D5PIT13 Protection of information in European and international law V

Faculty of Law
Autumn 2024
Extent and Intensity
0/0/0. 5 credit(s). Type of Completion: z (credit).
In-person direct teaching
Teacher(s)
JUDr. MgA. Jakub Míšek, Ph.D. (lecturer)
doc. JUDr. Matěj Myška, Ph.D. (lecturer)
prof. JUDr. Radim Polčák, Ph.D. (lecturer)
Guaranteed by
doc. JUDr. Pavel Koukal, Ph.D.
Department of Civil Law – Faculty of Law
Contact Person: Alice Dvořáková
Prerequisites
This course does not have any prerequisites. General requirement for enrolment to this course is advanced knowledge of legal English incl. specific terminology of legal theory and ICT law.
Course Enrolment Limitations
The course is only offered to the students of the study fields the course is directly associated with.
fields of study / plans the course is directly associated with
Course objectives
The aim of the course is to explain and demonstrate the problems of privacy and protection of personal data in the information society.
Learning outcomes
Upon the completion of this course, students shall be able to:
Understand complex concept of privacy;
Apply the doctrine of proportionality on cases of on-line infringements of privacy;
Analyse and resolve hard cases arising of protection of personal data on the Internet;
Analyse and resolve hard cases arising of protection of privacy on the Internet
Syllabus
  • The concept of privacy;
  • Specific features of privacy on-line;
  • Protection of privacy in private law;
  • Protection of privacy in public law;
  • International protection of privacy
Literature
  • SOTTO, Lisa J. Privacy and data security law deskbook. 1st ed. New York: Wolters Kluwer, 2013. 1 sv. ISBN 9780735591103.
  • Kokott, Juliane; Sobotta, Christoph. The distinction between privacy and data protection in the jurisprudence of the CJEU and the ECtHR. International Data Privacy Law. 2013, roč. 3, č. 4, s. 222–228 [vid. 30. září 2017]. ISSN 2044-3994, doi:10.1093/idpl
  • FISCHER-HÜBNER, Simone. IT-security and privacy : design and use of privacy-enhancing security mechanisms. Berlin: Springer, 2001. xiii, 351. ISBN 3540421424.
  • Creemers, Rogier (ed). Planning Outline for the Construction of a Social Credit System (2014-2020). China Copyright and Media. 2014, https://chinacopyrightandmedia.wordpress.com/2014/06/14/planning-outline-for-the-construction-of-a-social-credit-system-2
  • Voss, Marco. Privacy Preserving Online Reputation Systems. In: Information Security Management, Education and Privacy [online]. Boston: Springer, 2004, IFIP International Federation for Information Processing, s. 249–264, https://link.springer.com/chapte
  • Mahler, Tobias; Olsen, Thomas. Reputation Systems and Data Protection Law. In P. Cunningham & M. Cunningham (eds.), eAdoption and the Knowledge Economy: Issues, Applications, Case Studies, part 1, ISBN 1 58603 470 7, IOS Press, Amsterdam 2004, pp. 180-18
Teaching methods
individual and group tutoring sessions, individual resolution of specific research tasks, colloquial presentation of research results
Assessment methods
Essay resolving assigned scientific issue (50%), colloquial presentation of results of individual research (50%)
Language of instruction
Czech
The course is also listed under the following terms Autumn 2013, Autumn 2014, Autumn 2015, Autumn 2016, Autumn 2017, Autumn 2018, Autumn 2019, Autumn 2020, Autumn 2021, Autumn 2022, Autumn 2023.
  • Enrolment Statistics (recent)
  • Permalink: https://is.muni.cz/course/law/autumn2024/D5PIT13