550 Legal Issues of Cybersecurity and Data Breach Response
This course will cover the dynamic and rapidly evolving legal field of cybersecurity and data breach response. The course will focus on the workflow during the aftermath of any sort of data security incident, a rapidly growing legal practice area, where legal professionals have emerged as critical decision-makers. Every class will begin with a 15-20 minute discussion of current events. The course will be broken up into two parts. The first part of the course will cover the foundation of the legal aspects of data breach response, in the form of traditional discussion. The second part of the course will involve a fictional fact pattern/simulation of a data security incident at a financial firm, with student teams conducting various tasks, with “real-life” outside legal experts playing various roles. The tasks will include: intake; board briefing; law enforcement liaison; federal/state regulatory interphase; insurance company updates; and vendor/third party/employee briefings.
Course Areas of Practice | |
Evaluation Methods |
|
Degree Requirements | |
Course Type |
|
Learning Outcomes |
|
Sample Syllabi |
|
Fall 2021
Course Number | Course Credits | Evaluation Method | Instructor | ||
---|---|---|---|---|---|
550.01 | 2 |
|
John Stark | ||
This course will cover the dynamic and rapidly evolving legal field of cybersecurity and data breach response. The course will focus on the workflow during the aftermath of any sort of data security incident, a rapidly growing legal practice area, where legal professionals have emerged as critical decision-makers. Every class will begin with a 15-20 minute discussion of current events. The course will be broken up into two parts. The first part of the course will cover the foundation of the legal aspects of data breach response, in the form of traditional discussion. The second part of the course will involve a fictional fact pattern/simulation of a data security incident at a financial firm, with student teams conducting various tasks, with “real-life” outside legal experts playing various roles. The tasks will include: intake; board briefing; law enforcement liaison; federal/state regulatory interphase; insurance company updates; and vendor/third party/employee briefings. Grading Basis: GradedDegree RequirementsPre/Co-requisitesNone |
Fall 2020
Course Number | Course Credits | Evaluation Method | Instructor | ||
---|---|---|---|---|---|
550.01 | 2 |
|
John Stark | ||
This course will cover the dynamic and rapidly evolving legal field of cybersecurity and data breach response. The course will focus on the workflow during the aftermath of any sort of data security incident, a rapidly growing legal practice area, where legal professionals have emerged as critical decision-makers. Every class will begin with a 15-20 minute discussion of current events. The course will be broken up into two parts. The first part of the course will cover the foundation of the legal aspects of data breach response, in the form of traditional discussion. The second part of the course will involve a fictional fact pattern/simulation of a data security incident at a financial firm, with student teams conducting various tasks, with “real-life” outside legal experts playing various roles. The tasks will include: intake; board briefing; law enforcement liaison; federal/state regulatory interphase; insurance company updates; and vendor/third party/employee briefings. Grading Basis: GradedSyllabus: 550.01.Fall2020-syllabus.pdf178.96 KB Degree RequirementsPre/Co-requisitesNone |
Fall 2019
Course Number | Course Credits | Evaluation Method | Instructor | ||
---|---|---|---|---|---|
550.01 | 2 |
|
John Stark | ||
This course will cover the dynamic and rapidly evolving legal field of cybersecurity and data breach response. The course will focus on the workflow during the aftermath of any sort of data security incident, a rapidly growing legal practice area, where legal professionals have emerged as critical decision-makers. Every class will begin with a 15-20 minute discussion of current events. The course will be broken up into two parts. The first part of the course will cover the foundation of the legal aspects of data breach response, in the form of traditional discussion. The second part of the course will involve a fictional fact pattern/simulation of a data security incident at a financial firm, with student teams conducting various tasks, with “real-life” outside legal experts playing various roles. The tasks will include: intake; board briefing; law enforcement liaison; federal/state regulatory interphase; insurance company updates; and vendor/third party/employee briefings. Grading Basis: GradedDegree RequirementsPre/Co-requisitesNone |
Spring 2019
Course Number | Course Credits | Evaluation Method | Instructor | ||
---|---|---|---|---|---|
550.01 | 2 |
|
John Stark | ||
This course will cover the dynamic and rapidly evolving legal field of cybersecurity and data breach response. The course will focus on the workflow during the aftermath of any sort of data security incident, a rapidly growing legal practice area, where legal professionals have emerged as critical decision-makers. Every class will begin with a 15-20 minute discussion of current events. The course will be broken up into two parts. The first part of the course will cover the foundation of the legal aspects of data breach response, in the form of traditional discussion. The second part of the course will involve a fictional fact pattern/simulation of a data security incident at a financial firm, with student teams conducting various tasks, with “real-life” outside legal experts playing various roles. The tasks will include: intake; board briefing; law enforcement liaison; federal/state regulatory interphase; insurance company updates; and vendor/third party/employee briefings. Grading Basis: GradedDegree RequirementsPre/Co-requisitesNone |