Pace Law, Law 606B Cybercrime and Cybersecurity
Fall 2025 * * Current Semester * *
Weekly topics and reading
Your reading and research start point is my book, Cyberlaw: Law for Digital Spaces and Information Systems (2025).
Your next steps are the book resources and cited materials working towards primary sources (statutes and cases).
Your further steps are wherever you decide, to build the knowledge and skills you will need as a lawyer and professional.
Introduction
Devote a sufficient amount of time with honest effort to read before each class.
The weekly reading links are laid out below. Do the reading before class meets so you can participate, share, teach, and better learn. The syllabus and LMS are your main course resources for course instructions and requirements. This page is provided as a convenience, and may contain updates on reading throughout the semester.
Don't be intimidated by the size of this page. This page covers the entire semester, you will get to know it and master the content. Each week is it's own module, you can use the jump links to go to the current week.
Menu (jump links)
- Week 0 and course resources
- Week 1 - Course introduction – Cyberlaw mindset and recap our legal foundation
- Week 2 - Entering “Cyberspace”: Technology, Computers, Networks, Cybersecurity, Society
- Week 3 - Cybercrime Substantive Law (Criminal Cyberlaw Part 1)
- Week 4 - Criminal Procedure and Gathering Evidence
- Week 5 - Virtual Currency, Money Laundering, and Cybercrime
- Week 6 - Civil Cyberlaw Part 1, Torts, Contract
- Week 7 - Civil Cyberlaw Part 2: Regulation and IP
- Week 8 - Data Law 1: Data Breach and Cybersecurity
- Week 9 - Data Law 2: Privacy, AI, Review
- Week 10 - Cyber Conflict Between Nations
- Week 11 - Speech and Expression in Cyberspace
- Week 12 - Organization Management and Compliance with Cyber
- Week 13 - Catchup, Recap, Review, Possible Quiz
- Conclusion and main links
Week 0 and throughout - Course Materials
Important course materials and resources include:
- The learning management system (LMS) which includes
- Syllabus
- Welcome & orientation video ("Week 0 video")
- Announcements
- Assignments
- Discussion
- Course Resources
- Cyberlaw book
- Final paper project
- Everything (search my site)
- Factual nuggets and quiz study material: Start at Things to know and navigate to cyberlaw, cybersecurity, etc.
- YouTube videos on law, learning, and cyber that I am building out little by little and are publicly available, https://www.youtube.com/@johntbandler
- School specific resources (Pace Law)
Week 1 - Course introduction - Cyberlaw mindset and recap our legal foundation
Topics
- In sum: Course introduction and topics tracking Cyberlaw book Chapters 1-12
- Cyberlaw learning mindset
- Why cyberlaw
- Cyberlaw introduced
- Course introduction and overview
- Syllabus review
- Introduction to law recap, rules, laws, U.S. legal system, U.S. Constitution, etc.
- Introduction to final paper, discuss paper topics, tips on writing a paper
Reading (read before class, skim any articles with basic level materials which you have already mastered)
- In sum: Read Chapters 1-12, plus syllabus and articles
- Syllabus
- Introduction video
- From book: Cyberlaw: Law for Digital Spaces and Information Systems (2025)
- Please consider reading "like an editor" and let me know how you would improve these introductory chapters.
