Educational guide
IDENTIFYING DATA 2021_22
Subject HUMAN ASPECTS AND LEGAL IMPLICATIONS OF CYBERSECURITY Code 01732003
Study programme
Descriptors Credit. Type Year Period
6 Compulsory First
Language
Castellano
Prerequisites
Department
Coordinador
E-mail
Lecturers
Web http://
General description
Tribunales de Revisión
Tribunal titular
Cargo Departamento Profesor
Tribunal suplente
Cargo Departamento Profesor

Competencies
Type A Code Competences Specific
Type B Code Competences Transversal
Type C Code Competences Nuclear
  C1
  C2
  C3
  C4
  C5

Learning aims
Competences
Knowing know and apply the different existing regulations on Cybersecurity A17017
B5215
B5216
C1
Knowing resolve legal problems arising in the field of new technologies A17017
A17029
B5214
B5215
B5217
C2
C3
C4
Analyzing the different legal implications arising from the work in the field of cybersecurit A17015
A17017
B5215
B5217
B5218
B5219
C3
C4
C5

Contents
Topic Sub-topic
SECTION I.- Privacy, Data, System Protection, and Professional Ethics: Constitutional Law and Cyber Security LESSON 1. DIGITAL RIGHTS: LEGAL FRAMEWORK
1. GLOBAL LEVEL: UNIVERSAL DECLARATION OF HUMAN RIGHTS (ART. 12)
2. EUROPEAN LEVEL:
2.1. European Convention of Human Rights and Fundamental freedoms, 1950 (art. 8).
2.2. Conseil of Europe: Data Protection. Convention for the protection of individuals with regarding to automatic processing of personal data (art. 108).
2.3. EU Charter of Fundamental Rights, art. 8
2.4. EU Law: Directive 95/46/EC
2.5. EU Law: Directive 2002/58/EC (ePrivacy Directive)
2.6. EU´s options for a data protection reform.
LESSON 2. DIGITAL RIGHTS IN THE SPANISH CONSTITUTION
1. Political and analytical context: data protection, privacy an habeas data.
2. Spanish Constitution, art. 18.4
3. Spanish Laws: LO 1/1982, 5 May; Lo 5/1992, 29 October (LORTAD); LO 15/1999; 13 December (LOPD).
4. Cases:
4.1 Health Data
4.2 GPS Data
4.3 Storage of Personal Data.
SECTION II.- Cybersecurity Global Regulation and Jurisdiction: Administrative implications of challenges posed by Cybersecurity LESSON 3: Data treatment and protection in the light of new Cybersecurity threats: I.- Supervision, inspection and disciplinary action in the hands of the Spanish Data Protection Agency. II.- Reinforcement of e-Administration in administrative procedures with citizens.
LESSON 4.- National objectives and priorities in Cybersecurity. I.- National Cybersecurity Strategy: guiding principles and lines of action. II.- National Cybersecurity Council and Cybersecurity Professional Certification.
SECTION III.- Fair Use and Ethical Hacking: Criminal Law and cibersecurity LESSON 5: General aspects of Criminal Law relating to cybersecurity (I)
LESSON 6: General aspects of Criminal Law relating to cybersecurity (II)
SECTION IV.- Labour Law and ICT. Intellectual Property LESSON 7: Labour Law and ICT. I.- Recruitment and ICT. II.- Telework. III.- Transnational e-employment
LESSON 8: The implication of new technologies in the employment contract. I.- Powers of the entrepreneur and ICT. II.- Data protection and labor relations. III.- Freedom of expression and new technologies. IV.- Typical employment pacts and new technologies. V.- Dismissal and ICT.
SECTION V.- Cybersecurity Global Regulation and Jurisdiction: International Private Law and cibersecurity LESSON 9: Legal Aspects of International Cyberlaw. 1. International sources 2. European regulations and EU Directives; 3. Spanish Private International Law
LESSON 10: Characterization and organization of the Internet: international legal perspective. 1. International dimension of the system of services of the information society . 2. Content and liability of the Internet.
SECTION VI.- Social Engineering and Psycology. Intervention Strategies LESSON 11: Social Engineering and Psycology.
LESSON 12: Intervention Strategies.

Planning
Methodologies  ::  Tests
  Class hours Hours outside the classroom Total hours
Problem solving, classroom exercises 20 50 70
 
 
Lecture 23 52 75
 
Mixed tests 5 0 5
 
(*)The information in the planning table is for guidance only and does not take into account the heterogeneity of the students.

