GLEG is currently in abeyance and no longer available for purchase. GLEG certifications can be renewed by CPEs only.
Areas Covered
- Business Policies and Compliance
- Contracts and Third Party Agreements
- Data Retention and E-Discovery
- Fraud and Misuse
- Cybersecurity and Investigations
- Intellectual Property, Privacy and PII
Who is GLEG for?
- Investigators
- Security and IT professionals
- Lawyers
- Paralegals
- Auditors
- Accountants
- Technology managers
- Vendors
- Compliance officers
- Law enforcement personnel
- Privacy officers
- Penetration testers
- Cyber incident and emergency responders
Exam Format
- 1 proctored exam
- 75 questions
- 2 hours
- Minimum passing score of 70.7%
Note: GIAC reserves the right to change the specifications for each certification without notice. Based on a scientific passing point study, the passing point for the GLEG exam has been determined to be 70.7% for all candidates receiving access to their certification attempts on or after October 7th, 2010. To verify the format and passing point of your specific certification attempt, read the Certification Information found in your account at https://exams.giac.org/pages/attempts.
Delivery
NOTE: All GIAC Certification exams are web-based and required to be proctored. There are two proctoring options: remote proctoring through ProctorU, and onsite proctoring through PearsonVUE. Click here for more information.
GIAC certification attempts will be activated in your GIAC account after your application has been approved and according to the terms of your purchase. Details on delivery will be provided along with your registration confirmation upon payment. You will receive an email notification when your certification attempt has been activated in your account. You will have 120 days from the date of activation to complete your certification attempt.
Exam Certification Objectives & Outcome Statements
- Business Policies and Compliance The candidate will be demonstrate familiarity with common regulatory compliance mandates, as well as developing IT security policies with defensibility in mind, and understanding the risks and legal impacts current and emerging technologies pose to information assets.
- Contracts and Third Party Agreements The candidate will demonstrate an understanding of how to protect an organization's information assets in all third party contracts and agreements, including terms of service, working with independent contractors, affiliates and data sharing, business services, online/web agreements and electronic signatures.
- Data Retention and E-Discovery The candidate will demonstrate understanding of E-Discovery and Record Retention laws and regulations, familiarity with high profile cases, and organizational controls used to comply with retention requirements.
- Fraud and Misuse The candidate will demonstrate an understanding of fraud and cyber crime laws, familiarity with high profile cases, and developing reports in response to cyber crime, forensics, incident response, and other types of investigations.
- Intellectual Property The candidate will demonstrate an understanding of the different types of Intellectual Property (IP), legal protections available, and risks to an organization's IP.
- Privacy and PII The candidate will demonstrate an understanding of Privacy laws and regulations, familiarity with high profile cases, liability issues, and responding to privacy breaches.