PrF:D6PIT16 Protection of information VI - Course Information
D6PIT16 Protection of information in European and international law VIFaculty of Law
- Extent and Intensity
- 0/0. 5 credit(s). Type of Completion: z (credit).
- doc. JUDr. Radim Polčák, Ph.D. (lecturer)
- Guaranteed by
- doc. JUDr. Pavel Koukal, Ph.D.
Institute of Law and Technology - Faculty of Law
Contact Person: Hana Jelínková
- This course does not have any prerequisites. General requirement for enrolment to this course is advanced knowledge of legal English incl. specific terminology of legal theory, ICT law and administrative and private law.
- Course Enrolment Limitations
- The course is only offered to the students of the study fields the course is directly associated with.
- Fields of study the course is directly associated with
- Law Information and Communication Technologies (combined) (programme PrF, ICT_)
- Law Information and Communication Technologies (programme PrF, D-TPV4) (2)
- Law Information and Communication Technologies (programme PrF, ICT_)
- Course objectives
- The aim of the course is to explain and demonstrate the problems of international and European regulation of cyber security and cybercrime.
- Learning outcomes
- Upon the completion of this course, students shall be able to:
Understand the structure of international and European legal regulatory framework of cybersecurity;
Identify and resolve legal issues of cybersecurity on the level of a sovereign state;
Apply international and European law of cybercrime;
Resolve hard cases arising of cross-border handling of digital evidence
- Concept pf cybersecurity;
- Concept of cybercrime;
- Legal regulatory framework of cybersecurity in the EU;
- International cooperation in tackling cybercrime;
- Cross-border gathering and handling of digital evidence in criminal procedure
- MOORE, Robert. Cybercrime : investigating high-technology computer crime. 2nd ed. Amsterdam: Elsevier, 2011. x, 318. ISBN 9781437755824.
- Cybercrime and jurisdiction : a global survey. Edited by Susan W. Brenner - Bert-Jaap Koops. The Hague: T.M.C. Asser press, 2006. xvii, 355. ISBN 9067042218.
- Tracol, Xavier, 2017. The judgment of the Grand Chamber dated 21 December 2016 in the two joint Tele2 Sverige and Watson cases: The need for a harmonised legal framework on the retention of data at EU level. Computer Law & Security Review. 1 August 2017.
- Cameron, Iain, 2017. A. Court of Justice Balancing data protection and law enforcement needs: Tele2 Sverige and Watson. Common Market Law Review. 1 October 2017. Vol. 54, no. 5, p. 1467–1495, http://www.kluwerlawonline.com/abstract.php?area=Journals&id=
- The law and economics of cybersecurity. Edited by Mark F. Grady - Francesco Parisi. 1st pub. Cambridge: Cambridge University Press, 2006. viii, 310. ISBN 0521855276.
- POLČÁK, Radim and Dan Jerker B. SVANTESSON. Information Sovereignty - Data Privacy, Sovereign Powers and the Rule of Law. 1. vyd. Cheltenham: Edward Elgar Publishing, 2017. 268 pp. 2017936584. ISBN 978-1-78643-921-5. doi:10.4337/9781786439222. info
- Teaching methods
- individual and group tutoring sessions, individual resolution of specific research tasks, colloquial presentation of research results
- Assessment methods
- Essay resolving assigned scientific issue (50%), colloquial presentation of results of individual research (50%)
- Language of instruction
- Enrolment Statistics (recent)
- Permalink: https://is.muni.cz/course/law/spring2020/D6PIT16