PV080 Protection of Data and Information Privacy

Faculty of Informatics
Autumn 2012
Extent and Intensity
2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
Teacher(s)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
RNDr. Marek Kumpošt, Ph.D. (assistant)
Guaranteed by
prof. RNDr. Luděk Matyska, CSc.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics
Timetable
Tue 10:00–11:50 D1
Prerequisites
This course introduces the issues of data security and protection, including the issues of information privacy. It is aimed at students in their first two years of study, who are interested in further studies in the areas of IT security and cryptography.
Course Enrolment Limitations
The course is also offered to the students of the fields other than those the course is directly associated with.
fields of study / plans the course is directly associated with
there are 43 fields of study the course is directly associated with, display
Course objectives
At the end of the course students should be able to:
explain the importance of information privacy and to illustrate negative impacts of its breach by examples;
show advantages or disadvantages of basic IT security and privacy methods;
judge impact of IT deployment on personal data and to judge ethical aspects of considered solutions;
explain the importance of proper ways to security from risk analysis, through security policy up to the development and management of mechanisms;
assess suitability of deploying selected tools for security and privacy support.
Syllabus
  • Concept of information privacy and relevant technical aspects, IT influence and relations.
  • Protection of private data and legislation.
  • Ethics, professional behavior and maintenance of information.
  • Introduction to IT security.
  • From risk analysis to security policy.
  • The need of data protection in selected areas of human activity.
  • Introduction to cryptography, digital signature.
  • Data protection in selected areas/industries.
  • Security standards, evaluation criteria.
  • Audit, revision of countermeasures.
  • Internet and security, privacy protection.
Literature
  • A. Pfitzmann, M. Hansen : A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
  • Zákon o ochraně osobních údajů (101/2000 Sb.) / Personal Data Protection Act, No. 101/2000 Col.
Teaching methods
lecture, discussions both at lectures and in a dedicated forum in the IS
Assessment methods
Written mid-term (about 1/3 of the final mark) and final exams.
Language of instruction
Czech
Follow-Up Courses
Further Comments
The course is taught annually.
Listed among pre-requisites of other courses
The course is also listed under the following terms Spring 2003, Spring 2005, Autumn 2005, Autumn 2006, Autumn 2007, Autumn 2008, Autumn 2009, Autumn 2010, Autumn 2011, Autumn 2013, Autumn 2014, Autumn 2015, Autumn 2016, Autumn 2017, Autumn 2018, Autumn 2019, Autumn 2020, Spring 2021, Spring 2022, Spring 2023, Spring 2024, Spring 2025.
  • Enrolment Statistics (Autumn 2012, recent)
  • Permalink: https://is.muni.cz/course/fi/autumn2012/PV080