The lessons continue in 4 parts. Part 1 will be an introduction to retail banking law and the disruption caused by fintech. Part 2 will be an introduction to investment/advisory banking law and the disruption caused by fintech. Part 3 deals with horizontal disturbances between sectors. Finally, Part 4 will include a high-level assessment of FinTech regulatory structures and approaches. After this course, students should have an in-depth foundational knowledge of the myriad legal and policy issues that exist in the field of fintech. “Congress shall not pass legislation,” the First Amendment orders, “which restricts freedom. of the press. But Congress, the executive branch and the courts have enacted various laws that govern both print and electronic media. This overview of mass media law examines topical issues such as prior restrictions on publication, defamation, privacy, liability for information gathering, media liability for illegal conduct by third parties, forced disclosure of sources, and access to information.

The practicalities of representing media clients are examined, as well as the impact of existing legal doctrines and proposed changes on public policy. Much of the course is discussion-based, and students are expected to make meaningful contributions to that discussion, with class attendance forming the basis for one-third of the grade for the semester. This course builds on Computer Programming for Lawyers: An Introduction by introducing students to advanced concepts of computer programming and computer science relevant to legal practice. Students in this course serve as teaching assistants for the introductory course, which is always taught at the same time. In addition, students will complete at least one essential programming project in this course. In particular, we will discuss legal and structural issues related to covert actions, espionage, electronic surveillance for foreign intelligence purposes (Foreign Intelligence Surveillance Act) and their impact on privacy interests. We will examine crimes of insurrection, conspiracy, and litigation related to the use of classified information in criminal and civil cases, including the use of secret evidence in law enforcement. This discussion will focus on the State Secrets Privilege and the Classified Information Procedures Act (CIPA). We will investigate the unauthorized disclosure of classified information and whistleblower protection.

Finally, we will briefly discuss the role of a free press in our democracy. This seminar will examine several important legal and policy concerns arising from the conduct of foreign intelligence activities in times of peace and war. Where possible, we will focus on current issues. We will discuss the role and history of Congress in authorizing, oversighting, and regulating intelligence activities. We will also briefly review the President`s constitutional authorities (including Article II) to take steps to protect national defense in the absence of specific legal powers, as well as the role of federal courts in resolving national defense disputes. Almost all areas of law today contain an essential element of administrative law. This course introduces you to the role of administrative authorities and how legal and political factors influence their power and work. This includes documents on how they are empowered and restricted by the Constitution, Congress, presidents, and courts. We also look at how agencies develop laws and policies. This category includes, among other things, documents on citizens` ability to submit, design and advocate petitions; changing views on the role and power of presidents vis-à-vis agencies; and the legal factors and doctrines that shape judicial review of interpretation, reasoning, responsiveness, policy change, and commitment to science and fact. Financial services can be divided into three distinct subsectors: (1) insurance; (2) retail banking; and (3) investment banking and advisory services. This course focuses on how technology is transforming both retail banking and the investment/advisory industry.

The Retail Banking Act was designed for a world of brick-and-mortar banks that accepted deposits and used those deposits to make business and personal loans. Investment banking and advisory law was designed for a world with a relatively small number of sophisticated investors. This traditional pattern is changing rapidly. This course examines copyright and provides a fundamental understanding of its purposes and principles. Topics include thematic copyright requirements; the rules governing the determination of authorship; copyright rights on authors; rules on indirect liability of intermediaries and liability for circumvention of technical protection; and the scope of the right of first refusal of copyright. The course will also examine the tensions between copyright owners and technologies that threaten traditional content business models. Mutually Excluded Courses: Students who have taken at least one computer programming course at a college or graduate school, or who are proficient in at least one computer programming language, are not eligible for this course. In addition to its own intellectual property law programs, the LSF program comprises six related programs and centers, each with a more specific focus: the Center for E-Commerce, the Center for Internet and Society (CIS), the Center for Law and the Biosciences, the Stanford Center for Computers and Law (CodeX), the Stanford IP Litigation Clearinghouse, and the Transatlantic Technology Law Forum. The course covers all the topics normally included in what is known as electronic evidence, such as taking and transferring responsibility, production format, retrieval of inside information, Rule 502 of the Federal Rules of Evidence, preservation, and penalties. Particular emphasis is placed on scientific examination and its relationship to the adequacy search and implied certification, which a lawyer undertakes under Rule 26(g) of the Federal Rules of Civil Procedure by providing electronically stored information in response to a request. The rapid evolution of technological advances over the past decade has created powerful mechanisms to instantly and directly reach billions of information consumers around the world.

While the recent information revolution has made huge strides in connecting people around the world, it has also been accompanied by governmental and non-governmental efforts to spread propaganda, especially through social media platforms. This course will explore the legal and political aspects of addressing these challenges and focus on increasing terrorist recruitment and other organized online propaganda efforts. This seminar reflects that understanding. We will discuss the most debated antitrust issues today, examine how competition laws and the enforcement ideals of foreign jurisdictions diverge from U.S. practice, and address industry-specific issues in areas ranging from healthcare to wireless technology. B1. Systematically interpret complex legal issues, make informed judgments and communicate results clearly and concisely in English using appropriate legal terminology. The course introduces the topic and focuses on the types of breaches that companies may encounter and some basic technical issues. The overview is followed by an in-depth look at the countless legal issues that arise. Above all, we will examine how different governments regulate the response to violations and the patchwork of requirements. Other topics covered included: mitigating liability risks and potential litigation; coordination with law enforcement authorities; working with human resources; and review of contractual and other obligations of third parties.

The course then covers a dizzying array of political and strategic topics: public relations and communication; government affairs; investigation management; Coordination with technical teams; risk assessment for potentially affected persons; and effective breach reporting. Real-world scenarios and real-world data breaches are used and referenced throughout the course to illustrate various points. Upon completion of the course, students should be able to enter the workforce to develop and execute a comprehensive data breach response strategy. All LLM programs enable students to acquire practical knowledge as well as theoretical knowledge in specialized areas of law. Upon completion of one of the LLM programs, students will be able to successfully resolve complex legal issues arising from practical scenarios, provide competent legal advice to fictitious clients, and critically evaluate the legal principles covered by the program.