- Part 1: Cyberlaw learning mindset
- Chapter 1. Why cyberlaw and using this book
- Chapter 2. Cyberlaw introduced
- Chapter 3. Learning, reading, researching, writing
- Part 2: Introduction to law
- Chapter 4. Rules humans create
- Chapter 5. Laws introduced
- Chapter 6. The U.S. legal system introduced
- Chapter 7. The U.S. Constitution and Amendments
- Chapter 8. Crime and criminal law introduced
- Chapter 9. Civil law introduced
- Chapter 10. The First Amendment
- Chapter 11. The Fourth Amendment
- Chapter 12. Jurisdiction
- Learning, writing and the final paper project
- Writing, https://johnbandler.com/writing/
- How to Write a Paper, https://johnbandler.com/how-to-write-paper/
- Final Paper Project, https://johnbandler.com/final-paper-project/
- Paper Topic Ideas and Areas, https://johnbandler.com/paper-topic-ideas/
- Paper Topic Assignment, https://johnbandler.com/paper-topic-assignment/
- How to Learn and Study, https://johnbandler.com/how-to-learn-and-study/
- How to Take an Exam, https://johnbandler.com/how-to-take-an-exam
- A guide to citations and references, https://johnbandler.com/guide-citations-references/
- Helpful Legal Resources and Links, https://johnbandler.com/helpful-legal-links/
- Artificial Intelligence and Human Writing and Thinking, https://johnbandler.com/artificial-intelligence-writing-thinking/
- AI's promise and problem for law and learning, Reuters article hosted at https://johnbandler.com/ai-promise-and-problem/
- AI Tools Will Not do it All for You (article), https://johnbandler.com/ai-tools-will-not-do-it-all-for-you/
- See video at bottom of article, or at https://youtu.be/bfAVUuPr2Hs
- Scaffolding, Layering, and Learning (article), https://johnbandler.com/scaffolding-layering-learning/
- See video at bottom of article, or at https://youtu.be/4isYpHglf6Y
Reminder: An assignment and discussion this week
Week 2 - Entering “Cyberspace”: Technology, Computers, Networks, Cybersecurity, Society
Topics
- In sum: Topics tracking Cyberlaw book Chapters 13-18
- Getting to cyber law
- Cybercrime and identity theft
- Other markets for your data
- Introducing technology
- Introducing cybersecurity and cybercrime prevention
- Assessing and applying law to the digital domain
- Paper topic assignment
Reading (read before class)
- In sum: Read Chapters 13-18, plus articles
- Part 3: Entering “cyberspace”
- Chapter 13. How did we get to cyberlaw?
- Chapter 14. Cybercrime and identity theft
- Chapter 15. Markets for your data and a need for privacy
- Chapter 16. Technology introduced
- Chapter 17. Cybersecurity introduced
- Chapter 18. Applying law to the digital domain
- Cybersecurity things to know, https://johnbandler.com/things-to-know-cybersecurity/
- Reread, Paper Topic Assignment, https://johnbandler.com/paper-topic-assignment/
- Remember - every week devote appropriate, law school level reasonable time to reading, including of primary legal authorities, and other additional reading and references. See https://johnbandler.com/cyberlawbook-resources/ and the corresponding page for each chapter.
- For example, additional cybersecurity resources are at https://johnbandler.com/cyberlawbook-resources-ch17/
Week 3 - Criminal cyberlaw (Cybercrime Law) Part 1
Topics
- In sum: Topics tracking Cyberlaw book Chapters 19-20
- The Western Express cybercrime case
- Substantive criminal laws for cybercrime (“substantive criminal cyberlaw”)
- Final project discussion
Reading (read before class)
- In sum: Read Chapters 19-20, plus articles
- Chapter 19. The Western Express cybercrime case
- Chapter 20. Substantive cybercrime laws
- Spend a reasonable amount of time reading the statutes cited in Chapter 20 and at the course resources page for this chapter, https://johnbandler.com/cyberlawbook-resources-ch20/
- Federal statutes of note
- NYS PL statutes of note
Reminder: Paper topic assignment due Monday after class 3
Week 4 - Criminal procedure and gathering evidence
Topics
- In sum: Topics tracking Cyberlaw book Chapter 21
- Criminal procedure and gathering electronic evidence and cybercrime evidence ("procedural criminal cyberlaw")
- Final project discussion
Reading (read before class)
- In sum: Read Chapter 21, plus articles
- Chapter 21. Criminal procedure and gathering evidence
