Pace University IS 647 Legal Issues in Information Systems ("Cyberlaw")
Spring 2025
Weekly topics and reading
This page tells you what chapters to read for each week, and any other reading.
Your reading and research starts with the book, and you can supplement it with reading of cited references (including statutes and court decisions). Please seek the level of knowledge and understanding suitable for this graduate level course and your individual level of learning.
The book is "Cyberlaw: Law for Digital Spaces and Information Systems", by John T. Bandler, published January 2025.
Menu (jump links)
- Week 0 and course resources
- Week 1 - Course introduction - Cyberlaw learning mindset
- Week 2 - Introducing law (and our paper project)
- Week 3 - Introducing criminal and civil law plus two important amendments
- Week 4 - How we got to cyberlaw
- Week 5 - Criminal cyberlaw 1: Substantive and procedural laws
- Week 6 - Virtual currency, money laundering and cybercrime (criminal cyberlaw 2)
- Week 7 - Civil cyber law introduced
- Week 8 - Contract, cyber insurance, regulation
- Week 9 - Intellectual property law
- Week 10 - Data law 1: Data breach and cybersecurity
- Week 11 - Data law 2: Privacy, AI, some data laws to review
- Week 12 - Cyber conflict between nations
- Week 13 - Speech and expression in cyberspace
- Week 14 - Organization management and compliance regarding cyber
- Bottom
Week 0 and throughout - Course Materials
Important course materials and resources include:
- The learning management system (LMS) which includes
- Syllabus
- Welcome & orientation video ("Week 0 video")
- Announcements
- Assignments
- Discussion
- Course Resources
- Cyberlaw book
- Final paper project
- Everything (search my site)
- Factual nuggets and quiz study material: Start at Things to know and navigate to intro to law, cyberlaw, etc.
- School specific resources (Pace Seidenberg)
Week 1 - Course introduction - Cyberlaw learning mindset
Topics
- In sum: Course introduction and topics tracking Cyberlaw book Chapters 1-4
- Cyberlaw learning mindset
- Why cyberlaw
- Cyberlaw introduced
- Rules
- Course introduction and overview
- Syllabus review
- Tips on learning and studying
Reading
- In sum: Read Chapters 1-4, plus syllabus and articles
- Syllabus
- Book: Cyberlaw: Law for Digital Spaces and Information Systems (2025)
- Part 1: Cyberlaw learning mindset
- Chapter 1. Why cyberlaw and using this book
- Chapter 2. Cyberlaw introduced
- Chapter 3. Learning, reading, researching, writing
- Part 2: Introduction to law
- Chapter 4. Rules humans create
- Supplemental reading
- Writing, https://johnbandler.com/writing/
- Email Basics, https://johnbandler.com/email-basics/
- How to Write a Paper, https://johnbandler.com/how-to-write-paper/
- How to Learn and Study, https://johnbandler.com/how-to-learn-and-study/
- How to Take an Exam, https://johnbandler.com/how-to-take-an-exam
- AI's promise and problem for law and learning, https://johnbandler.com/ai-promise-and-problem/
- Cyberlaw book resources, https://johnbandler.com/cyberlawbook-resources
- The book resources page has links to references and additional reading for each chapter, for example:
- Skim so you know these are there
- A guide to citations and references, https://johnbandler.com/guide-citations-references/
- Helpful Legal Resources and Links, https://johnbandler.com/helpful-legal-links/
Weekly reminders (details for every week)
- First discussion post due by Tuesday at 11:59pm, preferably earlier
- Discussion replies due Friday at 1159pm.
- In Week 1, you reply to all of your classmates
- Assignment due Friday at 11:59pm
Week 2 - Introducing law (and our paper project)
Topics
- In sum: Topics tracking Chapters 4-7 plus paper topic.
