FI:PV080 Prot. Data and Inf. Privacy - Course Information
PV080 Protection of Data and Information Privacy
Faculty of InformaticsAutumn 2018
- Extent and Intensity
- 2/0. 2 credit(s) (plus extra credits for completion). Recommended Type of Completion: zk (examination). Other types of completion: k (colloquium).
- Teacher(s)
- prof. RNDr. Václav Matyáš, M.Sc., Ph.D. (lecturer)
RNDr. Marek Kumpošt, Ph.D. (lecturer)
Mgr. Marek Sýs, Ph.D. (assistant) - Guaranteed by
- doc. RNDr. Eva Hladká, Ph.D.
Department of Computer Systems and Communications – Faculty of Informatics
Contact Person: prof. RNDr. Václav Matyáš, M.Sc., Ph.D.
Supplier department: Department of Computer Systems and Communications – Faculty of Informatics - Timetable
- Tue 8:00–9:50 D1
- Prerequisites
- This course introduces the issues of data security and protection, including the issues of information privacy. It is aimed at students in their first two years of study, who are interested in further studies in the areas of IT security and cryptography.
- Course Enrolment Limitations
- The course is also offered to the students of the fields other than those the course is directly associated with.
- fields of study / plans the course is directly associated with
- there are 42 fields of study the course is directly associated with, display
- Course objectives
- The aim is to teach the students to:
explain the importance of information privacy and to illustrate negative impacts of its breach by examples;
show advantages or disadvantages of basic IT security and privacy methods;
judge impact of IT deployment on personal data and to judge ethical aspects of considered solutions;
explain the importance of proper ways to security from risk analysis, through security policy up to the development and management of mechanisms;
assess suitability of deploying selected tools for security and privacy support. - Learning outcomes
- At the end of the course students will be able to:
explain the importance of information privacy and to illustrate negative impacts of its breach by examples;
show advantages or disadvantages of basic IT security and privacy methods;
judge impact of IT deployment on personal data and to judge ethical aspects of considered solutions;
explain the importance of proper ways to security from risk analysis, through security policy up to the development and management of mechanisms;
assess suitability of deploying selected tools for security and privacy support. - Syllabus
- Concept of information privacy and relevant technical aspects, IT influence and relations.
- Protection of private data and legislation.
- Digital identity.
- Ethics, professional behavior and maintenance of information.
- Introduction to IT security.
- From risk analysis to security policy.
- The need of data protection in selected areas of human activity.
- Introduction to cryptography, digital signature.
- Data protection in selected areas/industries.
- Security standards, evaluation criteria.
- Audit, revision of countermeasures.
- Internet and security, privacy protection.
- Literature
- Zákon o ochraně osobních údajů (101/2000 Sb.) / Personal Data Protection Act, No. 101/2000 Col.
- A. Pfitzmann, M. Hansen : A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
- Teaching methods
- lecture, discussions both at lectures and in a dedicated forum in the IS
- Assessment methods
- Written mid-term (about 1/3 of the final mark) and final exams.
- Language of instruction
- Czech
- Follow-Up Courses
- Further Comments
- Study Materials
The course is taught annually. - Listed among pre-requisites of other courses
- Enrolment Statistics (Autumn 2018, recent)
- Permalink: https://is.muni.cz/course/fi/autumn2018/PV080