0% found this document useful (0 votes)
14 views

Advanced Privacy and Data Protection

Uploaded by

research.ai
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

Advanced Privacy and Data Protection

Uploaded by

research.ai
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

COURSE OUTLINE (2023)

COURSE TITLE: advanced privacy and data protection


COURSE CODE:
YEAR/SEMESTER:
CREDITS:
DURATION:
PRE-REQUISITES: None
LECTURER:
CONTACT:

COURSE DESCRIPTION & RATIONALE

A successful data protection procedure can prevent data loss, or corruption and
reduce damage caused in the event of a breach. Data privacy methods ensure that
sensitive data is accessible only to approved parties.

The course intends to produce skilled professionals to understand the processes that
impact information security, safeguarding information assets, collection and
preservation of digital evidence, analysis of data, and identification and fixing of
security vulnerabilities. This is a state-of-the-art course with a perfect blend of
Security that is designed to achieve the success by combining and leveraging
today’s cutting-edge technology with real-world scenarios.

The course is also designed to strengthen individual role as legal professional in


human rights protection as standards on data protection and privacy rights have to
be primarily upheld at every level.

1
LEARNING OUTCOMES:

By the end of this course it is expected that participants will/will be able to:

 Ensure data protection by design and by default in a fast-changing digital


and legal environment.
 Assess data protection compliance and how it is interlinked with IT security.
 Risk analysis and management.
 Assess issues related to personal data transfers.
 Identify actions to take in case of personal data breaches.
 How to implement controls and understand the difference between
anonymisation, pseudo-anonymisation and encryption.
 Conduct a data protection impact assessment.
 Data processing agreement and its practical implications.
 Ensure data protection compliant migration to a cloud computing service
provider.
 Draft a data breach protocol and effectively raise awareness.
 Act after a significant data breach, including audit and lessons learnt.

COURSE METHODOLOGY:

Students will be expected to present their work to the class and will concrete, real
life situations to analyze. In addition to that students will have to summarize
similarities and differences among research findings, artistic works, or laboratory
results.

students will be provided appropriate feedback on performance to benefit from


courses. In getting started, students need help in assessing existing knowledge and
competence. In classes, students will have frequent opportunities to perform and
receive suggestions for improvement.

Students would learn and practice that is, how they develop, process, retain and
apply knowledge and skills. Activities will engage and motivate students and help
them persist and accurately gauge and reflect upon their own learning.

2
TOPICS:

Data security and its type and how data protection and privacy matter.

The need of security.

Principals of processing.

Legal, Ethical, and professional issues in information security.

Data architecture and data storage and operations.

Data Architecture main components.

Risk management.

Accidental data exposure.

Communicating privately and anonymously.

Correcting, removing, and restricting data.

Rectification & Erasure of Data.

Data management and Data sharing.

Physical security.

Who, how and when (future).

3
COURSE SEQUENCE

Week Session/ Title/Description Specific Objectives Readings

Lesson At the end of each unit/lesson,


students should be able to:

1 Data security and its Understand the need of security.


type and how data Approaches to Information
protection and security and Implementation.
privacy matter.
Business need, Threats and
The need of security attacks.

2 Data architecture and Law and Ethic in information


data storage and security
operations. Legal, International laws and legal bodies
Ethical, and
Ethical decision evaluation
professional issues in
information security. Ethics and education

3 Risk management What is risk control strategy,


and communicating selecting risk control strategy.
privately and Defend, Transfer, Mitigate, accept,
anonymously and terminate.

4 Planning for security Security Education, Training,


Awareness
Security Technology

4
Cryptography Firewalls and protecting
connections.
Physical security.
5 Presentations and Final All
Review

5 Final Exam All course


materials

EVALUATION

Assignment 1

Assignment 2
Participation

Assignment

Final Exam
No. Course Learning Outcomes (CLOs)
Individual

TOTAL
Group

Group
Class

1 Understand the concept, Information


security: Is it an Art or Science

2 Understand secure software


development

3 Determine the codes of ethics and Laws


of information security in different
professional organizations.

4 Illustrate how the effective and efficient


risk management is

5 Explain how educating, training and


awareness plan works in an

5
Assignment 1

Assignment 2
Participation

Assignment

Final Exam
No. Course Learning Outcomes (CLOs)

Individual

TOTAL
Group

Group
Class
organization

6 Recognize the important role of access


control in computerized information
systems

7 identify and discuss widely-used


authentication factors

8 Identify and describe the categories and


operating models of intrusion detection
and prevention systems

9 Understand the Data management and


Data sharing.

10 Discuss need of Physical security in


data security

11 discuss widely used authentication


methodologies

12 Describe the technology that enables


the use of virtual private networks

13 Recognize the existing conceptual


frameworks for evaluating risk controls
and formulate a cost benefit analysis

14 Identify the threats posed to


information security.

Total 10 15 20 25 30 100

PERFORMANCE EVALUATION DETAILS

6
The course will be evaluated using the following.

Assignment Weight Due Readings

Individual Assignment 1 – Read four 15% Power Point


peered reviewed Journals which focus on Slides
the following areas: 1) Enterprise
resource planning systems; 2) value of e-
business; 3) Business Process Re- Other materials
engineering; and 4) Information systems used in the course
Security. Summarise the papers in
approximately 1000 words. References
must be properly documented using the
APA format. Papers must not be used
more than once. Students must post the
references to their papers in Journal
Articles section of the LMS before
submitting the work. This section should
also be used to ensure that a paper being
used is not already selected by another
student.

