0% found this document useful (0 votes)
64 views8 pages

LAW 110 Course Syllabus

Uploaded by

aloyceyohana35
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views8 pages

LAW 110 Course Syllabus

Uploaded by

aloyceyohana35
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

COURSE DESCRIPTION

Information and Communication Technology (ICT) application and Internet services have
nowadays become dominant. The invention of computers and other electronic applications have
changed the way of processing data, storage and communication. Technologies have also been
changing and converging. These transformations have led to emergence of knowledge economy
parallel with posing legal and regulatory challenges including threat to privacy and security.
New legal relations have also emerged. Admissibility of certain items which are in electronic
form as evidence has also been a subject of legal disputes. Formation of contract in electronic
environment is yet another controversy. Law students have to learn not only how to use
computers but also have to be familiar with legal issues brought by advent of ICT and the
Internet.

COURSE TITLE: LAW 110–INTRODUCTION TO INFORMATION TECHNOLOGY


AND COMPUTER APPLICATIONS LAW
COURSE AIM
This course has the following objectives:
a) To acquire knowledge of ICT application.
b) To acquire knowledge on relevance of ICT in legal profession.
c) To have a clear understanding of the interaction between ICT Law and other branches of
law like contract law, criminal law, and law of evidence.
d) To enable students to apply their knowledge to various legal issues relating to
information and communication technology and consequently be able to advice clients
accordingly.

COURSE EXPECTED LEARNING OUTCOMES


At the end of the training the students are expected:
a) To demonstrate working knowledge and skills of the common microcomputer application
software and System Software: MS-Word, MS-Excel, Database, etc.
b) To demonstrate that they have a clear understanding of IT current issues
c) To demonstrate the knowledge of creating documents in word, spreadsheets, etc.
d) To have knowledge of using a simple internet search skill.
e) To have acquired knowledge of legal regulation of ICT.
f) To be conversant with the aspects of ICT security vulnerabilities, IT Crimes i.e. Cyber
crimes, information security generally.
g) To have a clear understanding of the linkage which exist between ICT and Privacy.
h) To appreciate the existence of Intellectual Property Rights in ICT
i) To demonstrate the understanding of application of ICT in commerce and contracts, i.e.,
e-contracts and e-commerce

COURSE STATUS: Core


CREDIT RATING: 10
TOTAL HOURS SPENT: 100 Hours per Semester
COURSE CONTENT:

PART I: BASIC CONCEPTS OF ICT

1. Meaning of ICT
1.1 Data Processing, Storage and Communication Technologies
1.2 Computerisation and Digitalisation
 What is a Computer
 Types and Parts of Computer
 Hardware and Software: application and system software
 Factors affecting data security in computers
2. Network Technologies
 Technical terms of IT e.g. WWW, HTML, HTTP, IP address, Internet,
hyperlinks etc.
 Server and Client
 Domain Names
3. Emerging ICT Applications
 E-learning Systems
 Social Media
 Internet telephones
 Video streaming
 Digital storage services

4. DATABASE MANAGEMENT SYSTEMS (DBMS)


 Definition
 Different types of Database Management Systems
 Capabilities and types of Database Management Systems
 Creating a table/database and entering data
 Creating simple queries, form and report
LEGAL DATABASE e.g. Westlaw, Lexis Nexis, SAFLII
ICT IN LEGAL PRACTICE
 Case management
 Electronic filing

5. ACTORS IN ICT
 Regulators e.g. TCRA
 Operators/ Intermediaries
 Users

PART II: INTRODUCTION ICT LAW


6. Basics of ICT Law
 Meaning of ICT Law
 Sources of ICT Law
 Functions of ICT Law

7. Formation of electronic contracts


 Time and place of contract
 Types of electronic contracts

8. Legal Issues associated with Social Media


 Liability of ISPs
 Basic rights and the Internet

9. ICT Crimes
 Meaning of ICT Crimes Characteristics of ICT crimes
 Classification of ICT crimes

10. Legal Aspects of e-government


 Meaning of e-government
 Legalrequirements of e-government
 Administrative procedurerules and e-government
 Rules of natural justice in e-government

TEACHING AND LEARNING ACTIVITIES


Lectures, seminars, moot court practice and independent study
ASSESSMENT METHODS
Assessment and Evaluation of the course will be through Assignments, Presentations, Controlled
Tests, and End of Semester Examinations as per Mzumbe University Student Assessment
Criteria By-Laws.

