A cybersecurity incident has occurred: what is the next step? If your organization has had valuable information exfiltrated from its network, such as personally identifiable information (PII), personal health information (PHI), trade secrets, or other valuable information, there could be major repercussions. Once the initial incident response phase has ended, and the dust has settled the question then becomes: “Now what!?!” This course examines the types of potential liability an organization or its employees may face following a cybersecurity incident as well as provide practical insights about how they may play out in the courts, with regulators, with customers, and with other stakeholders. There will also be a brief examination of the history of cybercrime and criminal statutes that apply to various cyber-activities and their significance. In addition, the course will highlight resources that organizations can draw on after a cybersecurity incident including law enforcement and insurance providers.?
Understand the various legal liabilities a company may face following a cybersecurity breach, including a focus on civil liability. | Analyze the facts of a particular cybersecurity incident through a legal lens. | Apply the law (types of liability) as described in lectures to a set of particular facts to identify potential legal liability.?| Describe obligations when working with enforcement authorities, such as audit cooperation and communication.