{"id":407,"date":"2021-08-24T12:57:51","date_gmt":"2021-08-24T12:57:35","guid":{"rendered":"https:\/\/www.law.georgetown.edu\/tech-institute\/?page_id=407"},"modified":"2026-01-28T19:18:42","modified_gmt":"2026-01-28T19:18:42","slug":"course-offerings","status":"publish","type":"page","link":"https:\/\/www.law.georgetown.edu\/tech-institute\/academics\/course-offerings\/","title":{"rendered":"Course Offerings"},"content":{"rendered":"<p>At Georgetown Law, we are integrating deep, hands-on technological instruction with a traditional technology law curriculum. Core courses provide a rigorous grounding in privacy, intellectual property, cybersecurity and antitrust law. Our advanced courses and seminars \u2014 taught by full-time faculty and adjunct faculty who are leaders in their fields \u2014 range from Information Privacy, to International Trade and Public Health, to the Law of Robots and Music Law.<br \/>\n<em>Last updated November 2024. Course names that include \u201c(WR)\u201d satisfy the Georgetown University Law Center Upperclass Legal Writing Requirement and the Tech Law Scholars writing requirement. Linked courses are currently scheduled for the 2024\u20132025 academic year.<\/em><br \/>\nThe <a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?program=program_112\">Technology Law and Policy LLM curriculum<\/a>\u00a0and the <a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?program=program_113\">Masters in Law and Technology (MLT) curriculum<\/a> is available online.<\/p>\n<h2>2025\u20132026 JD Technology Law &amp; Policy Curriculum<\/h2>\n<p><strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201496%20v00\">Tech Law Scholars Seminar I (LAW 1496, 0 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201516%20v00\">Tech Law Scholars Seminar II (LAW 1516, 2 cr.)<\/a><\/strong><\/p>\n<h3>Core Courses<\/h3>\n<p><strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201856%20v00\">Artificial Intelligence and the Law (Law 1856, 3 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%20073%20v05\">Communications Law and Policy (LAW 073, 3cr.)<\/a><\/strong><br \/>\nComputer Crime Law (LAW 080 v00, 3cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%20110%20v03\">Copyright Law (LAW 110, 3cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%20342%20v03\">Information Privacy Law (LAW 342, 3 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201626%20v00\">Internet Law (LAW 1626, 3 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%20332%20v04\">Patent Law (LAW 332, 3 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%20433%20v00\">Trademark and Unfair Competition Law (LAW 433, 3 cr.)<\/a><\/strong><\/p>\n<h3>Advanced Courses and Seminars<\/h3>\n<p><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201905%20v00\"><strong>Advanced Administrative Law Seminar \u2013 The Consumer Protection Agencies (LAW 1905, 2-3cr.)<\/strong><\/a><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201528%20v00\">Advanced Antitrust Seminar: Antitrust and Intellectual Property (LAW 1528, 2-3 cr.)<\/a><\/strong><br \/>\nAdvanced Antitrust Seminar: Antitrust and Intellectual Property (WR) (LAWJ 1528, 3 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201745%20v00\">Intelligence Law (LAW 1745, 4 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%20040%20v01\">Advanced Patent Law Seminar (LAW 040, 3 cr.)<\/a><\/strong><br \/>\nAI and the Law Seminar: Principles and Problems (LAWJ 1852, 2-3 cr.)<br \/>\nAntitrust Economics and the Law (LAWJ 038, 4 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%20038%20v01\">Antitrust Law (LAW 038, 3 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%20038%20v06\">Antitrust Law &amp; Policy (LAW 038, 3 cr.)<\/a><\/strong><br \/>\nAntitrust Law: A Survey from the Sherman Act of 1890 to Today\u2019s Progressive Movement (LAWJ 038 v03, 3 cr.)<br \/>\nAntitrust Seminar: From the Chicago School to the New Progressives: Regulating Technology Platforms, Durable Monopolies, and Mega-firms (LAWJ 1796, 2-3 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201740%20v00\">Artificial Intelligence and National Security: Law, Ethics, and Technology (LAW 1740, 2 cr.)<\/a><\/strong><br \/>\nArt Law Seminar: Images, Objects, and Culture (LAWJ 1329, 2-3 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%202028%20v01\">Assisted Reproductive Technologies and the Law (LAW 2028, 2-3 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%20050%20v01\">Aviation Law (LAW 050, 2 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201789%20v00\">Biotechnology and the Law Seminar (LAW 1789, 3 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%20611%20v22\">Brand Protection Strategy in a \u201cPrivacy First\u201d Era: Mitigating IP Risks Simulation (LAW 611, 1 cr.)