Jan 15, 2025  
2024-25 Catalog 
    
2024-25 Catalog
Add to Portfolio (opens a new window)

CIS 440 - Data Protection and Compliance

5 Credits
Data protection and compliance are important to safeguard confidential information. In this course, students plan and develop policies to achieve risk reduction and compliance goals. Students also learn the methodology behind e-discovery, including documents, mobile devices, email, and log files. Proper, standard procedures are covered. Common industry tools are used for investigative scenarios. Students learn which laws may affect them as network administrators during a litigation hold and how to develop procedures for various legal situations that may affect the digital data they maintain. Students learn how to create a business infrastructure that can respond effectively to e-discovery issues.

Pre-requisite(s) CIS 155 min 2.0
Program Admission Required Yes Admitted Program BAS - CIS
FeesAcademic Technology Fee

Quarters Typically Offered
Designed to Serve For students admitted to the BAS program in Cybersecurity and Digital Forensics.
Active Date 20240401T16:34:56

Grading Basis Decimal Grade
Class Limit 24
Shared Learning Environment Yes
Contact Hours: Lecture 44 Lab 22
Total Contact Hours 66
Degree Distributions:
ProfTech Course Yes
Restricted Elective Yes
Course Outline
  • Introduce data protection and privacy regulations
  • Plan and implement risk and compliance controls 
  • Evaluate and develop policies for compliance and risk reduction
  • Describe the difference between data protection, electronic discovery, and digital forensics
  • Describe the types of digital evidence and collection methods
  • Describe and use some of the popular data protection and compliance services
    • Explain how they are used in conjunction with forensics tools
    • Explain planning considerations
  • Explain how to preserve digital evidence
  • Describe Information Governance and how it affects the data protection and evidence


Student Learning Outcomes
Understand data protection and privacy regulations.

Define data protection policies appropriate for organizations.

Explain how the rules of evidence, criminal and civil procedure affect digital evidence.

Effectively use common data protection and compliance tools.

Explain how information governance and data protection affects the collection and retention of evidence.



Add to Portfolio (opens a new window)