COURSE OUTLINE (2023)
COURSE TITLE: advanced privacy and data protection
COURSE CODE:
YEAR/SEMESTER:
CREDITS:
DURATION:
PRE-REQUISITES: None
LECTURER:
CONTACT:
COURSE DESCRIPTION & RATIONALE
A successful data protection procedure can prevent data loss, or corruption and
reduce damage caused in the event of a breach. Data privacy methods ensure that
sensitive data is accessible only to approved parties.
The course intends to produce skilled professionals to understand the processes that
impact information security, safeguarding information assets, collection and
preservation of digital evidence, analysis of data, and identification and fixing of
security vulnerabilities. This is a state-of-the-art course with a perfect blend of
Security that is designed to achieve the success by combining and leveraging
today’s cutting-edge technology with real-world scenarios.
The course is also designed to strengthen individual role as legal professional in
human rights protection as standards on data protection and privacy rights have to
be primarily upheld at every level.
1
LEARNING OUTCOMES:
By the end of this course it is expected that participants will/will be able to:
Ensure data protection by design and by default in a fast-changing digital
and legal environment.
Assess data protection compliance and how it is interlinked with IT security.
Risk analysis and management.
Assess issues related to personal data transfers.
Identify actions to take in case of personal data breaches.
How to implement controls and understand the difference between
anonymisation, pseudo-anonymisation and encryption.
Conduct a data protection impact assessment.
Data processing agreement and its practical implications.
Ensure data protection compliant migration to a cloud computing service
provider.
Draft a data breach protocol and effectively raise awareness.
Act after a significant data breach, including audit and lessons learnt.
COURSE METHODOLOGY:
Students will be expected to present their work to the class and will concrete, real
life situations to analyze. In addition to that students will have to summarize
similarities and differences among research findings, artistic works, or laboratory
results.
students will be provided appropriate feedback on performance to benefit from
courses. In getting started, students need help in assessing existing knowledge and
competence. In classes, students will have frequent opportunities to perform and
receive suggestions for improvement.
Students would learn and practice that is, how they develop, process, retain and
apply knowledge and skills. Activities will engage and motivate students and help
them persist and accurately gauge and reflect upon their own learning.
2
TOPICS:
Data security and its type and how data protection and privacy matter.
The need of security.
Principals of processing.
Legal, Ethical, and professional issues in information security.
Data architecture and data storage and operations.
Data Architecture main components.
Risk management.
Accidental data exposure.
Communicating privately and anonymously.
Correcting, removing, and restricting data.
Rectification & Erasure of Data.
Data management and Data sharing.
Physical security.
Who, how and when (future).
3
COURSE SEQUENCE
Week Session/ Title/Description Specific Objectives Readings
Lesson At the end of each unit/lesson,
students should be able to:
1 Data security and its Understand the need of security.
type and how data Approaches to Information
protection and security and Implementation.
privacy matter.
Business need, Threats and
The need of security attacks.
2 Data architecture and Law and Ethic in information
data storage and security
operations. Legal, International laws and legal bodies
Ethical, and
Ethical decision evaluation
professional issues in
information security. Ethics and education
3 Risk management What is risk control strategy,
and communicating selecting risk control strategy.
privately and Defend, Transfer, Mitigate, accept,
anonymously and terminate.
4 Planning for security Security Education, Training,
Awareness
Security Technology
4
Cryptography Firewalls and protecting
connections.
Physical security.
5 Presentations and Final All
Review
5 Final Exam All course
materials
EVALUATION
Assignment 1
Assignment 2
Participation
Assignment
Final Exam
No. Course Learning Outcomes (CLOs)
Individual
TOTAL
Group
Group
Class
1 Understand the concept, Information
security: Is it an Art or Science
2 Understand secure software
development
3 Determine the codes of ethics and Laws
of information security in different
professional organizations.
4 Illustrate how the effective and efficient
risk management is
5 Explain how educating, training and
awareness plan works in an
5
Assignment 1
Assignment 2
Participation
Assignment
Final Exam
No. Course Learning Outcomes (CLOs)
Individual
TOTAL
Group
Group
Class
organization
6 Recognize the important role of access
control in computerized information
systems
7 identify and discuss widely-used
authentication factors
8 Identify and describe the categories and
operating models of intrusion detection
and prevention systems
9 Understand the Data management and
Data sharing.
10 Discuss need of Physical security in
data security
11 discuss widely used authentication
methodologies
12 Describe the technology that enables
the use of virtual private networks
13 Recognize the existing conceptual
frameworks for evaluating risk controls
and formulate a cost benefit analysis
14 Identify the threats posed to
information security.
Total 10 15 20 25 30 100
PERFORMANCE EVALUATION DETAILS
6
The course will be evaluated using the following.
Assignment Weight Due Readings
Individual Assignment 1 – Read four 15% Power Point
peered reviewed Journals which focus on Slides
the following areas: 1) Enterprise
resource planning systems; 2) value of e-
business; 3) Business Process Re- Other materials
engineering; and 4) Information systems used in the course
Security. Summarise the papers in
approximately 1000 words. References
must be properly documented using the
APA format. Papers must not be used
more than once. Students must post the
references to their papers in Journal
Articles section of the LMS before
submitting the work. This section should
also be used to ensure that a paper being
used is not already selected by another
student.
Group Assignment 1 – Identify and 20% All sections and
review the information systems and lessons
technologies being used in any
organisation of your choice and document
the IT/IS strategies being employed
within the organisation. Describe the IT
value chain and Balance Score Card for
the organisation and explain how internet
technologies would help the business
become more effective.