- Rules (recap/catchup)
- Law
- U.S. Legal System
- U.S. Constitution and Amendments
- Introduction to final paper, discuss paper topics
- Tips on writing a paper
Reading
- In sum: Read Chapter 4-7, plus articles on paper project
- Recap/refresh: Chapter 4. Rules humans create
- Part 2: Introduction to law
- Chapter 5. Laws introduced
- Chapter 6. The U.S. legal system introduced
- Chapter 7. The U.S. Constitution and Amendments
- Introduction to law things to know, https://johnbandler.com/things-to-know-introduction-to-law/
- Writing, https://johnbandler.com/writing/ (recap)
- How to Write a Paper, https://johnbandler.com/how-to-write-paper/
- Final Paper Project, https://johnbandler.com/final-paper-project/
- Paper Topic Ideas and Areas, https://johnbandler.com/paper-topic-ideas/
- Paper Topic Assignment, https://johnbandler.com/paper-topic-assignment/
- Artificial Intelligence and Human Writing and Thinking, https://johnbandler.com/artificial-intelligence-writing-thinking/ (recap)
Supplemental reading and research (time permitting)
- See references within materials and on the reference page
Weekly reminders
- Discussion
- Assignment
- Work on your paper project
Week 3 - Introducing criminal and civil law plus two important amendments
Topics
- In sum: Topics tracking Chapters 8-12
- Crime and criminal law introduced
- Civil law introduced
- The First Amendment
- The Fourth Amendment
- Jurisdiction
Reading
- In sum: Read Chapters 8-12
- Continuing within Part 2: Introduction to law
- Chapter 8. Crime and criminal law introduced
- Chapter 9. Civil law introduced
- Chapter 10. The First Amendment
- Chapter 11. The Fourth Amendment
- Chapter 12. Jurisdiction
- First Amendment things to know, https://johnbandler.com/things-to-know-first-amendment/
- Fourth Amendment and cases things to know, https://johnbandler.com/things-to-know-fourth-amendment-cases/
- Cornell LII, U.S. Constitution, First Amendment, https://www.law.cornell.edu/constitution/first_amendment
- Cornell LII, U.S. Constitution, Fourth Amendment, https://www.law.cornell.edu/constitution/fourth_amendment
Supplemental reading and research (time permitting)
- See footnotes, references, and reference webpage
Weekly reminders
- Discussion
- Assignment
- Work on your paper project
Week 4 - How we got to cyberlaw: Entering cyberspace
Topics
- In sum: Topics tracking Chapters 13-18
- Getting to cyber law
- Cybercrime and identity theft
- Other markets for your data
- Introducing technology
- Introducing cybersecurity and cybercrime prevention
- Assessing and applying law to the digital domain
- Paper topic assignment (recap)
Reading
- In sum: Read Chapters 13-18
- Part 3: Entering “cyberspace”
- Chapter 13. How did we get to cyberlaw?
- Chapter 14. Cybercrime and identity theft
- Chapter 15. Markets for your data and a need for privacy
- Chapter 16. Technology introduced
- Chapter 17. Cybersecurity introduced
- Chapter 18. Applying law to the digital domain
- Cybersecurity things to know, https://johnbandler.com/things-to-know-cybersecurity/
- Reread, Paper Topic Assignment, https://johnbandler.com/paper-topic-assignment/
Supplemental reading and research (time permitting)
- See footnotes, chapter resources, and the resources webpage for each chapter.
Weekly reminders
- Discussion
- Assignment
- ** Paper topic assignment due **
Week 5 - Criminal cyberlaw 1: Substantive and procedural laws
Topics
- In sum: Topics tracking Chapters 19-21
- The Western Express cybercrime case
- Substantive criminal laws for cybercrime ("substantive criminal cyberlaw")
- Criminal procedure and gathering electronic evidence and cybercrime evidence ("procedural criminal cyberlaw")
Reading
- In sum: Read Chapters 19-21 and some statutes
- Part 4: Criminal cyberlaw
- Chapter 19. The Western Express cybercrime case
- Chapter 20. Substantive cybercrime laws
- Chapter 21. Criminal procedure and gathering evidence
- Spend some time perusing these statutes
- Federal statutes of note
- Computer Fraud and Abuse Act (CFAA), 18 U.S. Code § 1030 - Fraud and related activity in connection with computers, https://www.law.cornell.edu/uscode/text/18/1030
- Electronic Communications Privacy Act (ECPA),
- Title I: Wiretap Act 18 U.S.C. §§ 2510–2523, https://www.law.cornell.edu/uscode/text/18/part-I/chapter-119
- Title II: Stored Communications Act (SCA) 18 U.S.C. §§ 2701–2713, https://www.law.cornell.edu/uscode/text/18/part-I/chapter-121
- Title III: Pen Registers and trap and trace devices 18 U.S.C. §§ 3121–3127, https://www.law.cornell.edu/uscode/text/18/part-II/chapter-206
- NYS PL statutes of note:
- P.L. Article 155, Larceny, https://www.nysenate.gov/legislation/laws/PEN/P3TJA155
- P.L. Article 156, Offenses Involving Computers; https://www.nysenate.gov/legislation/laws/PEN/P3TJA156
- P.L. § 156.05 Unauthorized use of a computer, https://www.nysenate.gov/legislation/laws/PEN/156.05
- P.L. § 156.10, Computer Trespass, https://www.nysenate.gov/legislation/laws/PEN/156.10
- P.L. § 156.20 Computer tampering in the fourth degree, https://www.nysenate.gov/legislation/laws/PEN/156.20
- P.L. § 190.77, Offenses involving theft of identity; definitions,
- https://www.nysenate.gov/legislation/laws/PEN/190.77
- P.L. § 190.78 Identity theft in the third degree, https://www.nysenate.gov/legislation/laws/PEN/190.78
- P.L. Article 470, Money Laundering, https://www.nysenate.gov/legislation/laws/PEN/P4TXA470
- P.L. Article 460, Enterprise corruption, https://www.nysenate.gov/legislation/laws/PEN/P4TXA460
- P.L. § 460.20, Enterprise corruption, https://www.nysenate.gov/legislation/laws/PEN/460.20
Supplemental reading and research (time permitting)
- Statutes, references, etc.