<\/a><\/strong><br \/>\nThe Color of Surveillance Seminar: Law and History (LAWJ 1707, 2-3 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%203078%20v00\">Commercial Space Law (LAW 3078, 2 cr.)<\/a><\/strong><br \/>\nCommunication Design &amp; Law: Re-Designing Legal Information (week one) (LAWJ 611, 1 cr.)<br \/>\nCommunications Law: Law and Policy in the Internet Age (LAWJ 200, 2 cr.)<br \/>\nCommunications Law: Law and Policy in the Internet Age (WR) (LAWJ 200, 3 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=law%201991%20v00\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword%3Dlaw%25201991%2520v00&amp;source=gmail&amp;ust=1750960824267000&amp;usg=AOvVaw3840fr7eZ-L9_QHalmWF_z\" class=\"cx_external_link\"><span class=\"cx_external_hyperlink\">Competition Enforcement and \u201cBig Tech:\u201d The DOJ and FTC Cases Against Major Technology Platforms (LAW 1991, 2-3 cr.)<\/span><span class=\"visually_hide\">(This link opens in a new tab)<\/span><span class=\"cx_external_icon\"><\/span><\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%20080%20v00\">Computer Crime Law (LAW 080, 2 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201881%20v00\">Constitutional Law: Federal Courts Tackle the Digital World (LAW 1881, 1 cr.)<\/a><\/strong><br \/>\nContract Law Seminar: Franchising (LAWJ 458, 2 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201920%20v00\">Comparative AI Regulation Seminar (LAW 1920, 2-3cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%202070%20v00\">Corporate National Security Law (LAW 2070, 2 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201615%20v00\">Crypto Law Seminar (LAW 1615, 3 cr.)<\/a><\/strong><br \/>\nCrypto Law Seminar (WR) (LAWJ 1615, 3 cr.)<br \/>\nCultural Appropriation Seminar: Innovation or Theft? (LAWJ 1645, 2-3 cr.)<br \/>\nCyber and National Security: Current Issues Seminar (LAWJ 1127, 2 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%203173%20v00\">Cybersecurity, Data Privacy, and Surveillance Law (LAW 3173, 2 cr.)<\/a><\/strong><br \/>\nCybersecurity Law (LAWJ 2052, 2 cr.)<br \/>\nCybersecurity Law &amp; Policy (LAWJ 3066, 2 cr.)<br \/>\nCybersecurity Risks, Rules, Responsibilities and Recovery (LAWJ 1825, 2 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%203171%20v00\">Cyber Threat Landscape: Legal Considerations at the Crossroads of the Public and Private Sectors (LAW 3171, 2 cr.)<\/a><\/strong><br \/>\nDecarbonizing the Energy Sphere: A Federal Regulatory Approach (LAWJ 1551, 2 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201815%20v00\">Decentralization, Finance, and the Law (LAW 1815, 2-3 cr.)<\/a><\/strong><br \/>\nDecentralization, Finance, and the Law (WR) (LAWJ 1815, 3 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201918%20v00\">Emerging Topics in Social Media Law (LAW 1918, 1 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201961%20v00\">Emerging Companies and Venture Capital Financings (LAW 1961, 2 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201976%20v00\">Emerging Technology in Financial Services (LAW 1976, 2-3 cr.)<\/a><\/strong><br \/>\nEntertainment Disputes (week one) (LAWJ 1737, 1 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%20137%20v03\">Entertainment Law (LAW 137, 3 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%203062%20v00\">The Essentials of FinTech Law (LAW 3062, 2 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%202044%20v00\">Financial Market Reform and Innovation (LAW 2044, 2 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%20193%20v01\">Financial Services: Regulation in the Age of Disruption (LAW 193, 2 cr.)<\/a><\/strong><br \/>\nFintech and Financial Democratization Seminar (LAWJ 1744, 2-3 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201442%20v00\">Fintech Law and Policy (LAW 1442, 2 cr.)<\/a><\/strong><br \/>\nFirst Amendment Law in a Digital Age (LAWJ 1660, 2 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201868%20v00\">The Four Pillars of Fashion Law (LAW 1868, 1 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%20196%20v03\">Free Press (LAW 196, 2 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%203152%20v00\">Front Lines and Foreign Risk: National Security Through the Lens of CFIUS and Team Telecom (LAW 3152, 2 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201517%20v00\">The GDPR: Background, Development, and Consequences (LAW 1517, 1 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201882%20v00\">Generative AI and the Future of Free Speech &amp; Copyright Law (LAW 1882, 1 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%20068%20v01\">Global Activism, Civil Society, and the Law (LAW 068, 1 cr.)