See LMS for further information about
this assignment
Group Assignment 2 - 25% All sections and
lessons
Case Reviews and Presentations
Assigned Cases
Class Participation (Includes attendance 10% Duration of All sections and
and positive contributions to the class
7
discussions) course course materials
Final Examination 30% All materials
GRADING PHILOSOPHY AND METHOD: A letter grade of “B” is a good and usual
graduate course grade. A letter grade of “A” is not as common and requires excellent and
superior performances in all areas of work throughout the Semester, and also requires the
demonstration of abilities of a “Reflective Practitioner” in all areas as evaluated by the instructor.
In compliance with institutional policy, students are required to pass both course work and
end of module exams in order to successfully complete the module.
GRADING SYSTEM
Percentage Score Letter Quality Points
Grade
per Credit Hour
90 – 100 A 4.00
80 – 89 A- 3.67
70 – 79 B+ 3.33
60 – 69 B 3.00
0-59 F 0.00
Required Text
Laudon, K.C. & Laudon, J.P. (2015) Managing Information Systems: Managing the Digital
Firm, (14th ed.). Harlow, Essex: Pearson.
Recommended Text
Brown, C.V., DeHayes, D.W., Hoffer, J.A., Martin, E.W., Perkins, W.C. (2012). Managing
Information Technology, (7th ed.). Upper Saddle River, N.J.: Pearson /Prentice Hall.
8
Other Readings
Materials posted on LMS
ACADEMIC HONESTY
University demands a high level of scholarly behaviour and academic honesty. Work submitted
must be the original of the learner. Demonstration of integrity in all academic efforts is
expected. Anyone suspected and discovered to have committed plagiarism or any other form of
academic dishonesty will receive a failing grade of F for the course and is likely to be subjected
to further disciplinary action.
APA SYLE
Students at the University of the Commonwealth Caribbean are expected to write ALL papers
using the APA (American Psychological Association) format. The American Psychological
Association (APA) developed a set of standards that writers in the social sciences follow to
create consistency throughout publications. These rules address:
- Crediting sources
- Document formatting
- Writing style and organisation
For more information, please consult the Publication Manual of the American Psychological
Association, (6th ed., 2nd printing) available in the university library and online. A quick online
tutorial on the Basics of APA Style is available at www.apastyle.org/learn/tutorials/basics-
tutorial.aspx.
ACADEMIC INTEGRITY AND COPYRIGHT
University demands a high level of scholarly behaviour and academic honesty on the part of its
students. Any assignment, test, paper, project or report submitted by you and that bears your
name is presumed to be your own original work that has not previously been submitted for credit
in another course unless you obtain prior written approval to do so from your lecturer.
9
In all assignments, or drafts of papers, you may use words or ideas written by other individuals
in publications, web sites or other sources, but only with proper attribution. “Proper attribution”
means that you have fully identified the original source and extent of your use of the words or
ideas of others that you reproduce in your work for this course, usually in the form of a footnote
or parenthesis. Failure to do so is Plagiarism and is considered a form of academic dishonesty.
PLAGIARISM AND THE CONSEQUENCES OF PLAGIARISM
Plagiarism is a form of intellectual theft. If you fail to acknowledge your sources or make it
appear that someone else’s work is your own, you are guilty of plagiarism. The scholarly world
operates by exchanging information and crediting the sources of that information. If you violate
that process, you have committed a crime in the academic community. If you are having
difficulty completing a paper on time, or need some additional help, or are unsure of how or
where to document a source, please contact your lecturer or go to the librarian for help so you
can avoid inadvertently or intentionally plagiarising a source.
You will be charged with plagiarism if you:
Copy from published sources without adequate documentation.
Intentionally or unintentionally appropriate the ideas, language, key terms, or findings of
another without sufficient acknowledgment that such material is not your own and
without acknowledging the source.
Purchase a pre-written paper (either by mail or electronically).
Let someone else write a paper for you.
Reproduce someone else’s project.
Submit as your own someone else’s unpublished work, either with or without
permission.
Incorrectly cite or neglect to cite borrowed materials
Consequences of Plagiarism
10
If the final work you submit—all of it—is not yours, it does not matter how you came by it.
Charges of plagiarism are brought to the attention of Academic Affairs, which initiates an
investigation that may lead to formal charges.
The process for the investigation and adjudication of charges may be accessed at the Department
of Student Affairs Office.
Plagiarism is a serious offense that can result in a variety of sanctions (failure of the course in
which the plagiarism occurred and suspension from University among them).
Appropriate Uses of Sources
A mark of strong academic writing is demonstrated when one appropriately identifies sources in
his/her arguments and analyses. This practice is called documentation. Guidelines for how to
correctly cite materials used within your writing and assembling the list of works that you cite in
your paper are available in style manuals. Information from these style manuals can be accessed
in University’s Library & Information Centre
Whenever you draw on another’s work, you must specify what you borrowed, whether facts,
opinions, or quotations, and where you borrowed them from.
Avoiding Plagiarism
Contact your lecturer and honestly discuss a strategy for completing an assignment rather than
risk humiliation and legal charges.
Become thoroughly acquainted both with the various ways in which plagiarism is construed, and
with sources of proper documentation.
Reference
American Psychological Association (2009). Publication manual of the American
Psychological Association (6th ed.). Washington, D.C.: American Psychological Association.
See link provided to Purdue University site on the APA Format
http://owl.english.purdue.edu/owl/resource/560/01/
11
END OF DOCUMENT
12