Weekly reminders
- Discussion
- Assignment
- Work on your paper project
Week 6 - Virtual currency, money laundering and cybercrime (criminal cyberlaw 2)
Topics
- In sum: Topics tracking Chapters 22 and 23
- Virtual currency, cryptocurrency, money laundering
- Solving the cybercrime problem
- Encryption and the "going dark" debate
Reading
- In sum: Read Chapters 22 and 23
- Chapter 22. Virtual currency and money laundering
- Chapter 23. Solving the cybercrime problem
- Cryptocurrency past is prologue: before and after FTX, https://johnbandler.com/cryptocurrency-past-is-prologue-before-and-after-ftx/ to access the PDF file at https://johnbandler.com/wp-content/uploads/2023/01/Bandler-ReutersLN-Cryptocurrency-Past-Prologue-2023-01-17.pdf
- Solving the cybercrime problem, https://johnbandler.com/solving-the-cybercrime-problem/, to access the PDF file at https://johnbandler.com/wp-content/uploads/2023/03/Bandler-ReutersLN-Cybercrime-Problem-2023-3-21.pdf
Supplemental reading and research (time permitting)
- Explore the references at: Virtual Currency References, https://johnbandler.com/virtual-currency-references/
Weekly reminders
- Discussion
- Assignment
- Work on your paper project
Week 7 - Civil cyber law introduced
Topics
- In sum: Topics tracking Chapters 24-26
- Intentional torts (wrongs)
- Negligence torts
- Contract
Reading
- In sum: Read Chapters 24-26
- Part 5: Civil cyberlaw I
- Chapter 24. Intentional torts (wrongs)
- Chapter 25. Negligence law
- Chapter 26. Contract law
- Paper outline assignment, https://johnbandler.com/paper-outline-assignment
Supplemental reading and research (time permitting)
- Resources and references
Weekly reminders
- Discussion
- Assignment
- Work on your paper project
- ** Submit paper outline **
Week 8 - Contract, cyber insurance, regulation
Topics
- In sum: Topics tracking Chapters 26-28
- Contract law (recap/catchup)
- Cyberinsurance
- Regulation
- Intellectual property introduced
Reading
- In sum: Read Chapters xxx
- Recap/refresh: Chapter 26. Contract law
- Chapter 27. Regulation introduced
- First part Chapter 28. Intellectual property law
Supplemental reading and research (time permitting)
- See references
Weekly reminders
- Discussion
- Assignment
- Work on your paper project
Week 9 - Intellectual property law
Topics
- In sum: Topics tracking Chapter 28
- Intellectual property law overview
- Copyright law
- Trademark law
- Patent law
- Trade secrets law
Reading
- In sum: Read Chapter 28
- Chapter 28. Intellectual property law
- Paper presentation instructions, https://johnbandler.com/paper-presentation-discussion-assignment/
Weekly reminders
- Discussion ** Post your three minute recorded presentation about your paper topic to the discussion board by Friday **
- Assignment (short reflection)
- Work on your paper project
Week 10 - Data law 1: Data breach and cybersecurity
Topics
- In sum: Topics tracking Chapters 29-31
- Data law introduced
- Data breach notification laws
- Cybersecurity laws
Reading
- In sum: Read Chapters 29-31
- Part 6: Civil cyberlaw II: Data law
- Chapter 29. Data law introduced
- Chapter 30. Data breach notification laws
- Chapter 31. Cybersecurity and data protection laws
- Spend ten minutes reading each of these statutes:
- NYS Data breach notification statute, NY GBL 899-aa https://www.nysenate.gov/legislation/laws/GBS/899-AA
- NYS Cybersecurity statute, NY GBL 899-bb https://www.nysenate.gov/legislation/laws/GBS/899-BB
Supplemental reading and research (time permitting)
- See statutes, resources, and references
Weekly reminders
- Discussion (watch presentations of all other students and reply)
- Assignment
- Work on your paper project
Week 11 - Data law 2: Privacy, AI, some data laws to review
Topics
- In sum: Topics tracking Chapters 32-34
- Privacy
- Privacy laws
- Artificial intelligence
- Reviewing some data laws
Reading
- In sum: Read Chapters 32-34
- Chapter 32. Privacy and privacy laws
- Chapter 33. Artificial intelligence
- Chapter 34. Summarizing some data laws
- Consumer Privacy Rights, https://johnbandler.com/consumer-privacy-rights/
- 10 minutes reading: FTC Act, 15 USC §45, https://www.law.cornell.edu/uscode/text/15/45
