Skip Navigation
 

Course Details

 

Course Details

Course Code: ISSC331 Course ID: 4398 Credit Hours: 3 Level: Undergraduate

This course examines information security issues and the law. The rapid growth of technology has given rise to legal issues surrounding technology. Information security is the practice of protecting information to ensure the goals of confidentiality, integrity and availability are met. Information security makes sure that accurate information is available to authorized individuals when it is needed. When governments, private organizations, and individuals do a poor job of protecting the information entrusted to them, legislatures respond with new laws. The course will examine key conflicts involving technology and the legal system to include: privacy issues, civil, criminal, and administrative law, Children’s Online Privacy Protection Act (COPPA), Sarbanes Oxley, and information security governance. This course examines current literature on such topics.

Course Schedule

Registration Dates Course Dates Start Month Session Weeks
05/21/2022 - 11/04/2022 11/07/2022 - 01/01/2023 November Fall 2022 Session I 8 Week session
06/28/2022 - 12/02/2022 12/05/2022 - 01/29/2023 December Fall 2022 Session D 8 Week session
07/25/2022 - 12/30/2022 01/02/2023 - 02/26/2023 January Winter 2023 Session B 8 Week session
08/29/2022 - 02/03/2023 02/06/2023 - 04/02/2023 February Winter 2023 Session I 8 Week session
09/26/2022 - 03/03/2023 03/06/2023 - 04/30/2023 March Winter 2023 Session D 8 Week session
10/31/2022 - 03/31/2023 04/03/2023 - 05/28/2023 April Spring 2023 Session B 8 Week session

Current Syllabi

The successful student will fulfill the following learning objectives:

CO-1: Describe common concepts in information security, privacy and the law

CO-2: Categorize the basic components and structure of the federal and state court systems

CO-3: Analyze the types of crimes that have evolved due to the use of technology and the laws that are in place to support them

CO-4: Differentiate between civil, criminal, common, and administrative law

CO-5: Analyze the issues surrounding jurisdiction that have been created by technology

CO-6: Critique the federal and state laws and legal concepts that affect how governments and organizations think about information security

CO-7: Explain reasonable expectations of privacy on the Internet

CO-8: Compare and contrast information security programs that address the laws and compliance requirements

The grading will be based on eight weekly graded assignments, eight weekly Forum postings, and an individual project paper.

  1. There will be eight weekly assignments (4% each) counting a total of 32% of the final grade. The assignments will follow each of the major milestones of the course. These assignments will be problems or questions from the text. They are a combination of Lesson Reviews and Lesson Activities and/or Labs. They are selected to provide the student with information to understand the concepts discussed. Assignments should be prepared in Microsoft Word and uploaded into the student folder by the due date. Any necessary Visio diagrams should be incorporated within the Word document as part of the document.
  2. There will be eight weekly Forum postings you will need to respond to. Answers should be 3-4 paragraphs with a topic sentence that restates the question and supporting sentences using the terms, concepts, and theories from the required readings. Each answer should be a minimum of 250 - 400 words (about 6 to 8 good sentences). You may attack, support or supplement other students’ answers using the terms, concepts and theories from the required readings. All responses should be a courteous paragraph that contains a topic sentence with good supporting sentences. You may respond multiple times with a continuous discussion with points and counter points. The key requirement is to express your idea and then support your position using the terms, concepts and theories from the required readings to demonstrate to me that you understand the material. If you use external resources for the forums, provide the source with proper APA Style citation for that source. The Forum postings will count as 32% (4% for each discussion posting) of the final grade.
  3. There will be a project paper (21%) which will be due week 7

All assignments, Forum question responses, and the quizzes are due by 12:00 midnight Eastern Time Sunday of the week assigned.

Case Study (36%) Schedule:
Week 4: Document retention policy due (5%)

Week 5: Litigation Hold Notice due (5%)

Week 6: Checklist of procedures due (5%)

Week 7: Summary Paper (21%)

Details of Summary Paper (21%): Prepare an 8-10 page summary paper in Microsoft Word (counts as 21% of the final grade) in APA Style format with 5-10 references (see writing expectations in the Policies section) (250 words per page). This paper must include the week 4, 5 and 6 assignments as sections of document for grading. Your summary should refer to the prior assignments within the document.

  • : The Appendix A – Grading Rubric will be used to evaluate your paper along with the APA manual

APA Style Tips

  • Paragraphs average 3-5 sentences in length
  • Reference all statements of fact
  • At least 1 reference per paragraph as a rule of thumb
  • Font size and style consistent
  • No first person (I, we, us, etc.)
  • Past tense only
  • Double spaced
  • 1 inch margins all around
  • First line of paragraph indented
NameGrade %
Assignments 32.00 %
Week 1 Assignment 4.00 %
Week 2 Assignment 4.00 %
Week 3 Assignment 4.00 %
Week 4 Assignment 4.00 %
Week 5 Assignment 4.00 %
Week 6 Assignment 4.00 %
Week 7 Assignment 4.00 %
Week 8 Assignment 4.00 %
Discussions 32.00 %
Week 1:Confidentiality Integrity and Availability 4.00 %
Week 2: Bill of Rights 4.00 %
Week 3: FERPA CIPA and COPPA 4.00 %
Week 4: Checkpoint Feedback - Project Post for Peer Review 4.00 %
Week 6: Current Event Related to the Course 4.00 %
Week 5: Copyright and its Various Owner Rights 4.00 %
Week 7: Risk Analysis 4.00 %
Week 8: Computer Forensics 4.00 %
Week 4 Case Study 5.00 %
Week 4 - Case Study Create a document retention policy 5.00 %
Week 5 Case Study 5.00 %
Week 5 - Create a Litigation Hold Notice 5.00 %
Week 6 Case Study 5.00 %
Week 6 - Case Study Create a checklist of procedures 5.00 %
Week 7 Case Study Paper 21.00 %
Week 7 - Case Study: Summary Paper 21.00 %

The successful student will fulfill the following learning objectives:

CO-1: Describe common concepts in information security, privacy and the law

CO-2: Categorize the basic components and structure of the federal and state court systems

CO-3: Analyze the types of crimes that have evolved due to the use of technology and the laws that are in place to support them

CO-4: Differentiate between civil, criminal, common, and administrative law

CO-5: Analyze the issues surrounding jurisdiction that have been created by technology

CO-6: Critique the federal and state laws and legal concepts that affect how governments and organizations think about information security

CO-7: Explain reasonable expectations of privacy on the Internet

CO-8: Compare and contrast information security programs that address the laws and compliance requirements

Book Title:Legal Issues in Information Security, 2nd ed - e-book available in the APUS Online Library
ISBN:9781284054743
Publication Info:Jones & Bartlett Lib
Author:Grama, Joanna Lyn
Unit Cost:$75.79
 
Book Title:ISSC331 Lab Manual provided inside the classroom
ISBN:9781449670795
Publication Info:CLASS-Jones & Bartlett
Electronic Unit Cost:$55.00
 

Previous Syllabi

Not current for future courses.