Lecturer(s)
|
-
Melotíková Petra, Mgr. Ph.D.
-
Frumarová Kateřina, doc. JUDr. Ph.D.
-
Tomoszek Maxim, JUDr. Ph.D.
-
Ščerba Filip, doc. JUDr. Ph.D.
-
Červínek Zdeněk, JUDr. Ph.D.
|
Course content
|
1. Digitalisation of public administration 2. Open data 3. Protection of personal data 4. Protection against misinformation 5. Digital infrastructure management / infrastructure access restrictions 6. Digitisation of administrative proceedings and proceedings before administrative courts
|
Learning activities and teaching methods
|
Monologic Lecture(Interpretation, Training), Dialogic Lecture (Discussion, Dialog, Brainstorming)
|
Learning outcomes
|
Public Law and Digital Technologies 4 concludes the course on public regulation of digital technologies by focusing on issues of cyber security and crime. In this course, students will be introduced to legal issues related to the security risks associated with the use (or misuse) of digital technologies. Attention will first be given to the topic of cybersecurity and the relationship between the state and the individual in this area, including with respect to the use of digital technologies by state security forces. The second part of the course will focus on cybercrime and specific segments of crime (economic, information), where digital technologies are intensively used and where their legal regulation can represent an important preventive tool. Students will examine the existing legal regulation in the field of cyber security and cybercrime and will evaluate it in terms of fulfilling the basic principles of digital technology regulation and in terms of the degree of achievement of the pursued public interests, but also in terms of its effectiveness and its implementation by security forces. The course will also lead students to develop competencies such as critical thinking, problem solving, information literacy, research and analysis, written and oral communication, and global learning so that they can independently identify and solve problems arising from continuous technical innovation through creative approaches based on high expertise. The course will also respond flexibly to rapid developments in the field and offer students analysis and discussion of current challenges and trends. Within each topic, students will analyse practical issues arising in the application of cyber security and cybercrime legislation and their impact on different regulated areas of human activity. The teaching in this course will be divided into 6 seminars, which will be devoted to the following main topics: 1. Cybersecurity - State and Individual 2. The use of digital technologies by the security forces of the state 3. Cybercrime - economic 4. Cybercrime - information 5. Cybercrime - other 6. Digital technologies in the criminal process By completing this course, students will gain knowledge of the criminal and security framework of digital technology regulation, be able to define the basic principles, distinguish the basic tools of regulation, identify threats and find solutions for specific cases. In addition, they will acquire the skill of analytical work with legislation, case law and policy documents. Evaluation To successfully complete the course, students will be required to complete the following learning requirements: - drafting, submitting and presenting two essays on seminar topics. - active participation in the class.
By completing this course, students will gain knowledge of the proper legal framework for the regulation of digital technologies, be able to define the basic principles, distinguish the basic tools of regulation, identify problems and find solutions for specific cases. In addition, they will acquire the skill of analytical work with legislation, case law and policy documents.
|
Prerequisites
|
Completion of this course is conditional upon completion of the course Legal Theory of Information Technology 1 a 2 Information Technology for Law and Legal Science 1 a 2 Public Law and Digital Technologies 1 a 2
VPK/LPUT1 and VPK/LPUT2 and VPK/LPUT3 and MEP/LLTT1 and MEP/LLTT2 and MEP/LIT1 and MEP/LIT2
|
Assessment methods and criteria
|
Student performance
Active participation of the student in seminars, preparation of a semester project and its oral defense are required. Full-time students must attend at least 80% of the seminars, while combined students must attend 50% of the seminars and one individual consultation.
|
Recommended literature
|
-
BLANCO DE MORAIS, C., FERREIRA MANDES, G., VESTING, T. (eds.). (2022). The Rule of Law in Cyberspace. Springer International Publishing.
-
CUSTERS, B., FOSCH-VILLARONGA, E. (eds.). (2023). Law and Artificial Intelligence: Regulating AI and Applying AI in Legal Practice. T.M.C.. Asser Press.
-
MILAKOVICH, M., E. (2021). Digital Governance: Applying Advanced Technologies to Improve Public Service. Routledge.
-
SANDOVAL-ALMAZÁN, R., LUNA-REYES, L., F., LUNA-REYES, D., E., GIL-GARCIA, J., R., PURON-CID, G., PICAZO-VELA, S. (2017). Building Digital Government Strategies: Principles and Practices. Springer International Publishing.
-
SORGE, C., BORGES, G. (eds.). (2022). Law and Technology in a Global Digital Society: Autonomous Systems, Big Data, IT Security and Legal Tech. Springer International Publishing.
-
TAN, E., CROMPVOETS, J. (eds.). (2022). The new digital era governance. How new digital technologies are shaping public governance. Wageningen Academic.
|