D5PIT13 Protection of information in European and international law V

Faculty of Law
Autumn 2019
Extent and Intensity
0/0/0. 5 credit(s). Type of Completion: z (credit).
JUDr. Matěj Myška, Ph.D. (lecturer)
doc. JUDr. Radim Polčák, Ph.D. (lecturer)
Guaranteed by
doc. JUDr. Pavel Koukal, Ph.D.
Institute of Law and Technology - Faculty of Law
Contact Person: Hana Jelínková
This course does not have any prerequisites. General requirement for enrolment to this course is advanced knowledge of legal English incl. specific terminology of legal theory and ICT law.
Course Enrolment Limitations
The course is only offered to the students of the study fields the course is directly associated with.
Fields of study the course is directly associated with
Course objectives
The aim of the course is to explain and demonstrate the problems of privacy and protection of personal data in the information society.
Learning outcomes
Upon the completion of this course, students shall be able to:
Understand complex concept of privacy;
Apply the doctrine of proportionality on cases of on-line infringements of privacy;
Analyse and resolve hard cases arising of protection of personal data on the Internet;
Analyse and resolve hard cases arising of protection of privacy on the Internet
  • The concept of privacy;
  • Specific features of privacy on-line;
  • Protection of privacy in private law;
  • Protection of privacy in public law;
  • International protection of privacy
  • Kokott, Juliane; Sobotta, Christoph. The distinction between privacy and data protection in the jurisprudence of the CJEU and the ECtHR. International Data Privacy Law. 2013, roč. 3, č. 4, s. 222–228 [vid. 30. září 2017]. ISSN 2044-3994, doi:10.1093/idpl
  • Voss, Marco. Privacy Preserving Online Reputation Systems. In: Information Security Management, Education and Privacy [online]. Boston: Springer, 2004, IFIP International Federation for Information Processing, s. 249–264, https://link.springer.com/chapte
  • Mahler, Tobias; Olsen, Thomas. Reputation Systems and Data Protection Law. In P. Cunningham & M. Cunningham (eds.), eAdoption and the Knowledge Economy: Issues, Applications, Case Studies, part 1, ISBN 1 58603 470 7, IOS Press, Amsterdam 2004, pp. 180-18
  • SOTTO, Lisa J. Privacy and data security law deskbook. 1st ed. New York: Wolters Kluwer, 2013. 1 sv. ISBN 9780735591103.
  • Creemers, Rogier (ed). Planning Outline for the Construction of a Social Credit System (2014-2020). China Copyright and Media. 2014, https://chinacopyrightandmedia.wordpress.com/2014/06/14/planning-outline-for-the-construction-of-a-social-credit-system-2
  • FISCHER-HÜBNER, Simone. IT-security and privacy : design and use of privacy-enhancing security mechanisms. Berlin: Springer, 2001. xiii, 351. ISBN 3540421424.
Teaching methods
individual and group tutoring sessions, individual resolution of specific research tasks, colloquial presentation of research results
Assessment methods
Essay resolving assigned scientific issue (50%), colloquial presentation of results of individual research (50%)
Language of instruction
Further Comments
Study Materials
The course is also listed under the following terms Autumn 2013, Autumn 2014, Autumn 2015, Autumn 2016, Autumn 2017, Autumn 2018.
  • Enrolment Statistics (recent)
  • Permalink: https://is.muni.cz/course/law/autumn2019/D5PIT13