*Friday CLOSED

Timings 10.00 am - 08.00 pm

Call : 021-3455-6664, 0312-216-9325 DHA 021-35344-600, 03333808376, ISB 03333808376

Law of Data Security and Investigations


Be the first to rate Law of Data Security and Investigations
Or log in to access your purchased courses
by fatima
Price:  260,000
2Months/20 Hours
0 Lessons

Law of Data Security and Investigations

Law of Data Security and Investigations

New law on privacy, e-discovery and data security is creating an urgent need for professionals who can bridge the gap between the legal department and the cybersecurity team. This course provides this unique professional training, including skills in the analysis and use of contracts, policies, and records management procedures.


Course Key Learnings:

  • Choose words for better legal results in policies, contracts, and incidents
  • Implement processes that yield defensible policies on security, e-records, and investigations
  • Reduce risk in a world of vague laws on cyber crime and technology compliance
  • Carry out investigations so that they will be judged as ethical and credible
  • Persuade authorities that you and your organization responded responsibly to cybersecurity, privacy, and forensic challenges.
  • Negotiate business transactions in the ever-changing cyber world

Skills Gained:

  • Work better with other professionals at your organization who make decisions about the law of data security and investigations
  • Exercise better judgment on how to comply with privacy and technology regulations, both in the United States and in other countries
  • Evaluate the role and meaning of contracts for technology, including services, software, and outsourcing
  • Help your organization better explain its conduct to the public and to legal authorities
  • Anticipate cyber law risks before they get out of control
  • Implement practical steps to cope with technology law risk
  • Better explain to executives what your organization should do to comply with information security and privacy law
  • Better evaluate technologies, such as digital archives and signatures, to comply with the law and serve as evidence
  • Make better use of electronic contracting techniques to get the best terms and conditions
  • Exercise critical thinking to understand the practical implications of technology laws and industry standards (such as the Payment Card Industry Data Security Standard).

Course Content:

Module1: Fundamentals of Data Security Law and Policy

Overview

Section 1 is an introduction to cyber and data protection law. It serves as the foundation for discussions during the rest of the course. We will survey the general legal issues that must be addressed in establishing best information security practices, then canvass the many new laws on data security and evaluate cybersecurity as a field of growing legal controversy. The course section will cover computer crime and intellectual property laws when a network is compromised, as well as emerging topics such as honeypots. We will look at the impact of future technologies on law and investigations in order to help students factor in legal concerns when they draft enterprise data security policies. For example, students will debate what the words of an enterprise policy would mean in a courtroom. This course section also dives deep into the legal question of what constitutes a “breach of data security” for such purposes as notifying others about it. The course day includes a case study on the drafting of policy to comply with the Payment Card Industry Data Security Standard (PCI). Students will learn how to choose words more carefully and accurately when responding to cybersecurity questionnaires from regulators, cyber insurers, and corporate customers.


Module2:  E-Records, E-Discovery, and Business Law

Overview

Cybersecurity and digital forensic professionals constantly deal with records and evidence, so they need a practical understanding of e-discovery and policies on the retention and destruction of data. Section 2 of the course places great emphasis on the law of evidence and records management. It teaches the necessity to apply a “legal hold” or “litigation hold” on records when controversy emerges. It helps technical and legal professionals learn to speak the same language as they assess how to find records and possibly disclose them in litigation or investigations.

New privacy laws around the world, such as the California Consumer Privacy Act, demand that data be deleted under the so-called right-to-be-forgotten doctrine. But data deletion conflicts with other legal demands, such as the need to retain data to prove (maybe years later) that a consumer was treated fairly in a commercial transaction. Section 2 illuminates this increasingly common conflict. It teaches students how to manage the conflict within their enterprises.


Module3: Contracting for Data Security and Other Technology

Overview

Section 3 focuses on the essentials of contract law sensitive to the current requirements for security. Compliance with many of the new data security laws requires contracts. Because IT pulls together the products and services of many vendors, consultants, and outsourcers, enterprises need appropriate contracts to comply with Gramm-Leach-Bliley, HIPAA, GDPR, PCI-DSS, data breach notice laws, and other regulations.

This course section provides practical steps and tools that students can apply to their enterprises and includes a lab on writing contract-related documents relevant to the students” professional responsibilities. (The lab is an optional, informal “office hours” discussion with the instructor at the end of the day when the course is delivered live.) You will learn the language of common technology contract clauses and the issues surrounding those clauses, and become familiar with specific legal cases that show how different disputes have been resolved in litigation.


