Government Procurement & Cybersecurity Law Concentration
Specialize your skills in a growing field that fuses government contracts with cybersecurity law.
Overview
The Government Procurement and Cybersecurity law concentration equips students with skilled legal reasoning and policy interpretation that procurement professionals employ in federal agencies, private firms and other industry settings.
What is the Government Procurement and Cybersecurity Law Concentration?
Within the field of government procurement law, there is an increasing demand for cybersecurity legal expertise among government procurement practitioners. This concentration meets the evolving needs of professionals who work on cutting-edge issues around government contracts and national and cyber threats.
Courses
Students are required to complete 13 credits of core courses, four credits of government procurement courses, and five credits of cyber-related courses.
Core Courses – 13 credits
Survey of the law pertaining to government procurement, including an analysis of the unique features of government contracting and a discussion of the functions of Congress, the executive branch, and the courts in the procurement process. The course focuses on the contract formation process, including techniques for awarding contracts and litigation and protests involving awards. (Examination and problem assignments)
Discussion of the substantive problems that most frequently arise during the performance of government contracts. Interpretation of specifications and the most generally used contract clauses; analysis of the rights of the parties when performance in accordance with the terms of the contract is not obtained. Analysis of the methods that can be used by the parties to a government contract to obtain legal relief, including detailed coverage of the disputes procedure, actions for breach of contract, and forms of equitable and extraordinary relief. (Examination and problem assignments)
Intellectual property law in terms of its challenges to federal government procurement rules. Competing policy demands for innovation, transparency, and sound public investment in the intersection of intellectual property law and federal procurement rules. Prerequisite for JD students: Law 6500 or 6502 or permission of the instructor. (Problem assignments)
This course teaches advanced writing to professionals in the government contracts field, including effective written communication tips and tools that students will use in upper-level seminar courses. Throughout the semester, the students will write and edit a short research paper related to government contracts and complete weekly writing assignments. This course is graded on a CR/NC basis and is available only for MSL candidates in the government procurement law program. (Writing assignments)
Issues relating to the organization of the internet and the federal government’s response to cyberthreats. Legal concepts relating to the private sector and civilian government engagement in cyberspace. Application of traditional laws of armed conflict in the new cyber domain. Students who receive credit for Law 6890 Cybersecurity Law and Technology may not enroll in this course. (Take-home examination)
AND
This course examines basic technical concepts relevant to the law. It is designed as a foundational course that will introduce students to key terms and concepts related to cybersecurity. The course will provide a basic understanding of cybersecurity topics that will empower students to more easily identify, understand, and analyze associated legal issues. This course is recommended for students who have little to no technical knowledge but intend to enroll in cyber-related courses as part of their academic curriculum. Students who have prior technical knowledge should not enroll in this course. This course is graded on a CR/NC basis. Students who receive credit for Law 6890 Cybersecurity Law and Technology may not enroll in this course. (Take-home mid-term examination and take-home final examination)
OR
Issues relating to the organization of the internet and the federal government’s response to cyberthreats. Legal concepts relating to the private sector and civilian government engagement in cyberspace. Application of traditional laws of armed conflict in the new cyber domain. Also, examination of basic terms and concepts relevant to cybersecurity technology required to identify, understand, and analyze associated legal issues. Students who receive credit for Law 6879, Cybersecurity Law and Policy or Law 6884, Technology Foundations for Cybersecurity may not enroll in this course. (Writing assignments and take-home examination)
Featured Elective Courses
This course gives students the opportunity to explore the role of counsel assigned to a bid protest related to award of a government contract, either as agency counsel, protest counsel, or intervenor counsel. In their first year of practice, most government contracts attorneys will encounter bid protest litigation in one form or another. The bid protest scenario presented in this course will be similar to complex, multimillion-dollar cases attorneys face in practice. Students will experiment with litigation strategies and construct arguments on behalf of clients throughout the bid protest process. Students will receive faculty and peer feedback on oral and written advocacy work products. Enrollment is limited. Prerequisite for JD students: Law 6500 or 6502 or permission of the instructor. (Writing assignments and oral presentations)
This course provides experiential learning for students planning a career in the federal government advising and leading legislative, executive, or judicial branch programs. An understanding of federal appropriations law is a fundamental skill for all federal attorneys. The identification of an available appropriation, its permissible uses, and any relevant restrictions or prohibitions, is a threshold issue prior to taking any federal action, including executing a federal contract. Federal attorneys with a working knowledge of appropriations law bring critical expertise to bear in advising internal agency clients on how to maximize scarce resources. (Writing assignments and class participation)
This seminar offers a review of emerging issues in U.S. procurement law, using information technology procurement and other critical market sectors as a starting point for analysis; we will also be looking to international procurement law, as a comparative counter-example to U.S. law. Prerequisite or concurrent registration: Law 6500 or Law 6502, or permission of instructor. (Research paper)
This course provides experiential learning for students planning a career in the federal acquisition field as well as in the private sector. An understanding of Other Transaction Authority (OTA) is a fundamental skill for all federal attorneys. The identification of a prototype or research Other Transaction (OT) requirement, its permissible uses, and any relevant restrictions or prohibitions, is a threshold issue prior to taking any federal action, including executing a federal contract. Attorneys with a working knowledge of OTA bring critical expertise to bear in advising internal agency clients on how to maximize scarce resources and broaden the industrial base. While OTA is a “tool” in the acquisition “toolbox,” it offers a much more flexible approach over a traditional FAR-based procurement contract, allowing the government to emulate commercial negotiations and practices. Prerequisite: Law 6500 or 6502, or written permission of the program director. (In-class and written exercises, class participation)
This course explores the legal issues arising out of the U.S. government’s increasing reliance on “technology,” which broadly includes software providers, cloud service providers, and professional services, to meet its mission. Students will be introduced to the unique procurement law issues and opportunities that technology government procurement practitioners encounter in their daily work, including public sector technology negotiations, client advising, compliance and security issues, and risk management. JD students must complete Law 6500 or 6502 prior to enrolling in this course (or obtain the advanced, written permission of the instructor. (In-class and written exercises)
Featured Cyber-Related Elective Courses
Focus on speech on the internet, including governmental attempts to control or filter speech, intermediary liability for third-party speech, digital rights management and other copyright issues, and domain names as speech. The rules and institutions that permit or disallow governance of these issues. Students may not receive credit for both Law 6493, Internet Law and 6485, Law in Cyberspace. (Take-home examination).
