Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

College of Engineering

COURSE SYLLABUS

1. COURSE INFORMATION
Course Title: Cyber Security Law and Policy
Course Code: 0112301
Academic Year: 2021-2022

2. CREDIT HOURS: 3-0-3 CHR

3. PRE -REQUISITE: None


CO -REQUISITE: N/A
4. INSTRUCTOR INFORMATION
Instructor Name: Bayan AbuShawar
Contact Details: Email: bayan.abushawar@aau.ac.ae
Phone:
Extension:285
Office Location: Faculty of Engineering-Third Floor
Office Hours: 1:00-2:00

5. BRIEF COURSE DESCRIPTION


The course broadly covers the legal duty to act reasonably and responsibly to protect assets and
information. Identify which cybersecurity laws have the potential to impact cybersecurity
program. It also casts light on broader technology issues to demonstrate the interdisciplinary
influences and concerns that must be addressed in developing or implementing effective national
cyber security laws and policies. Furthermore, the course covers the international standard
security policies, and legal considerations related to cyber security and cyberspace

Version: September 2020    Page 1 of 5


6. COURSE LEARNING OUTCOMES
After successfully completing this course, the student will be able to:
1. Explain cyber security concepts
2. Apply Cybersecurity Laws in different domains
3. Communicate effectively about cybersecurity laws
4. Describe the international standards related to cyber security and cyberspace
5. Analyze the criminal use of information communications technologies
6. Explain the cybersecurity program model.

7. CONTRIBUTION OF COURSE LEARNING OUTCOMES TO PROGRAM


OUTCOMES
The mapping of course leaning outcomes to the student outcomes is provided in the separate course
mapping document

8. COURSE CONTENTS AND TOPICS (Week by Week)

Week Topic
Week 1 Defining Cyber Security as a Field of Law
An Overview of the Scope Cyber Security:
Week 2 Telecommunications Security
Infamous Cybercrimes
Cybercrime Taxonomy
Week 3 Civil vs. Criminal Cybersecurity Offenses
Cybercrime Categories in the Incident Response Plan
Computer Crime Laws in the Public Sector
Week 4 Computer Crime Laws in the Private Sector 
Application of Laws to Cybersecurity
Week 5 State Computer Crime Laws 
Common Law of Privacy
Privacy Laws
Week 6
Healthcare Data Privacy Laws
Quiz 1
State Chief Information Privacy Officer (CIPO) Laws 
Data Breach Laws
Week 7 General Data Protection Regulation (GDPR)
Data Breach Litigation
Social Media Privacy 
Week 8 Cryptography and Digital Forensics Law
Brief Overview of Cryptography
Midterm Exam

Version: September 2020    Page 2 of 5


Search and Seizure of Encrypted Data 
Week 9
Legal Aspects of Digital Forensics
Digital Best Evidence Rule
Week 10
Digital Data Admissibility in Court
Digital Evidence Spoliation
Week 11
Expert Witnesses
The CLOUD Act 
Week 12 Secure Data Act
Quiz 2
Cybersecurity Law Program Model
Week 13
Cybersecurity Law Program Architecture
Program Staffing and Roles
Program Policies
Week 14
Program Procedures 
Program Technology
Policy Restrictions
Policy Value
Policy Cost
Week 15 Policy Claims
Policy Claim Disputes
Policy Lawsuits
Project presentations
Week 16 Final Exam

9. SCHEDULE OF LABORATORY, STUDIO, EXTERNAL VISITS AND OTHER


NON-LECTURE SESSIONS
N/A

10. OUT-OF-CLASS ASSIGNMENTS


Assignment Due Date
Assignment 1 (10 %) Week 3
Project (10 %) Week 12

11. ASSESSMENT METHODS & STUDENT EVALUATION


Assessment Tool Week # Weight
Quiz 01 Week 6 10%
Quiz 02 Week 12 10%
Midterm Exam Week 8 20%
Final Exam Week 16 40%

Version: September 2020    Page 3 of 5


12. TEACHING METHODS

I. Leaning Strategies
Active learning strategies are employed in this course to encourage students’ participation in class
and to foster their abilities to gather information and data from its sources and analyze it. Active
learning strategies include assignments where students work in individual and in teams to solve
certain problems including security/privacy breach case studies.

II. Attendance Policy


Students are expected to attend their classes. Absence never exempts a student from the work
required for satisfactory completion of the courses. Excessive absences of any course will result in:
1. First warning for absence of 10% of the class hours
2. Second warning for absence of 20% of the class hours
3. A failing grade in the course for an absence of 25% of the class hours
4. Exception to (3) may be made in the case of serious illness or death to an immediate family
member if approved by the dean of the college. In such case, the student will receive a W grade in
the course

III. Plagiarism
PLAGIARISM is to use someone else's idea, words, projects, artwork, phrasing, sentence structure,
or other work without properly acknowledging the ownership (source) of the property. Plagiarism is
dishonest because it misrepresents the work of someone else as one's own. Students who are
suspected of plagiarism will answer to an investigation. Those found guilty will face a disciplinary
action as per the university rules.
13. COURSE TEXTBOOK, RECOMMENDED READINGS AND RESOURSES
I. Textbooks:
1. Main Textbook:
Author (s): Tari Schreider
Title: Cybersecurity Law, Standards and Regulations: 2nd Edition
Year: March, 2020
Edition: 2nd ed
Textbook ISBN-13: 978-1944480561
Publisher:  Rothstein Publishing
Link: https://www.amazon.ae/Cybersecurity-Law-Standards-Regulations-2nd/dp/1944480560

Version: September 2020    Page 4 of 5


II. References:
1. P. Singer and A. Friedman, Cyber security and Cyber war: What Everyone Needs to Know, 1st
ed. UK: Oxford University press, 2014.

Version: September 2020    Page 5 of 5

You might also like