<\/a><\/strong><br \/>\nGlobal Tech Law: Comparative Perspectives on Regulating New Technologies (LAWJ 1646, 2-3 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%203165%20v00\">Health Care Privacy and Security (LAW 3165, 1 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%202037%20v00\">Health Information Technology and the Law (LAW 2037, 2 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201403%20v00\">Hot Topics in Antitrust (LAW 1403, 2 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201921%20v00\">Designing Data Privacy Laws Seminar (LAW 1921, 2-3 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%203118%20v00\">Information Operations in the Cyber Age: Law and Policy (LAW 3118, 2 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%20197%20v00\">Innovation, Technology, and International Financial Regulation (LAW 197, 3 cr.)<\/a><\/strong><br \/>\nIntellectual Property and Medicines (LAWJ 233, 2-3 cr.)<br \/>\nIntellectual Property in World Trade (LAWJ 226, 3 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%20780%20v01\">International and U.S. Customs Law (LAW 780, 2 cr.)<\/a><\/strong><br \/>\nInternational Protection of Intellectual Property Through the WTO (LAWJ 820, 2 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%20708%20v00\">International Trade, Intellectual Property Rights, &amp; Public Health (LAW 708, 2cr.)<\/a><\/strong><br \/>\nIntroduction to Foreign Intelligence Law (LAWJ 1832, 2 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%203130%20v00\">Investigating Transnational Cyber Threats (LAW 3130, 2 cr.)<\/a><\/strong><br \/>\nLaw and Business of Television (LAWJ 1400, 2 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%203172%20v00\">Law and National Security Space Operations (LAW 3172, 2 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%203065%20v00\">The Law and Ethics of Automation, Artificial Intelligence, and Robotics (LAW 3065, 2 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%20199%20v03\">Law and Regulation of Drugs, Biologics and Devices (LAW 199, 3 cr.)<\/a><\/strong><br \/>\nLaw and Regulation of Global Health Technologies (LAWJ 2010, 2 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201981%20v00\">Lawyering in Web3: Supporting Clients in A Dynamic Legal Environment (Week One Teaching Fellows) (LAW 1981, 1 cr.)<\/a><\/strong><br \/>\nThe Law of Autonomous Vehicles (LAWJ 1526, 2 cr.)<br \/>\nLaw of Cyberspace (LAWJ 267, 3 cr.)<br \/>\nThe Law of Open Source Software (LAWJ 1875, 2 cr.)<br \/>\nThe Law of Public Utilities: Bringing Competition to Historically Monopolistic Industries (LAWJ 1019, 2-3 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201289%20v00\">Law of Robots (LAW 1289, 2 cr.)<\/a><\/strong><br \/>\nLegal and Policy Aspects of Countering Terrorism Recruiting &amp; Online Propaganda in the Digital Age Seminar (LAWJ 1616, 2 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%20372%20v02\">Music Law Seminar: Changing Landscapes in the Music Industry and the Law that Governs It (LAWJ 372, 2-3 cr.)<\/a><\/strong><br \/>\nNational Security Cyber Law &amp; Policy: Encouraging Responsible State Conduct in Cyberspace (LAWJ 3156, 2 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201429%20v00\">Patent Appeals at the Federal Circuit (LAW 1429, 3 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201360%20v00\">Policing in the 21st Century: Law Enforcement, Technology and Surveillance (LAWJ 1360, 2 cr.)<\/a><\/strong><br \/>\nRace to Risk Assessment (LAWJ 1520, 2-3 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201975%20v00\">Regulating Artificial Intelligence: Research Seminar (WR) (LAW 1975, 3 cr.)<\/a><\/strong><br \/>\nSecurities Law and the Internet (LAWJ 940, 2 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201746%20v02\">Social Media Law (LAW 1746, 2 cr.)<\/a><\/strong><br \/>\nSocial Media Law Seminar (LAWJ 1746, 2 cr.)<br \/>\nSocial Media Law Seminar (WR) (LAWJ 1746, 2 cr.)<br \/>\nSpace Law Seminar (LAWJ 406, 3 cr.)<br \/>\nSports Law (LAWJ 417, 3 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%204001%20v00\">State Cyber Operations and Responses (LAW 4001, 2 cr.)