PrF:D5PIT13 Protection of information V - Course Information
D5PIT13 Protection of information in European and international law VFaculty of Law
- Extent and Intensity
- 0/0/0. 5 credit(s). Type of Completion: z (credit).
- JUDr. Matěj Myška, Ph.D. (lecturer)
doc. JUDr. Radim Polčák, Ph.D. (lecturer)
- Guaranteed by
- doc. JUDr. Pavel Koukal, Ph.D.
Institute of Law and Technology - Faculty of Law
Contact Person: Hana Jelínková
- This course does not have any prerequisites. General requirement for enrolment to this course is advanced knowledge of legal English incl. specific terminology of legal theory and ICT law.
- Course Enrolment Limitations
- The course is only offered to the students of the study fields the course is directly associated with.
- Fields of study the course is directly associated with
- Law Information and Communication Technologies (combined) (programme PrF, ICT_)
- Law Information and Communication Technologies (programme PrF, D-TPV4) (2)
- Law Information and Communication Technologies (programme PrF, ICT_)
- Course objectives
- The aim of the course is to explain and demonstrate the problems of privacy and protection of personal data in the information society.
- Learning outcomes
- Upon the completion of this course, students shall be able to:
Understand complex concept of privacy;
Apply the doctrine of proportionality on cases of on-line infringements of privacy;
Analyse and resolve hard cases arising of protection of personal data on the Internet;
Analyse and resolve hard cases arising of protection of privacy on the Internet
- The concept of privacy;
- Specific features of privacy on-line;
- Protection of privacy in private law;
- Protection of privacy in public law;
- International protection of privacy
- Kokott, Juliane; Sobotta, Christoph. The distinction between privacy and data protection in the jurisprudence of the CJEU and the ECtHR. International Data Privacy Law. 2013, roč. 3, č. 4, s. 222–228 [vid. 30. září 2017]. ISSN 2044-3994, doi:10.1093/idpl
- Voss, Marco. Privacy Preserving Online Reputation Systems. In: Information Security Management, Education and Privacy [online]. Boston: Springer, 2004, IFIP International Federation for Information Processing, s. 249–264, https://link.springer.com/chapte
- Mahler, Tobias; Olsen, Thomas. Reputation Systems and Data Protection Law. In P. Cunningham & M. Cunningham (eds.), eAdoption and the Knowledge Economy: Issues, Applications, Case Studies, part 1, ISBN 1 58603 470 7, IOS Press, Amsterdam 2004, pp. 180-18
- SOTTO, Lisa J. Privacy and data security law deskbook. 1st ed. New York: Wolters Kluwer, 2013. 1 sv. ISBN 9780735591103.
- Creemers, Rogier (ed). Planning Outline for the Construction of a Social Credit System (2014-2020). China Copyright and Media. 2014, https://chinacopyrightandmedia.wordpress.com/2014/06/14/planning-outline-for-the-construction-of-a-social-credit-system-2
- FISCHER-HÜBNER, Simone. IT-security and privacy : design and use of privacy-enhancing security mechanisms. Berlin: Springer, 2001. xiii, 351. ISBN 3540421424.
- Teaching methods
- individual and group tutoring sessions, individual resolution of specific research tasks, colloquial presentation of research results
- Assessment methods
- Essay resolving assigned scientific issue (50%), colloquial presentation of results of individual research (50%)
- Language of instruction
- Further Comments
- Study Materials
- Enrolment Statistics (recent)
- Permalink: https://is.muni.cz/course/law/autumn2019/D5PIT13