/state regulatory interphase; insurance company updates; and vendor/third party/employee briefings.

Grading Basis: Graded

Pre/Co-requisites
None

Spring 2019

2019
Course Number Course Credits Evaluation Method Instructor Meeting Days/Times Room

550.01 2
  • Research and/or analytical paper(s), 10-15 pages
  • Practical exercises
  • Class participation
John Stark Th 2:00-3:50 PM 4044

This course will cover the dynamic and rapidly evolving legal field of cybersecurity and data breach response.  The course will focus on the workflow during the aftermath of any sort of data security incident, a rapidly growing legal practice area, where legal professionals have emerged as critical decision-makers. Every class will begin with a 15-20 minute discussion of current events.  The course will be broken up into two parts.   The first part of the course will cover the foundation of the legal aspects of data breach response, in the form of traditional discussion.  The second part of the course will involve a fictional fact pattern/simulation of a data security incident at a financial firm, with student teams conducting various tasks, with “real-life” outside legal experts playing various roles.  The tasks will include: intake; board briefing; law enforcement liaison; federal/state regulatory interphase; insurance company updates; and vendor/third party/employee briefings.

Grading Basis: Graded

Pre/Co-requisites
None

*Please note that this information is for planning purposes only, and should not be relied upon for the schedule for a given semester. Faculty leaves and sabbaticals, as well as other curriculum considerations, will sometimes affect when a course may be offered.