Introduction to ICT law

Credits

2

Ending with:

classified evaluation

Range:

1C/14C

Semester:

winter

Teachers

About the subject

The course provides students with an introductory material to the study of legal aspects in the field of information and communication technologies. It will clarify the basic categories necessary for understanding the following topics and provide a comprehensive overview of the basic legal and technical contexts.

Target group

Bachelor's and Master's degree students in computer science, applied computer science and law programs (Ib, PLB4d, AIb, PB3d).

Learning Objectives

Graduates of the educational program will be able to:

  • understand the basic concepts and categories of information and communication technology law,
  • explain the legal aspects of liability in cyberspace,
  • orientate themselves in the issues of trusted services, electronic signature and legal effects of electronic documents,
  • identify the basic principles of personal data protection and explain the rights of data subjects,
  • clarify the legal aspects of cybersecurity and the role of CSIRT/CERT teams,
  • understand the principles of e-government and the legal framework of electronic communication with the state.

Brief course outline

  1. Information and communication technology law (introduction, concept, definition of ICT).
  2. Liability in cyberspace – liability of information society service providers. Liability of natural persons.
  3. Trusted services and electronic signature – electronic legal acts, electronic document, electronic signature, electronic seal, digital signature, certificate.
  4. Data and their protection – personal data, specific data (IP, pseudo-anonymized, biometric), basic principles, entities, rights of data subjects, processing, cross-border transfer, data retention, certification.
  5. Legal aspects of cybersecurity – cybersecurity incidents, CSIRT/CERT teams, notification, incident resolution, incident sharing.
  6. E-government – ​​concept and principle, electronic communication with the state, identification and authentication.

Assessment conditions

Ending with: classified evaluation

Final exam – analysis of information in the context of a selected case study::

The student will prepare a legal analysis (case study) and must comment on the following areas:

  1. Technical description of the service (5b)
  1. Assessment of the service as an information society service (5b)
  2. Assessment of liability exemptions under the DSA (15b)
  3. Identification of intellectual property objects (10b)
  4. Electronic contracts and terms and conditions (15b)
  5. Trusted services and their use (10b)
  6. Personal data protection – legal basis, processing principles, transparency (20b)
  7. Unlawful content and procedures for its removal (10b)
  8. Information and cybersecurity – assets, threats, vulnerabilities, incidents (10b)

 

Method of finalization of the subject: presentation of main conclusions, discussion and answers to questions.

Course methodology

Recommended literature

  • Hučková, R., Treščáková, D., Rózenfeldová, L. (2019). Právo informačných a komunikačných technológií. UPJŠ, Košice.
  • Smejkal, V. et al. (2004). Právo informačních a telekomunikačních systémů. Praha: C.H. Beck.
  • Polčák, R. (2007). Právo na internetu, spam a odpovednost ISP. Brno: Computer Press.
  • Polčák, R., Škop, M., Macek, J. (2005). Normativní systémy v kyberprostoru. Brno: Masarykova univerzita.
  • Husovec, M. (2014). Zodpovednosť na internete podľa českého a slovenského práva. CZ.NIC.