<\/a><\/strong><br \/>\nStrategic Intelligence and Public Policy Seminar (WR) (LAWJ 415, 3 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201630%20v00\">Strategic Responses to Data Breach: &#8220;We&#8217;ve Been Hacked!&#8221; (LAW 1630, 2 cr.)<\/a><\/strong><br \/>\nTaxation of Intellectual Property (LAWJ 976, 2 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201656%20v00\">Technology and Election Integrity Seminar (LAW 1656, 2-3 cr.)<\/a><\/strong><br \/>\nTechnology and the Free Press Seminar (LAWJ 1605, 3 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201962%20v00\">Technology Law and Policy Colloquium: The Political Economy of Creativity (LAW 1962, 2-3 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201824%20v00\">Technology Platform Governance in Global Perspective Seminar (LAW 1824, 2-3 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201944%20v01\">Telecommunications Law and Policy Seminar (WR) (LAWJ 1944, 3 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%20962%20v00\">U.S. Export Controls and Economic Sanctions (LAW 962, 2 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201477%20v00\">Video Games in the 21st Century: Creativity and Innovation in Action (LAW 1477, 2 cr.)\u00a0<\/a><\/strong><\/p>\n<h3>Clinics and Practicums<\/h3>\n<p>Civ Tech: Digital Tools and Access to Justice (Project-Based Practicum) (LAWJ 1040, 4 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%20528%20v01\">Communications and Technology Law Clinic (IPR) (LAW 528, 10 cr.)<\/a><\/strong><br \/>\nCriminal Justice Technology, Policy, and Law (Project-Based Practicum) (LAWJ 1485, 4 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201973%20v00\">Cultural Sustainability Advocacy Practicum (LAW 1973, 4cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%20530%20v00\">Federal Legislation Clinic (LAW 530, 10 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201670%20v00\">Intellectual Property and Information Policy Clinic (LAW 1670, 10 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201087%20v00\">Community Wealth Building Practicum (LAW 1087, 5cr.)<\/a><\/strong><br \/>\nPrivacy Legislation: Law and Technology (Project-Based Practicum) (LAWJ 1315, 5 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201173%20v00\">Social Enterprise and Nonprofit Law Clinic (LAW 1173, 10 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201706%20v00\">Surveillance and Civil Rights (Fieldwork Practicum) (LAW 1706, 6 cr.)<\/a><\/strong><br \/>\nTechnology (Un)leashed: the Future of National Security Law (LAWJ 1659, 3 cr.)<\/p>\n<h3>Skills Courses<\/h3>\n<p><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=law%201895%20v00\"><strong>Advanced Legal Writing with Generative AI (LAWJ 1895, 2 cr.)<\/strong><\/a><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201623%20v00\">Advanced Legal Writing: Intellectual Property and Technology Transactions (LAW 1623, 3 cr.)<\/a><\/strong><br \/>\nBig Data, Face Recognition and the Limits of the Legislature: A Bill Negotiation Simulation (LAWJ 611 v17, 1 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201384%20v00\">Computer Programming for Lawyers: An Introduction (LAW 1384, 2 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201499%20v00\">Computer Programming for Lawyers: Intermediate (LAWJ 1499, 3 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201995%20v00\">Crypto Lawyering (LAWJ 1995, 1cr.)<\/a><\/strong><br \/>\nCyber Threats, Information Security and Technology in the Practice of Law (LAWJ 1545, 2 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%20611%20v24\">Cybersecurity Incident Response: Legal Leadership During Cyber Crisis (LAW 611, 1 cr.)<\/a><\/strong><br \/>\nEmpirical Analysis for Lawyers and Policymakers Seminar (LAWJ 1337, 2 cr.)<br \/>\nEntertainment Disputes (LAWJ 1737, 2 cr.)<br \/>\nEntrepreneurship and the Law: Evaluating Client Business Plans and Growth Strategies (LAWJ 656, 2 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=law%201992%20v01\" target=\"_blank\" rel=\"noopener noreferrer\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword%3Dlaw%25201992%2520v01&amp;source=gmail&amp;ust=1750960824268000&amp;usg=AOvVaw0nHYYGo2q_5VT-CNsZPunG\" class=\"cx_external_link\"><span class=\"cx_external_hyperlink\">Entrepreneurship: The Lawyer\u2019s Role In Building A Thriving Venture (Law 1992, 2 cr.)