From a legal point of view, there is a lot more to cybersecurity than the mechanics of how to secure computers and mobile devices. This course begins with the identification of the various types of information that are commonly used and stored by businesses. It then examines the legal theories and strategies by which such information can be protected, including contract law and trade secret law. Next it considers the legal obligations that information holders have to maintain the privacy, confidentiality and security of information and the potential liability that flows from a failure to do so. Technological strategies and standards for securing information that is held in digital form are also discussed. Grading: Letter graded Credits: Variable Offered: Irregularly Categories: Long Paper Subject Areas: Intellectual Property