Group Assignment 1 – Identify and 20% All sections and


review the information systems and lessons
technologies being used in any
organisation of your choice and document
the IT/IS strategies being employed
within the organisation. Describe the IT
value chain and Balance Score Card for
the organisation and explain how internet
technologies would help the business
become more effective.

See LMS for further information about


this assignment

Group Assignment 2 - 25% All sections and


lessons
Case Reviews and Presentations
Assigned Cases

Class Participation (Includes attendance 10% Duration of All sections and


and positive contributions to the class

7
discussions) course course materials

Final Examination 30% All materials

GRADING PHILOSOPHY AND METHOD: A letter grade of “B” is a good and usual
graduate course grade. A letter grade of “A” is not as common and requires excellent and
superior performances in all areas of work throughout the Semester, and also requires the
demonstration of abilities of a “Reflective Practitioner” in all areas as evaluated by the instructor.

In compliance with institutional policy, students are required to pass both course work and
end of module exams in order to successfully complete the module.

GRADING SYSTEM

Percentage Score Letter Quality Points


Grade
per Credit Hour

90 – 100 A 4.00

80 – 89 A- 3.67

70 – 79 B+ 3.33

60 – 69 B 3.00

0-59 F 0.00

Required Text

Laudon, K.C. & Laudon, J.P. (2015) Managing Information Systems: Managing the Digital
Firm, (14th ed.). Harlow, Essex: Pearson.

Recommended Text

Brown, C.V., DeHayes, D.W., Hoffer, J.A., Martin, E.W., Perkins, W.C. (2012). Managing
Information Technology, (7th ed.). Upper Saddle River, N.J.: Pearson /Prentice Hall.

8
Other Readings

Materials posted on LMS

ACADEMIC HONESTY

University demands a high level of scholarly behaviour and academic honesty. Work submitted
must be the original of the learner. Demonstration of integrity in all academic efforts is
expected. Anyone suspected and discovered to have committed plagiarism or any other form of
academic dishonesty will receive a failing grade of F for the course and is likely to be subjected
to further disciplinary action.

APA SYLE

Students at the University of the Commonwealth Caribbean are expected to write ALL papers
using the APA (American Psychological Association) format. The American Psychological
Association (APA) developed a set of standards that writers in the social sciences follow to
create consistency throughout publications. These rules address:

- Crediting sources

- Document formatting

- Writing style and organisation

For more information, please consult the Publication Manual of the American Psychological
Association, (6th ed., 2nd printing) available in the university library and online. A quick online
tutorial on the Basics of APA Style is available at www.apastyle.org/learn/tutorials/basics-
tutorial.aspx.

ACADEMIC INTEGRITY AND COPYRIGHT

University demands a high level of scholarly behaviour and academic honesty on the part of its
students. Any assignment, test, paper, project or report submitted by you and that bears your
name is presumed to be your own original work that has not previously been submitted for credit
in another course unless you obtain prior written approval to do so from your lecturer.
9
In all assignments, or drafts of papers, you may use words or ideas written by other individuals
in publications, web sites or other sources, but only with proper attribution. “Proper attribution”
means that you have fully identified the original source and extent of your use of the words or
ideas of others that you reproduce in your work for this course, usually in the form of a footnote
or parenthesis. Failure to do so is Plagiarism and is considered a form of academic dishonesty.

PLAGIARISM AND THE CONSEQUENCES OF PLAGIARISM

Plagiarism is a form of intellectual theft. If you fail to acknowledge your sources or make it
appear that someone else’s work is your own, you are guilty of plagiarism. The scholarly world
operates by exchanging information and crediting the sources of that information. If you violate
that process, you have committed a crime in the academic community. If you are having
difficulty completing a paper on time, or need some additional help, or are unsure of how or
where to document a source, please contact your lecturer or go to the librarian for help so you
can avoid inadvertently or intentionally plagiarising a source.

You will be charged with plagiarism if you:

 Copy from published sources without adequate documentation.


 Intentionally or unintentionally appropriate the ideas, language, key terms, or findings of
another without sufficient acknowledgment that such material is not your own and
without acknowledging the source.
 Purchase a pre-written paper (either by mail or electronically).
 Let someone else write a paper for you.
 Reproduce someone else’s project.
 Submit as your own someone else’s unpublished work, either with or without
permission.
 Incorrectly cite or neglect to cite borrowed materials

Consequences of Plagiarism

10
If the final work you submit—all of it—is not yours, it does not matter how you came by it.
Charges of plagiarism are brought to the attention of Academic Affairs, which initiates an
investigation that may lead to formal charges.

The process for the investigation and adjudication of charges may be accessed at the Department
of Student Affairs Office.

Plagiarism is a serious offense that can result in a variety of sanctions (failure of the course in
which the plagiarism occurred and suspension from University among them).

Appropriate Uses of Sources

A mark of strong academic writing is demonstrated when one appropriately identifies sources in
his/her arguments and analyses. This practice is called documentation. Guidelines for how to
correctly cite materials used within your writing and assembling the list of works that you cite in
your paper are available in style manuals. Information from these style manuals can be accessed
in University’s Library & Information Centre

Whenever you draw on another’s work, you must specify what you borrowed, whether facts,
opinions, or quotations, and where you borrowed them from.

Avoiding Plagiarism

Contact your lecturer and honestly discuss a strategy for completing an assignment rather than
risk humiliation and legal charges.

Become thoroughly acquainted both with the various ways in which plagiarism is construed, and
with sources of proper documentation.

Reference

American Psychological Association (2009). Publication manual of the American

Psychological Association (6th ed.). Washington, D.C.: American Psychological Association.

See link provided to Purdue University site on the APA Format

http://owl.english.purdue.edu/owl/resource/560/01/

11
END OF DOCUMENT

12

You might also like