Module4:  The Law of Data Compliance: How to Conduct Investigations

Overview

Information security professionals and cyber investigators operate in a world of ambiguity, rapid change, and legal uncertainty. To address these challenges, this course section presents methods to analyze a situation and then act in a way that is ethical, defensible, and reduces risk. Lessons will be invaluable to the effective and credible execution of any kind of investigation, be it internal, government, consultant related, a security incident, or any other. The lessons also include methods and justifications for maintaining the confidentiality of an investigation, especially invocation of the doctrines of attorney-client privilege and attorney work product.

Section 4 surveys insider fraud and other misbehaviors with an emphasis on the role of technology in the commission, discovery, and prevention of that fraud. It teaches cyber managers and auditors practical and case-study-driven lessons about the monitoring of employees and employee privacy.


Module5:: Applying Law to Emerging Dangers: Cyber Defense

Overview

Knowing some rules of law is not the same as knowing how to deal strategically with real-world legal problems. Section 5 is organized around extended case studies in security law: break-ins, investigations, piracy, extortion, rootkits, phishing, botnets, espionage, and defamation. The studies lay out the chronology of events and critique what the good people did right and what they did wrong. The goal is to learn to apply principles and skills to address incidents in your day-to-day work.

The section includes an in-depth review of legal responses to the major security breaches at TJX, Target, and Home Depot, Freddie Mac, and others. It looks at how to develop a bring-your-own-device (BYOD) policy for an enterprise and its employees.


Who Should Attend
  • Investigators
  • Security and IT professionals
  • Lawyers
  • Staff at government regulatory agencies
  • Auditors
  • Insider threat analysts
  • Technology managers
  • Vendors
  • Compliance officers
  • Law enforcement personnel
  • Privacy officers
  • Penetration testers
  • Cyber incident and emergency responders around the world (including private sector, law enforcement, national guard, and civil defense, among others)

International Student Fee: 850 US$


Job Interview Preparation  (Soft Skills Questions & Answers)


Stay connected even when you’re apart

Join our WhatsApp Channel – Get discount offers

 500+ Free Certification Exam Practice Question and Answers

 Your FREE eLEARNING Courses (Click Here)


Internships, Freelance and Full-Time Work opportunities

 Join Internships and Referral Program (click for details)

 Work as Freelancer or Full-Time Employee (click for details)

Hire an Intern


Flexible Class Options

  • Week End Classes For Professionals  SAT | SUN
  • Corporate Group Trainings Available
  • Online Classes – Live Virtual Class (L.V.C), Online Training

Related Courses

Auditing Systems, Applications, and the Cloud

Security Strategic Planning, Policy, and Leadership

Security Automation for Offense, Defense, and Cloud

 

 

KEY FEATURES

Flexible Classes Schedule

Online Classes for out of city / country students

Unlimited Learning - FREE Workshops

FREE Practice Exam

Internships Available

Free Course Recordings Videos

Register Now


Print Friendly, PDF & Email

Lessons

Or log in to access your purchased courses
ABOUT US

OMNI ACADEMY & CONSULTING is one of the most prestigious Training & Consulting firm, founded in 2010, under MHSG Consulting Group aim to help our customers in transforming their people and business - be more engage with customers through digital transformation. Helping People to Get Valuable Skills and Get Jobs.

Read More

Contact Us

Get your self enrolled for unlimited learning 1000+ Courses, Corporate Group Training, Instructor led Class-Room and ONLINE learning options. Join Now!
  • Head Office: A-2/3 Westland Trade Centre, Shahra-e-Faisal PECHS Karachi 75350 Pakistan Call 0213-455-6664 WhatsApp 0334-318-2845, 0336-7222-191, +92 312 2169325
  • Gulshan Branch: A-242, Sardar Ali Sabri Rd. Block-2, Gulshan-e-Iqbal, Karachi-75300, Call/WhatsApp 0213-498-6664, 0331-3929-217, 0334-1757-521, 0312-2169325
  • ONLINE INQUIRY: Call/WhatsApp +92 312 2169325, 0334-318-2845, Lahore 0333-3808376, Islamabad 0331-3929217, Saudi Arabia 050 2283468
  • DHA Branch: 14-C, Saher Commercial Area, Phase VII, Defence Housing Authority, Karachi-75500 Pakistan. 0213-5344600, 0337-7222-191, 0333-3808-376
  • info@omni-academy.com
  • FREE Support | WhatsApp/Chat/Call : +92 312 2169325
WORKING HOURS

  • Monday10.00am - 7.00pm
  • Tuesday10.00am - 7.00pm
  • Wednesday10.00am - 7.00pm
  • Thursday10.00am - 7.00pm
  • FridayClosed
  • Saturday10.00am - 7.00pm
  • Sunday10.00am - 7.00pm
Select your currency
PKR Pakistani rupee
WhatsApp Us