- Spend a reasonable amount of time reading the statutes cited in the chapter and at the course resources page for this chapter, https://johnbandler.com/cyberlawbook-resources-ch21/
- Federal statutes of note
- NYS CPL statutes of note
Week 5 - Virtual Currency, Cryptocurrency, Money Laundering, and Cybercrime
Topics
- In sum: Topics tracking Cyberlaw book Chapters 22-23
- Virtual currency, cryptocurrency, money laundering
- Solving the cybercrime problem
- Encryption and the "going dark" debate
- Final project discussion
Reading (read before class)
- In sum: Read Chapters 22 and 23, plus articles
- Chapter 22. Virtual currency and money laundering
- Chapter 23. Solving the cybercrime problem
- Spend a reasonable amount of time reading the statutes cited in Ch 22 and at the course resources page for this chapter
-
- Federal statutes of note
- NYS CPL statutes of note
- Virtual Currency References, https://johnbandler.com/virtual-currency-references/
- Money Laundering, https://johnbandler.com/money-laundering/
- Money Mule, https://johnbandler.com/money-mule/
- Cryptocurrency past is prologue: before and after FTX, https://johnbandler.com/cryptocurrency-past-is-prologue-before-and-after-ftx/ (Reuters article)
- Solving the Cybercrime Problem, https://johnbandler.com/solving-the-cybercrime-problem/ (Reuters article)
Week 6 - Civil Cyberlaw Part 1
Topics
- In sum: Topics tracking Cyberlaw book Chapters 24-26
- Intentional torts (wrongs) and cyber
- Negligence torts and cyber
- Contract and cyber
- Final project discussion
Reading (read before class)
- In sum: Read Chapters 24-26
- Part 5: Civil cyberlaw I
- Chapter 24. Intentional torts (wrongs)
- Chapter 25. Negligence law
- Chapter 26. Contract law
- Delta v CrowdStrike and the 2024 outage, https://johnbandler.com/delta-v-crowdstrike-and-2024-outage/ (includes complaints and other information)
- Judge Peter B. Swann & Sarah Pook, Tortious Speech in the Digital Age, Arizona State Law Journal, 2021 (53 Ariz. St. L.J. 859 (2021)., https://arizonastatelawjournal.org/wp-content/uploads/2022/02/08-Swann.pdf, or via https://arizonastatelawjournal.org/2022/02/10/tortious-speech-in-the-digital-age/
Reminder: Paper outline assignment due Monday after class 6
Week 7 - Civil Cyberlaw Part 2: Regulation and IP
Topics
- In sum: Topics tracking Cyberlaw book Chapters 27-28
- Regulation
- Intellectual property
- Final project discussion
Reading (read before class)
- In sum: Read Chapters 27-28
- Chapter 27. Regulation introduced
- Chapter 28. Intellectual property law
Week 8 - Data Law 1: Data Breach and Cybersecurity
Topics
- In sum: Topics tracking Cyberlaw book Chapters 29-31
- Data law introduced
- Data breach notification laws
- Cybersecurity laws
- Final project discussion
Reading (read before class)
- In sum: Read Chapters 29-31, plus reasonable time with the statutes and additional resources
- Part 6: Civil cyberlaw II: Data law
- Chapter 29. Data law introduced
- Chapter 30. Data breach notification laws
- Chapter 31. Cybersecurity and data protection laws
- Spend forty minutes total reading these statutes:
- NYS Data disposal statute, GBL § 399H, Disposal of records containing personal identifying information, https://www.nysenate.gov/legislation/laws/GBS/399-H
- NYS Data breach notification statute, NY GBL 899-aa https://www.nysenate.gov/legislation/laws/GBS/899-AA
- NYS Cybersecurity statute, NY GBL 899-bb https://www.nysenate.gov/legislation/laws/GBS/899-BB
Week 9 - Data Law 2: Privacy, AI, Review
Topics
- In sum: Topics tracking Cyberlaw book Chapters 32-34
- Privacy
- Privacy laws
- Artificial intelligence
- Reviewing some data laws
- Final project discussion
Reading (read before class)
- In sum: Read Chapters 32-34, plus plus reasonable time with the statutes and additional resources
- Part 6: Civil cyberlaw II: Data law
- Chapter 32. Privacy and privacy laws
- Chapter 33. Artificial intelligence
- Chapter 34. Summarizing some data laws
- Spend reasonable time minutes reading the EU Artificial Intelligence Act, European Union Artificial Intelligence Act, Regulation (EU) 2024/1689 of the European Parliament, https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32024R1689
- Spend reasonable time minutes researching a recent U.S. or U.S. state AI legislation
- Can you name the top 5 important U.S. (or U.S. state) data laws?
