Syllabus
MODULE 2 (SUBJECT) SYLLABUS
Module code |
|
Module name |
Laws and regulations governing Cybersecurity |
|
Faculty |
|
|||
Field of study |
|
|||
Form of study |
|
|||
Level of study |
|
|||
Profile |
|
|||
Status of module |
|
|||
Person responsible for the module |
|
|||
Persons teaching the module |
|
Form of classes |
Lectures |
Workshops |
||
Number of hours/sem |
6 |
14 |
||
Semester(s) |
|
ECTS points |
|
|
Status |
|
Language of teaching |
|
|
Prerequisites |
none |
Learning objectives |
The aim of the module is to acquaint students with the application of legal institutes in the field of information and communication technologies. The secondary goal is to define legal limits of cyber security. After completing the course, the student should gain the ability to orient in the legal norms of the EU and the countries participating in the project, which are directly related to the issue of cyber security. Furthermore, the student will gain a basic overview of the issues of civil and public law, which are used in cyberspace, especially with a focus on the practical use of acquired knowledge in practice. Students are acquainted not only with the theory of the application of law in cyberspace and the regulation de lege lata, but also with the practical use of the institutes of law in practice (de lege aplicata). The knowledge gained in this way will be further used in the modules dedicated to cyber attacks and the possibilities of defense against them, as well as in the module dedicated to building and operating security teams. |
Learning outcome |
A student who has successfully finished the module will know/be able to/be competent in |
KNOWLEDGE |
|
W1 |
The student will gain professional knowledge and expand their legal awareness in the field of information and communication technologies. |
W2 |
The student will gain professional knowledge related to the legal definition of cyber security according to international (especially EU law) and national law of participating countries. |
SKILLS |
|
U1 |
He is able to identify individual Internet service providers, their rights and obligations and on the basis of this identification he is able to argue areas of law related to cyber security. |
U2 |
He is able to analyze the basic framework of assets in cyberspace (eg technologies, processes, data, etc.) and define legal recommendations for their protection. |
COMPETENCES |
|
K1 |
The student partially masters the legislation, can apply individual legal institutes to case studies. |
Learning outcomes verification methods |
|||||||||
Learning outcome |
Forms of crediting classes |
||||||||
Oral exam |
Written exam |
Partial written task |
Final written task (essay etc.) |
Test |
Project/presentation |
Report |
Classroom activities |
Other… |
|
KNOWLEDGE |
|||||||||
W1 |
|
x |
x |
|
x |
|
|
x |
|
W2 |
|
x |
x |
|
x |
|
|
x |
|
SKILLS |
|||||||||
U1 |
|
|
|
|
|
x |
|
|
|
U2 |
|
|
|
|
|
x |
|
|
|
COMPETENCES |
|||||||||
K1 |
|
|
x |
|
|
|
|
|
|
Criteria for assessing student's competences
The minimal requirements for the three groups of learning outcomes that the Student must obtain in order to pass a given subject are presented below in a synthetic form. In order for the student to pass the module, all learning outcomes described in the syllabus must be positively verified by the person (s) conducting classes within the given module
W - KNOWLEDGE
Rating:
Sufficient - The student remembers and recreates the knowledge to be mastered within the module
Good - The student additionally interprets phenomena / problems and can solve a typical problem
Very good -Student can solve even complex problems in a given field, can make a synthesis, carry out a comprehensive assessment, create a work that is original and inspiring to others.
U - SKILLS
Rating:
Sufficient - The student is familiar with the nature of activities, and is able to perform activities / solve problems related to the content of the module under the guidance of an academic teacher
Good - Student is able to independently perform activities / tasks / solve common problems regarding the content of the module
Very good - The student has a fully mastered ability / ability to perform actions / tasks / problems provided in the content of the module, also in more complex cases.
K - SOCIAL COMPETENCES
Rating:
Sufficient - Student passively absorbs the content of the module, demonstrating the ability to concentrate and listen
Good - The student actively participates in classes, makes assessments that value according to the criteria adopted in a given field, can actively interact within the group
Very good - The student integrates the attitude according to the suggested pattern, develops his own system of professional and social values, is able to assume responsibility for the group's activities, including leadership.
Content of the module (program of lectures and other classes) |
Reference to learning outcomes |
||
LECTURES 1. Introduction to the subject, system of law, legal norm, law and internet 2. Responsibility in cyberspace 3. Legal basis of ISP (internet service provider) activity 4. ISMS 5. Cyber security and its legal regulation 6. Protection of personal data in cyberspace 7. Privacy and security in ICT, data protection in cyberspace
WORKSHOPS 1. Defining the scope of law in cyberspace (limits, possibilities, etc.) 2. Private and public liability for the actions of the user or company in the online environment 3. Characteristics and definition of individual ISPs and their rights and obligations in relation to cyber security 4. ISMS and the relationship to cyber security law 5. Acquisition of basic rights and obligations for individual subjects from Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union, jakož i z národní legislativy. 6. Application of rights and obligations arising from GDPR in cyberspace 7. Practical analysis of contractual conditions with ISPs in relation to privacy protection
|
W1, W2 U1, U2, K1 |
||
Form of student workload |
Number of hours |
||
Number of hours realized with the direct
participation of an academic teacher
|
|||
1.1 |
Participation in lectures |
6 |
|
1.2 |
Participation in seminars |
|
|
1.3 |
Participation in workshops |
14 |
|
1.4 |
Participation in laboratory classes |
|
|
1.5 |
Participation in projects |
|
|
1.6 |
Participation in consultations (2-3 times in a semester) |
|
|
1.7 |
Participation in project consultations |
|
|
1.8 |
Participation in exams/tests |
2 |
|
1.9 |
Other… |
|
|
1.10 |
Number of hours realized with the direct participation of an academic teacher (sum of 1.1 – 1.9) |
22 |
|
1.11 |
Number of ECTS points obtained by the student during classes requiring direct participation of an academic teacher) |
1,5 |
Individual work by the student |
||
2.1 |
Individual studies (including e-learning lectures) |
8 |
2.2 |
Individual preparation for workshops |
12 |
2.3 |
Individual preparation for tests |
|
2.4 |
Individual preparation for laboratory classes |
|
2.5 |
Preparing reports |
|
2.6 |
Implementation of independently performed tasks (projects, documentation) |
|
2.7 |
Preparation for the final exam/tests from the workshops |
10 |
2.8 |
Preparation for the final exam/tests from the lectures |
15 |
2.9 |
Other |
|
2.10 |
Number of hours of individual work (sum of 2.1 – 2.9) |
45 |
2.11 |
Number of ECTS points obtained by the student during individual study activities |
2,5 |
Total workload (h) |
67 |
|
ECTS points for the module |
4 |