READING LIST
Computer Studies

Tony Rackham,(1995); GCSE Computer Studies, Letts Educational, London.

French, CS, (1997) Computer Science, DP Publication Ltd., London.

HD. Clifton (1998) Business Data Systems, Prentice-Hall International, London

Luckey, T.,(1987) Management of Information Systems, DP Publication Ltd, London.

Timothy J.O’Leary, et al. Computing Essentials, McGrew-Hill


www.mhhe.com/26NewYork

Vishnu, Priya Singh, (2000), Computer Course(illustrated),NaiSarak, AP Asia Publishers.

IT Law

Hard, S. (2001) Law & Lawyers on the Internet-An essential guide and resource for legal
practitioners, Internet Handbooks Ltd., Plymouth, UK.

Hilder, P., (1997) IT in the Solicitors’ Office, Blackstone Press Ltd, London.

Lawrence Lessig, (1999) Code & Other Laws of Cyberspace,(Version 1) Basic Books New
York.

Lawrence Lessig, (2006) Code & Other Laws of Cyberspace,(Version 2) Basic Books New
York.
This book can be downloaded for free at www.lessig.org
Lawrence, P.,(2000) Law on the Internet -A Practical Guide, 1st edition, Sweet & Maxwell,
London.
Lloyd Ian, J. (2000) Information Technology Law, London, Butterworths, London.
Magnusson Sjöberg, C., (2005) IT Law for IT Professionals, Studentlitteratur, Lund.

Magnusson Sjöberg, C.,(2005) Legal Management of Information Systems –incorporating law


in e-solutions, 2nd edition, studentlitteratur, Lund.

Peter Wahlgren, (ed),(2004) IT Law, Scandinavian Studies in Law, Vol. 47, Stockholm Institute
for Scandinavian Law, Stockholm.

Richard Susskind, (1996) The Future of Law-Facing the Challenges of IT, Oxford University
Press Inc., New York

Journal and Law Review Articles

Gonzáles, A. “Attack of the Killer Acronyms: the Future of IT Law” International Review of
Law, Computers & Technology, Vol. 18, No. 3, 2004.

Paul Maharg, On the edge: ICT and the transformation of professional legal learning, Web
Journal of Current Legal Issues, Issue No.3 of 2006.

Edwin Greenebaum, Is the media the message? A discussion of Susskind’s The Future of Law,
International Journal of the Legal Profession, vol.6 No.2 July 1999.

Arthurs, W. H.and Kreklewich, R, Law, Legal Institutions, and the Legal Profession in the New
Economy, Osgoode Hall Law Journal Vol. 34 No. 1 1996.

Gurmak Singh, An Empirical Study in the Use of IT by Small and Large Law Firms in the UK,
Journal of Information, Law and Technology, Issue No. 1 of 22nd March 2002.

Louise, L, Hill, Publicity Rules of the Legal Profession within the United Kingdom, Arizona
Journal of International Comparative Law(AJICL), Vol.202, 2003.
Mac Sithigh, D. App law within: rights and regulation in the smartphone age, International
Journal of Law and Information Technology, 2013, Vol.21, No.2, pp.154-186.
-----------The Principles for user generated content services: A middle-ground approach to cyber-
governance, 2008, Harvard Law Review, Vol. 121, No.5, pp.1387-1408

Brownsword, R., The Shaping of our on-line world: getting the regulatory environment right,
2012, International Journal of Law and Information Technology, vol. 20, No.4, pp. 249-272

Macdonald, E., When is a contract formed by the browse-wrap process, 2011, International
Journal of Law and Information Technology, Vol. 19, No.4, pp.285-305

Vamialis, A., Online defamation: confronting anonymity, 2013 International Journal of Law and
Information Technology, Vol.21,No.1, pp.31-66

Carrier, M.A., The Pirate Bay, Grokster, and Google, Journal of Intellectual Property Rights,
Vol.15, 2010, pp.7-18.

