This translation is for information purposes only. In the event of discrepancies, the Swedish-language version takes precedence.
Privacy, law, policy, and compliance in cybersecurity, 7.5 Higher education credits
Sekretess, lag, policy och efterlevnad inom cybersäkerhet, 7,5 Högskolepoäng
Established: 2023-05-02
Established by: Department of Engineering Science
Applies from: H23
Learning outcomes
After completing the course, the student should be able to: Knowledge and understanding:
- recognize and explain major legal aspects of data privacy and cybersecurity on private entities as well as for governmental agencies.
- identify and interpret the concept of cybersecurity policy and understand the role of security policy within an organization.
- show understanding for the principal differences between industrial standards, international standards, national standards, regulatory directives, legal regulations, and national legislation.
- explain why complying with major legal and regulatory frameworks is a critical step for data privacy and for preventing cyber incidents.
Competence and skills:
- suggest effective mechanisms to respond to queries related to real or perceived cybersecurity risks such as ransom ware, and social engineering.
- discuss and argue compliance and legal issues that may arise when a change in technical solutions or services is introduced on other national markets.
- interpret cybersecurity policy results.
Judgement and approach:
- critically reflect on social and ethical aspects related to privacy.
- take responsibility for one's knowledge development.
Entry requirements
General entry requirements and approved result from the following course/courses:
SFC600-Cyber-physical Systems Security and
PFC600-Principles of cybersecurity or the equivalent.
The forms of assessment of student performance
Individual written exam. Project with written report and oral presentation in group.
Course contents
This course provides an overview of laws and ethical issues related to cybersecurity. The course also identifies policies, rules, and procedures that ensure connected devices and networks meet an acceptable level of security based on emerging frameworks for cybersecurity.
Other regulations
Course grading: F/Fx/E/D/C/B/A - Insufficient, Insufficient- more work required before the credit can be awarded, Sufficient, Satisfactory, Good, Very Good, Excellent
Course language: The teaching is conducted in English.
General rules pertaining to examination at University West are available at www.hv.se.
If the student has a decision/recommendation on special support due to disability, the examiner has the right to examine the student in a customized examination form.
Cycle
Second cycle
Progressive specialization
A1F - second cycle, has second-cycle course/s as entry requirements
Main field of study
Computer Engineering, Computer Engineering