Advanced Privacy and Data Protection
Advanced Privacy and Data Protection
A successful data protection procedure can prevent data loss, or corruption and
reduce damage caused in the event of a breach. Data privacy methods ensure that
sensitive data is accessible only to approved parties.
The course intends to produce skilled professionals to understand the processes that
impact information security, safeguarding information assets, collection and
preservation of digital evidence, analysis of data, and identification and fixing of
security vulnerabilities. This is a state-of-the-art course with a perfect blend of
Security that is designed to achieve the success by combining and leveraging
today’s cutting-edge technology with real-world scenarios.
1
LEARNING OUTCOMES:
By the end of this course it is expected that participants will/will be able to:
COURSE METHODOLOGY:
Students will be expected to present their work to the class and will concrete, real
life situations to analyze. In addition to that students will have to summarize
similarities and differences among research findings, artistic works, or laboratory
results.
Students would learn and practice that is, how they develop, process, retain and
apply knowledge and skills. Activities will engage and motivate students and help
them persist and accurately gauge and reflect upon their own learning.
2
TOPICS:
Data security and its type and how data protection and privacy matter.
Principals of processing.
Risk management.
Physical security.
3
COURSE SEQUENCE
4
Cryptography Firewalls and protecting
connections.
Physical security.
5 Presentations and Final All
Review
EVALUATION
Assignment 1
Assignment 2
Participation
Assignment
Final Exam
No. Course Learning Outcomes (CLOs)
Individual
TOTAL
Group
Group
Class
5
Assignment 1
Assignment 2
Participation
Assignment
Final Exam
No. Course Learning Outcomes (CLOs)
Individual
TOTAL
Group
Group
Class
organization
Total 10 15 20 25 30 100
6
The course will be evaluated using the following.
7
discussions) course course materials
GRADING PHILOSOPHY AND METHOD: A letter grade of “B” is a good and usual
graduate course grade. A letter grade of “A” is not as common and requires excellent and
superior performances in all areas of work throughout the Semester, and also requires the
demonstration of abilities of a “Reflective Practitioner” in all areas as evaluated by the instructor.
In compliance with institutional policy, students are required to pass both course work and
end of module exams in order to successfully complete the module.
GRADING SYSTEM
90 – 100 A 4.00
80 – 89 A- 3.67
70 – 79 B+ 3.33
60 – 69 B 3.00
0-59 F 0.00
Required Text
Laudon, K.C. & Laudon, J.P. (2015) Managing Information Systems: Managing the Digital
Firm, (14th ed.). Harlow, Essex: Pearson.
Recommended Text
Brown, C.V., DeHayes, D.W., Hoffer, J.A., Martin, E.W., Perkins, W.C. (2012). Managing
Information Technology, (7th ed.). Upper Saddle River, N.J.: Pearson /Prentice Hall.
8
Other Readings
ACADEMIC HONESTY
University demands a high level of scholarly behaviour and academic honesty. Work submitted
must be the original of the learner. Demonstration of integrity in all academic efforts is
expected. Anyone suspected and discovered to have committed plagiarism or any other form of
academic dishonesty will receive a failing grade of F for the course and is likely to be subjected
to further disciplinary action.
APA SYLE
Students at the University of the Commonwealth Caribbean are expected to write ALL papers
using the APA (American Psychological Association) format. The American Psychological
Association (APA) developed a set of standards that writers in the social sciences follow to
create consistency throughout publications. These rules address:
- Crediting sources
- Document formatting
For more information, please consult the Publication Manual of the American Psychological
Association, (6th ed., 2nd printing) available in the university library and online. A quick online
tutorial on the Basics of APA Style is available at www.apastyle.org/learn/tutorials/basics-
tutorial.aspx.
University demands a high level of scholarly behaviour and academic honesty on the part of its
students. Any assignment, test, paper, project or report submitted by you and that bears your
name is presumed to be your own original work that has not previously been submitted for credit
in another course unless you obtain prior written approval to do so from your lecturer.
9
In all assignments, or drafts of papers, you may use words or ideas written by other individuals
in publications, web sites or other sources, but only with proper attribution. “Proper attribution”
means that you have fully identified the original source and extent of your use of the words or
ideas of others that you reproduce in your work for this course, usually in the form of a footnote
or parenthesis. Failure to do so is Plagiarism and is considered a form of academic dishonesty.
Plagiarism is a form of intellectual theft. If you fail to acknowledge your sources or make it
appear that someone else’s work is your own, you are guilty of plagiarism. The scholarly world
operates by exchanging information and crediting the sources of that information. If you violate
that process, you have committed a crime in the academic community. If you are having
difficulty completing a paper on time, or need some additional help, or are unsure of how or
where to document a source, please contact your lecturer or go to the librarian for help so you
can avoid inadvertently or intentionally plagiarising a source.
Consequences of Plagiarism
10
If the final work you submit—all of it—is not yours, it does not matter how you came by it.
Charges of plagiarism are brought to the attention of Academic Affairs, which initiates an
investigation that may lead to formal charges.
The process for the investigation and adjudication of charges may be accessed at the Department
of Student Affairs Office.
Plagiarism is a serious offense that can result in a variety of sanctions (failure of the course in
which the plagiarism occurred and suspension from University among them).
A mark of strong academic writing is demonstrated when one appropriately identifies sources in
his/her arguments and analyses. This practice is called documentation. Guidelines for how to
correctly cite materials used within your writing and assembling the list of works that you cite in
your paper are available in style manuals. Information from these style manuals can be accessed
in University’s Library & Information Centre
Whenever you draw on another’s work, you must specify what you borrowed, whether facts,
opinions, or quotations, and where you borrowed them from.
Avoiding Plagiarism
Contact your lecturer and honestly discuss a strategy for completing an assignment rather than
risk humiliation and legal charges.
Become thoroughly acquainted both with the various ways in which plagiarism is construed, and
with sources of proper documentation.
Reference
http://owl.english.purdue.edu/owl/resource/560/01/
11
END OF DOCUMENT
12