Leenes, R., Framing Techno-regulation: an Exploration of State and Non-state regulation by


Technology, Legisprudence, Vol.5, No.2, pp.143-169

Yoo, C., The Convergence of Broadcasting and Telephony: Legal and Regulatory Implications,
2009, Communications and Convergence Review, Vol.1, No.1. pp.44-55

Kohl, U., The Rise and Rise of Online Intermediaries in the Governance of the Internet and
Beyond-Connectivity Intermediaries, 2012, International Review of Law, Computers and
Technology, Vol. 26, p.185 (Part One)

Kohl, U., Google-The Rise and Rise of Online Intermediaries in the Governance of the Internet
and Beyond, International Journal of Law and Information Technology, 2013, Vol.21, No.2, pp.
187-234(Part Two)

Stylianou, K.K., An innovative-centric approach of telecommunication infrastructure regulation,


Virginia Journal of Law and Technology, Vol.16, No.02, Summer 2011, pp. 222-252

NO. OF
COPIE
SHELFMARK AUTHOR TITLE S
Computer crime and digital
341.410268 WAL WALDEN,I envestigations 1
343.074 AND ANDERSON,M Technology transfer 1
Information and communication
343.099 INF INFORMATION technology 3
342.09944 CYB CYBER Cyber law: text and cases 1
343.09944 POL POLANSK, P. P. Customary law of the internet 1
343.09944 ROZ ROZNOVSCH,M Toward a cyberlegal culture.-2th.ed. 2
343.0999 BAR BARKHA Cyber law and crimes 3
An introduction to cyber crisis and
343.0999 CHA CHAUBEY, R.K. cyber law 1
Law relating to computer to e-
343.0999 KAM KAMATH, N commerce 2
343.0999 LLO LLOYD,J Information technology law 16
343.0999 MAM MAMBI, A.J. ICT law book 5
343.0999 NAG NAGAPAL,R Cyber crime and corporate liability 1
343.0999PAR PARKER, Donn B Fighting computer 1
343.0999 SMI SMITH, G Internet law and regulation 1
343.7309 CRA CRAIG, B. Cyber law 3
343.940999 LIM LIM,Y Cyber space law 3
342.3999 SHA SHARMA,V Information technology law 2010 2

LIST OF STATUTES
The Broadcasting Services Act, Cap 306 of R.E of 2002

The Constitution of the United Republic of Tanzania 1977 as amended

The Copyright and Neighbouring Rights Act, Cap 218 of R.E of 2002

The Electronic and Postal Communications Act, 2010 (Act no. 3 of 2010)

The Evidence Act, Cap 6 of R.E of 2002 as amended

The Extradition Act, Cap 368 of R.E of 2002.

The Law of Contract Act, Cap 345 of R.E of 2002.

The Penal Code, Cap 16 of R.E of 2002

The Reciprocal Enforcement of Foreign Judgments Act, Cap 8 of R.E of 2002

The Tanzania Communication Regulatory Authority Act, 2003 (Act no. 12 of 2003)

The Tanzania Communication Regulatory Authority Regulations, 2005


The Tanzania Communications (Consumer Protection) Regulations, 2005 (G.N No. 271 of 2005)

The Universal Communications Service Access Act, 2006 (Act no. 11 of 2006)

POLICIES

The Information and Communication Technology Policy of 2003

INTERNATIONAL LEGISLATION
Agreement on Trade-related Aspects of Intellectual Property Rights (TRIPS-Agreement)

Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a
Community framework for electronic signatures

Directive 2000/31/EC of the European Parliament and of the Council of 8 June 2000 on certain
legal aspects of information society services, in particular electronic commerce, in the Internal
Market ('Directive on electronic commerce')

Directive 2009/24/EC of the European Parliament and of the Council of 23 April 2009 on the
legal protection of Computer Programs

Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the
protection of individuals with regard to the processing of personal data and on the free
movement of such data

Directive 96/9/EC of the European Parliament and of the Council of 11 March 1996 on the legal
protection of databases

EC Convention on Cyber-crimes of 23rd day of November 2001

The Berne Convention for the Protection of Literary and Artistic Works (Berne Convention of
1971)

UNCITRAL Model Law on E Commerce, General Assembly Resolution 51/162 of December,


1996 as amended

You might also like