Skip to main content

5 Cybersecurity Jobs that Require a Master’s Degree

Cybersecurity and data privacy are booming fields with tremendous growth potential for professionals with the right expertise. Earning a Master of Legal Studies (MLS) in Cybersecurity and Data Privacy can provide you with the skills and strategic understanding of the mission-critical risks posed by data breaches and other cyber risks. Qualify yourself for some of […]

Read More…

Public Interest Technology and the Fight for Racial Justice

IBM CEO Arvind Krishna recently announced that the company would stop developing facial recognition technologies. He also called on Congress to enact reforms to advance racial justice and combat systemic racism. Several days later Amazon followed suit. They said that it would put a one-year pause on its highly controversial facial recognition system—ominously named Rekognition.  Both announcements come […]

Read More…

Pandemic Privacy: Lessons and Cautions from Around the World

Does combating the novel coronavirus require us to relinquish privacy? China has succeeded in rapidly containing local transmission of the novel coronavirus. They have done this by increasing the scope of its already extensive network of surveillance technologies. This includes a smartphone app that restricts travel and access to public transportation based on an individual’s […]

Read More…

Jurisdictional Conflicts Over Transfers of Personal Data Across Borders

Jurisdictional Conflicts Over Transfers Of Personal Data Across Borders – The Sedona Conference Working Group on International Electronic Information Management, Discovery, and Disclosure (WG6) developed the Commentary and Principles on Jurisdictional Conflicts over Transfers of Personal Data Across Borders to help businesses as they attempt to navigate a bewildering maze of conflicting and confusing data […]

Read More…

How to Build a Successful Legal Career in Cybersecurity

Legal Career in Cybersecurity. Cybersecurity, also referred to as information technology security, is the practice of protecting networks, devices, programs, and data from an attack.  Increased Risk  With advances in technology, there is an increase in the amount of sensitive data the government, military, financial services, medical practices, and various corporations collect. In other words, […]

Read More…