FI:PV080 Prot. Data and Inf. Privacy - Course Information
PV080 Protection of Data and Information Privacy
Faculty of InformaticsAutumn 2014
- Extent and Intensity
- 2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- RNDr. Marek Kumpošt, Ph.D. (lecturer)
prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
Mgr. Marek Sýs, Ph.D. (assistant) - Guaranteed by
- doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Tue 12:00–13:50 D1
- Prerequisites
- This course introduces the issues of data security and protection, including the issues of information privacy. It is aimed at students in their first two years of study, who are interested in further studies in the areas of IT security and cryptography.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- Applied Informatics (programme FI, B-AP)
- Applied Informatics (programme FI, N-AP)
- Information Technology Security (programme FI, N-IN)
- Bioinformatics (programme FI, B-AP)
- Bioinformatics (programme FI, N-AP)
- Economic Information Systems (programme ESF, B-SI)
- Information Systems (programme FI, N-IN)
- Informatics with another discipline (programme FI, B-EB)
- Informatics with another discipline (programme FI, B-FY)
- Informatics with another discipline (programme FI, B-GE)
- Informatics with another discipline (programme FI, B-GK)
- Informatics with another discipline (programme FI, B-CH)
- Informatics with another discipline (programme FI, B-IO)
- Informatics with another discipline (programme FI, B-MA)
- Informatics with another discipline (programme FI, B-TV)
- Informatics (eng.) (programme FI, D-IN4)
- Informatics (programme FI, D-IN4)
- Public Administration Informatics (programme FI, B-AP)
- Mathematical Informatics (programme FI, B-IN)
- Parallel and Distributed Systems (programme FI, B-IN)
- Parallel and Distributed Systems (programme FI, N-IN)
- Computer Graphics and Image Processing (programme FI, B-IN)
- Computer Graphics (programme FI, N-IN)
- Computer Networks and Communication (programme FI, B-IN)
- Computer Networks and Communication (programme FI, N-IN)
- Computer Systems and Technologies (eng.) (programme FI, D-IN4)
- Computer Systems and Technologies (programme FI, D-IN4)
- Computer Systems and Data Processing (programme FI, B-IN)
- Computer Systems (programme FI, N-IN)
- Embedded Systems (eng.) (programme FI, N-IN)
- Programmable Technical Structures (programme FI, B-IN)
- Embedded Systems (programme FI, N-IN)
- Service Science, Management and Engineering (eng.) (programme FI, N-AP)
- Service Science, Management and Engineering (programme FI, N-AP)
- Social Informatics (programme FI, B-AP)
- Theoretical Informatics (programme FI, N-IN)
- Upper Secondary School Teacher Training in Informatics (programme FI, N-SS) (2)
- Artificial Intelligence and Natural Language Processing (programme FI, B-IN)
- Artificial Intelligence and Natural Language Processing (programme FI, N-IN)
- Image Processing (programme FI, N-AP)
- Course objectives
- At the end of the course students should be able to:
explain the importance of information privacy and to illustrate negative impacts of its breach by examples;
show advantages or disadvantages of basic IT security and privacy methods;
judge impact of IT deployment on personal data and to judge ethical aspects of considered solutions;
explain the importance of proper ways to security from risk analysis, through security policy up to the development and management of mechanisms;
assess suitability of deploying selected tools for security and privacy support. - Syllabus
- Concept of information privacy and relevant technical aspects, IT influence and relations.
- Protection of private data and legislation.
- Digital identity.
- Ethics, professional behavior and maintenance of information.
- Introduction to IT security.
- From risk analysis to security policy.
- The need of data protection in selected areas of human activity.
- Introduction to cryptography, digital signature.
- Data protection in selected areas/industries.
- Security standards, evaluation criteria.
- Audit, revision of countermeasures.
- Internet and security, privacy protection.
- Literature
- Zákon o ochraně osobních údajů (101/2000 Sb.) / Personal Data Protection Act, No. 101/2000 Col.
- A. Pfitzmann, M. Hansen : A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
- Teaching methods
- lecture, discussions both at lectures and in a dedicated forum in the IS
- Assessment methods
- Written mid-term (about 1/3 of the final mark) and final exams.
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- The course is taught annually.
- Listed among pre-requisites of other courses
- Enrolment Statistics (Autumn 2014, recent)
- Permalink: https://is.muni.cz/course/fi/autumn2014/PV080