This course explores the cross-disciplinary legal and policy aspects of artificial intelligence (AI). Analysis of the impact of AI on society and the ability of current legal and regulatory frameworks to address issues arising from the use and deployment of AI. Introduction to emerging technology and evaluation of the complex and evolving set of legal, ethical, and social issues presented by their use. Examination of the legal, social, ethical, economic, and technical implications for society generally and national security specifically. Topics include the technology of AI, its development in the broader context of historical developments in technology, its growth and impact across various sectors in society, and evaluation of its impact on national and global security. This also will include the potential development and use of autonomous weapons systems and its compatibility with international humanitarian law principles. (Take-home examination (2-credit, online section or 2-credit, on-campus section) or proctored examination (3-credit, on campus))
The fundamental U.S. legal, policy, and regulatory framework restricting foreign access to U.S. technology, an area that implicates commercial, trade, and national security laws and policies. Restriction on foreign investment in the United States and access to U.S. technological and other assets, including the respective roles and powers of the Executive and Legislative branches of the federal government; related commercial, legal and policy issues surrounding critical technologies; and, how foreign access to U.S. technology straddles commercial, trade and national security law and policy. Increased United States restriction of foreign access to U.S. technology, such as through Defense Production Act amendments and expanded authority of the Committee on Foreign Investment in the United States to review foreign investment involving technology and personal data, targeted export controls and sanctions enforcement, criminal prosecutions, and curbs on foreign participation in U.S. academic and research settings. (Take-home examination)
Information privacy law, including the development of constitutional, tort, contract, property, and statutory law to address emerging threats to privacy. Privacy and the media, privacy and law enforcement, workplace privacy, privacy and online transactions, medical and genetic privacy, and privacy and personal records and information. (Examination)
This course focuses on regulation of consumer privacy and data protection. In-depth review of the two major approaches to such regulation, the U.S. approach and the EU approach, and the various dimensions and components of privacy laws. Structural dimensions of laws examined include individual rights, consent, harm, sensitive data, accountability, automated decisions, data security, and enforcement. Emerging issues covered include algorithms, artificial intelligence, machine learning, technological design, platform governance, behavioral advertising, and cyber civil rights. Prior enrollment in 6486 is recommended. (Proctored online examination)
This course explores the law and best practices for cybersecurity risk management and incident response, with particular reference to critical infrastructure systems such as the electric grid. A series of tabletop exercises will give students hands-on training in counseling board members and organizational senior leadership and working with technical and administrative managers, law enforcement, and regulators. This course will also address the increasing role of artificial intelligence in cybersecurity. Students who have enrolled in Law 6892 Selected Topics in Cybersecurity Law: Protecting Critical Infrastructure: Meeting Cybersecurity and National Security Threats or Law 6892, Selected Topics in Cybersecurity Law: Risk Management and Incident Response: Legal Approaches may not take this course. Prerequisites or concurrent registration: Law 6879 and 6884 or 6890. (Take-home examination and class participation)
Career Outcomes
With five million job openings in 2022 and a 20.8% job growth projection by 2032, MSL graduates can propel their careers in government, nonprofit and for-profit sectors. Explore the career opportunities available in the field of government contract and cybersecurity law.
Occupation | Salary (national average) |
---|---|
Manager and program analyst | $118,501 |
Program manager | $160,666 |
Contractor | $113,063 |
Budget analyst | $113,700 |
Supply program manager | $79,867 |
Cybersecurity specialist | $92,901 |
IT auditor | $98,805 |
Cybersecurity analyst | $107,346 |
Cyber Security consultant | $118,610 |
Penetration & vulnerability tester | $124,424 |
Cybersecurity manager | $150,943 |
Which MSL Concentration Is the Right Fit for Your Career Goals?
Connect with our team of advisers today to learn more about concentration outcomes and how an MSL can support your growth.
Schedule a CallTell us about yourself.
Sharing some details will help us customize your experience. A bachelor’s degree is required to attend.