|
Jan 15, 2025
|
|
|
|
CIS 440 - Data Protection and Compliance5 Credits Data protection and compliance are important to safeguard confidential information. In this course, students plan and develop policies to achieve risk reduction and compliance goals. Students also learn the methodology behind e-discovery, including documents, mobile devices, email, and log files. Proper, standard procedures are covered. Common industry tools are used for investigative scenarios. Students learn which laws may affect them as network administrators during a litigation hold and how to develop procedures for various legal situations that may affect the digital data they maintain. Students learn how to create a business infrastructure that can respond effectively to e-discovery issues.
Pre-requisite(s) CIS 155 min 2.0 Program Admission Required Yes Admitted Program BAS - CIS FeesAcademic Technology Fee
Quarters Typically Offered Designed to Serve For students admitted to the BAS program in Cybersecurity and Digital Forensics. Active Date 20240401T16:34:56
Grading Basis Decimal Grade Class Limit 24 Shared Learning Environment Yes Contact Hours: Lecture 44 Lab 22 Total Contact Hours 66 Degree Distributions: ProfTech Course Yes Restricted Elective Yes Course Outline
- Introduce data protection and privacy regulations
- Plan and implement risk and compliance controls
- Evaluate and develop policies for compliance and risk reduction
- Describe the difference between data protection, electronic discovery, and digital forensics
- Describe the types of digital evidence and collection methods
- Describe and use some of the popular data protection and compliance services
- Explain how they are used in conjunction with forensics tools
- Explain planning considerations
- Explain how to preserve digital evidence
- Describe Information Governance and how it affects the data protection and evidence
Student Learning Outcomes Understand data protection and privacy regulations.
Define data protection policies appropriate for organizations.
Explain how the rules of evidence, criminal and civil procedure affect digital evidence.
Effectively use common data protection and compliance tools.
Explain how information governance and data protection affects the collection and retention of evidence.
Add to Portfolio (opens a new window)
|
|