Methodologies
Methodologies   ::  
  Description
Problem solving, classroom exercises Formulation, analysis, resolution and discussion of a problem or exercise related to the content of the subject
Lecture Exposure of the theoretical and practical contents of the subject

Personalized attention
 
Lecture
Problem solving, classroom exercises
Description
Previuos appointment with the teacher, serve to deepen the subject and clarify concepts

Assessment
  Description Qualification
Lecture Students must take a theoretical examination consisting of several questions, which combine evidence-choice, short answers and long to develop questions.

The evaluation criteria are as follows:

a) Adequacy and correction in form. the absence of misspellings, cleanliness in drafting and good presentation exam expressly valued. any abbreviation can not be accepted except for the receipt usually in the legal field.
b) Construction and legal reasoning, with legal references relate to the subject and indications of scientific and jurisprudential doctrine made in class or contained in the recommended bibliography.
c) Each question will be assessed from 0 to 10 points, the final score being the result of obtaining the average of all of them.
The practices presented may be reviewed with the anti-plagiarism software at the University of León Turnitin and if a copy thereof is detected this practice will be graded as 0.
During test development and testing practices using electronic resources (calculators, tablets, phones, computers, watches capable of storing data, or any electronic device that can help students take the exam) will not be possible except for those evidence which, under express indication of the teacher, require the use of any of these resources or prior express authorization of the teacher in exceptional and justified cases. They may not be used other jurisprudential library materials, legislative or, whatever their format (paper or electronic), except for those tests under express indication teacher require the use of any of these resources or prior express permission of the teacher in exceptional and justified cases.
If any irregularities occur during the celebration of the corresponding evaluation test will proceed to the immediate withdrawal of the examination, the student expulsion classroom and qualification as proof suspense. In any case will be addressed to the provisions of the internal regulations of the University of Leon provided in the document "Guidelines for action in cases of plagiarism, copying or fraud examination or assessment tests" (Approved Standing Committee of the Governing Council 29 / 01/2015).
60%
Problem solving, classroom exercises Continuous assessment is done through the resolution of the cases proposed in class on the dates indicated by Professor. correct approach to the solution , structure , quality, use because of language, writing, hermeneutical interpretation of the rule, critical capacity and clarity in the exhibition: in its correction the following criteria are taken into account.
Practices only be assessed continuously when the student has made ??and delivered within the deadline set by the teacher throughout the semester. They will not be , therefore, deliver later.
40%
 
Other comments and second call
<p>In second ordinary session will only be evaluable tests theoretical and practical , the examination system will be similar to the first call, with the requirements set for the first call on the use of legislation and sources of natural or technological information. Simple possession of such devices as well as notes, books , folders, or various unauthorized materials during the assessment tests will mean the immediate withdrawal of the examination, his expulsion from himself and his qualification as suspense, communicating the impact to the Academic Authority center to perform the actions envisaged in the guidelines for action in cases of Plagiarism, Fraud Copy or tests or assessment tests, approved by the Standing Committee of the Governing Council of 29 January 2015. </p>

Sources of information
Access to Recommended Bibliography in the Catalog ULE

Basic GARCÍA MIRETE , Las bases de datos electrónicas , Tirant lo blanch, 2014
DE MIGUEL ASENSIO, Derecho Privado de Internet , Aranzadi, 2015
PÉREZ BES, El Derecho de internet , Atelier, 2015
AAVV, Trabajo a distancia y teletrabajo: estudios sobre su régimen jurídico en el derecho español y comparado , Aranzadi, 2015
RALLO LOMBARTE, "Hacia un nuevo sistema de protección de datos: las claves de la reforma";, Revista de Derecho Político nº 85, UNED, 2012, , , 2012
KOCHHEIM, Cybercrime und Strafrecht in der Informations-und Kommunikationstechnik , CH Beck, 2015
CRUZ DE PABLO, Derecho penal y nuevas tecnologías. Aspectos sustantivos , Difusión Global, 2006
VALERO TORRIJO, Derecho, Innovación y Administración Electrónica, Global Law Press, 2013
RALLO LOMBARTE y GARCÍA MAHAMUT , Hacia un nuevo Derecho europeo de protección de datos: Towards a new european data protection regime, Tirant lo Blanch, 2015
VELASCO SAN MARTÍN, Jurisdicción y competencia penal en relación al acceso transfronterizo en materia de ciberdelitos, Tirant lo Blanch, 2016
DEL REY GUANTER, Relaciones laborales y nuevas tecnologías , La Ley, 2005

Given the evolving nature and cambiantede discipline, you should be special attention and care in the fact that the management of these works is made on the latest issues, in order to study on current texts. In addition to the general works mentioned , it can and should be used to abundant and excellent in legal doctrine monographs , as well as specialized periodical magazines . Teachers guide students and provide the information necessary for the treatment of different materials . Finally the management of legal texts is absolutely essential for the study and preparation of materials.

Complementary


Recommendations