<\/span><span class=\"visually_hide\">(This link opens in a new tab)<\/span><span class=\"cx_external_icon\"><\/span><\/a><\/strong><br \/>\nEntrepreneurship: The Lifecycle of a Business (LAWJ 1617, 2 cr.)<br \/>\nEuropean Patent Law &amp; Practice (LAWJ 1665, 1 cr.)<br \/>\nGen AI and Big Law (LAWJ 1930, 1 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201294%20v00\">Information Technology and Modern Litigation (LAW 1294, 2cr.)<\/a><\/strong><br \/>\nInformation Technology Transactions: Strategy, Negotiations and Drafting (LAWJ 295, 3 cr.)<br \/>\nIntellectual Property Appellate Advocacy (LAWJ 1295, 2 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201471%20v00\">Intellectual Property and Startup Law (LAW 1471, 1 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%20293%20v01\">Intellectual Property Litigation: Pretrial Skills (LAW 293, 2 cr.)<\/a><\/strong><br \/>\nInternet Defamation Simulation: Alternative Dispute Resolution in a Transnational Dispute (LAWJ 611 v11, 1 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201878%20v00\">Introduction to Sports Television: Drafting &amp; Negotiating Talent Agreements (LAW 1878, 1 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201948%20v00\">Lawyering in Web3: Supporting Clients in A Dynamic Legal Environment (LAW 1948, 1 cr.)<\/a><\/strong><br \/>\nLegal Innovation\u2014Designing Human-Centered Solutions to Challenges in Law (LAWJ 611 v13, 1 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%20611%20v23\">Legal Skills in an AI-Powered World (LAW 611, 1 cr.)<\/a><\/strong><br \/>\nNational Security and Emerging Technologies (LAWJ 1896, 2 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=law%201031%20v00\">National Security Crisis Law: Edge Technologies (LAW 1031, 5 cr.)<\/a><\/strong><br \/>\nPatent Licensing (LAWJ 333, 2 cr.)<br \/>\nPatent Office Practice and Strategy (LAWJ 387, 2 cr.)<br \/>\nPatent Trial Practice (LAWJ 334, 3 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%20361%20v10\">Professional Responsibility: The American Legal Profession in the 21st Century: Technology, Markets, and Democracy (LAW 361, 3 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%20611%20v25\">Regulating Online Speech in the Age of Social Media (LAW 611, 1 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201314%20v00\">Social Enterprise, Impact Investing, and the Law (LAW 1314, 2 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201982%20v00\">Strategic Management of Intellectual Property (LAW 1982, 2 cr.)<\/a><\/strong><br \/>\nStrategically Managing Intellectual Property: A Study of IP in Business Transactions (LAWJ 1348, 3 cr.)<br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%203170%20v00\">Technology and Society Impact Lab (Project-Based Practicum) (LAW 3170, 3 cr.)<\/a><\/strong><br \/>\n<strong><a href=\"https:\/\/curriculum.law.georgetown.edu\/course-search\/?keyword=LAW%201625%20v00\">Technology Policy and Practice (LAW 1625, 2 cr.)<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>At Georgetown Law, we are integrating deep, hands-on technological instruction with a traditional technology law curriculum. Core courses provide a rigorous grounding in privacy, intellectual property, cybersecurity and antitrust law. [&hellip;]<\/p>\n","protected":false},"author":10700,"featured_media":0,"parent":35,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":"","_tec_slr_enabled":"","_tec_slr_layout":""},"class_list":["post-407","page","type-page","status-publish","hentry"],"acf":[],"ticketed":false,"_links":{"self":[{"href":"https:\/\/www.law.georgetown.edu\/tech-institute\/wp-json\/wp\/v2\/pages\/407","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.law.georgetown.edu\/tech-institute\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.law.georgetown.edu\/tech-institute\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/tech-institute\/wp-json\/wp\/v2\/users\/10700"}],"replies":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/tech-institute\/wp-json\/wp\/v2\/comments?post=407"}],"version-history":[{"count":42,"href":"https:\/\/www.law.georgetown.edu\/tech-institute\/wp-json\/wp\/v2\/pages\/407\/revisions"}],"predecessor-version":[{"id":9176,"href":"https:\/\/www.law.georgetown.edu\/tech-institute\/wp-json\/wp\/v2\/pages\/407\/revisions\/9176"}],"up":[{"embeddable":true,"href":"https:\/\/www.law.georgetown.edu\/tech-institute\/wp-json\/wp\/v2\/pages\/35"}],"wp:attachment":[{"href":"https:\/\/www.law.georgetown.edu\/tech-institute\/wp-json\/wp\/v2\/media?parent=407"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}