Reminder: Recorded presentation due Monday after class 9
Week 10 - Cyber Conflict Between Nations
Topics
- In sum: Topics tracking Cyberlaw book Chapters 35
- Law of warfare and cyberconflict
- U.N. Charter
- International courts
- Foreign influence and interference
- Range of actions and options
- Final project discussion
Reading (read before class)
- In sum: Read Chapters 35, plus articles
- Part 7: International cyber actions
- Chapter 35. International cyber conflict and law
- UN Charter Article 1 and 2, especially 2(4), https://www.un.org/en/about-us/un-charter/chapter-1
- UN Charter Article 51, https://www.un.org/en/about-us/un-charter/chapter-7
- Tallinn Manual general information including, https://ccdcoe.org/research/tallinn-manual/ and https://en.wikipedia.org/wiki/Tallinn_Manual
- “Mueller Report” Executive Summaries (Report on The Investigation into Russian Interference in the 2016 Presidential Election),
Week 11 - Speech and Expression in Cyberspace
Topics
- In sum: Topics tracking Cyberlaw book Chapter 36
- Speech and thought online
- Cyberbullying
- Communications decency act
- The battle for our brains
- Information online: fact or fiction: misinformation, disinformation, propaganda, conspiracy theories
- Final project discussion
Reading (read before class)
- In sum: Read Chapters 36, plus statute/articles
- Chapter 36. Cyber speech and the battle for our minds
- Spend fifteen minutes reading:
- Communications Decency Act 47 U.S. Code § 230 - Protection for private blocking and screening of offensive material, https://www.law.cornell.edu/uscode/text/47/230
- Final paper assignment, https://johnbandler.com/final-paper-assignment/
- Paper submission checklist, https://johnbandler.com/paper-submission-checklist/
- Spend time reading some of the additional resources for Chapter 36
- Final Paper Assignment, https://johnbandler.com/final-paper-assignment/
Week 12 - Organization Management and Compliance with Cyber
Topics
- In sum: Topics tracking Cyberlaw book Chapters 37-41
- Business basics law
- Organization management and policy work
- Apply the Five Components for Policy Work to manage
- Cybersecurity frameworks (external guidance)
- NIST Cybersecurity Framework
- The Four Pillars of Cybersecurity
- Final project discussion
Reading (read before class)
- In sum: Read Chapters 37-41, plus articles
- Part 9: Organizations and cyberlaw
- Chapter 37. Business law basics
- Chapter 38. Management and policy work
- Chapter 39. Managing cyber issues
- Chapter 40. Cybersecurity frameworks
- Chapter 41. The Four Pillars of Cybersecurity
- Spend ten minutes on each of these sites reading and exploring
- NIST Cybersecurity Framework landing page, https://www.nist.gov/cyberframework
- NIST Privacy Framework landing page, https://www.nist.gov/privacy-framework
Reminder: Final paper due Monday after class 12
Week 13 (last week) - Attorneys and Cybersecurity: Ethical Duties, Catchup, Recap, Review, Possible Quiz
Topics
- In sum: Attorneys and cybersecurity, recap, review, possible quiz
- Attorney ethical duties regarding cybersecurity
- Cybersecurity revisited
- Final project discussion
Reading (read before class)
- In sum: Below articles
- Cybersecurity for Attorneys, https://johnbandler.com/cybersecurity-for-attorneys/
- Attorneys, know your client (and beneficiaries), https://johnbandler.com/attorneys-know-your-client/
- Email security, https://johnbandler.com/email-security/
- Email Based Funds Transfer Frauds, https://johnbandler.com/email-based-funds-transfer-frauds/
- Attorneys on alert for cybersecurity threats: New York's new CLE training requirement, John Bandler, Reuters Legal News, July 19, 2023,
- Watch First video of YouTube Course "Build and Maintain Your Cybersecurity Program Using my Resources" and review accompanying web resource, e.g.;
- Overview of Bandler's DIY Cybersecurity Program and Resources, https://johnbandler.com/overview-bandlers-diy-cybersecurity-program/
- Video: Overview: Learn Build Maintain Bandler's Cybersecurity Program Yourself in Your Organization, https://youtu.be/tyh0ZjZHdXE
- Bandler Article, A Day in the Life of an Attorney: The Cybersecurity, Technology, and Crime Risks We Face, https://johnbandler.com/bandler-nysba-journal-jul-2018-day-in-life-of-attorney-cybersecurity/
- ABA Committee on Ethics & Professional Responsibility
- SKIM Formal Opinion 477R, Securing Communication of Protected Client Information, May 22, 2017, https://www.americanbar.org/content/dam/aba/administrative/professional_responsibility/ethics-opinions/aba-formal-opinion-477.pdf
- SKIM Formal Opinion 483, Lawyers’ Obligations After an Electronic Data Breach or Cyberattack, October 17, 2018, https://www.americanbar.org/content/dam/aba/administrative/professional_responsibility/ethics-opinions/aba-formal-op-483.pdf
- Mark your calendar for my annual May CLE for Pace on cybersecurity (free), see Cybersecurity, Law, and Ethics: Pace CLE 2026-5
Conclusion and main links
Remember to consult the course syllabus and learning management system (LMS).
About the book
- Cyberlaw book landing page
- Cyberlaw book resources page
- Course Resources
- Everything (search the site)
This page is hosted at https://johnbandler.com/pl-law-606b-cybercrime-cybersecurity-2025-fall, copyright John Bandler, all rights reserved.
Originally posted 6/26/2025. Updated 8/15/2025.