- 10 minutes reading about California’s privacy law (CCPA), at https://cppa.ca.gov/regulations/
Supplemental reading and research (time permitting)
- See references
Weekly reminders
- Discussion
- Assignment
- Work on final paper
Week 12 - Cyber conflict between nations
Topics
- In sum: Topics tracking Chapter 35
- Law of warfare and cyberconflict
- U.N. Charter
- International courts
- Foreign influence and interference
- Range of actions and options
Reading (read before class)
- In sum: Read Chapter 35
- Part 7: International cyber actions
- Chapter 35. International cyber conflict and law
- UN Charter Article 1 and 2, especially 2(4), https://www.un.org/en/about-us/un-charter/chapter-1
- UN Charter Article 51, https://www.un.org/en/about-us/un-charter/chapter-7
- Tallinn Manual general information including, https://ccdcoe.org/research/tallinn-manual/ and https://en.wikipedia.org/wiki/Tallinn_Manual
- “Mueller Report” Executive Summaries (Report on The Investigation into Russian Interference in the 2016 Presidential Election),
Supplemental reading and research (time permitting)
- References and resources, including more recent foreign influence operations
- Michael Schmitt, Grey Zones in the International Law of Cyberspace, Yale Journal of International Law (October 18, 2017), https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3180687
- Michael N. Schmitt, Foreign Cyber Interference in Elections, 97 INT’L L. STUD. 739 (2021), at https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=2969&context=ils, via https://digital-commons.usnwc.edu/ils/vol97/iss1/32/
Weekly reminders
- Discussion
- Assignment
- Work on your final paper
Week 13 (2nd to last week) - Speech and expression in cyberspace
Topics
- In sum: Topics tracking Chapter 36
- Speech and thought online
- Cyberbullying
- Communications decency act
- The battle for our brains
- Information online: fact or fiction: misinformation, disinformation, propaganda, conspiracy theories
Reading
- In sum: Read Chapter 36
- Part 8: Speech, expression and thought
- Chapter 36. Cyber speech and the battle for our minds
- Spend ten minutes reading:
- Communications Decency Act 47 U.S. Code § 230 - Protection for private blocking and screening of offensive material, https://www.law.cornell.edu/uscode/text/47/230
- Final paper assignment, https://johnbandler.com/final-paper-assignment/
- Paper submission checklist, https://johnbandler.com/paper-submission-checklist/
Supplemental reading and research (time permitting)
- n/a
Weekly reminders
- Discussion
- Assignment
- ** Submit your final paper **
Week 14 (last week) - Organization management and compliance, including with cyber
Topics
- In sum: Topics tracking Chapters 37-41
- Business basics law
- Organization management and policy work
- Apply the Five Components for Policy Work to manage
- Cybersecurity frameworks (external guidance)
- The Four Pillars of Cybersecurity
- Course Wrap-Up
Reading
- In sum: Read Chapters 37-41
- Part 9: Organizations and cyberlaw
- Chapter 37. Business law basics
- Chapter 38. Management and policy work
- Chapter 39. Managing cyber issues
- Chapter 40. Cybersecurity frameworks
- Chapter 41. The Four Pillars of Cybersecurity
- Spend ten minutes on each of these sites reading and exploring
- NIST Cybersecurity Framework landing page, https://www.nist.gov/cyberframework
- NIST Privacy Framework landing page, https://www.nist.gov/privacy-framework
Supplemental reading and research (time permitting)
- Other chapter resources
Weekly reminders
- Discussion
- Assignment?
Bottom and notes
Remember to consult the course syllabus and learning management system (LMS).
Where chapters/topics are covered in successive weeks, make sure you have read the chapter for the first week it is covered. Then we may cover it in full the first week, or merely introduce it the first week, depending on schedule.
About the book
- Book landing page: Cyberlaw Book
- Book resources page: Cyberlaw Book Resources
- Purchase the book on Amazon (paperback)
- Cyberlaw things to know
- Course Resources
This page is hosted at https://johnbandler.com/pace-is-647-cyberlaw-2025-spring, copyright John Bandler, all rights reserved.
Originally posted 1/9/2025. Updated 1/10/2025.