Skip to main content

ISLA IPGT 25032

Personal Data Protection

Cybersecurity
  • ApresentaçãoPresentation
    The aim of this course is to make students aware of the importance of privacy and data protection in the digital sphere, providing them with the necessary knowledge to guarantee the data security of infrastructures and applications throughout their life cycle. As a legal requirement, students will review the legal recommendations imposed under the General Data Protection Regulation (GDPR).
  • ProgramaProgramme
    1 INTRODUCTION Critical scenarios for data protection Data protection in emerging technologies Collection and transfer of information 2. EVALUATION OF DATA, SYSTEMS AND PROCESSES Mapping and classifying data in organizational information systems. Technological standards for safeguarding information (datacenters, physical access, data destruction and sanitization, forensic devices). Due diligence and technological risk assessment in mergers, acquisitions and disposals 3. INFORMATION SECURITY PROTECTION AND PRACTICES Data protection in the Internet of Things Privacy by design and omission 4. RESPONDING TO PRIVACY INCIDENTS Form processing in data access, repair, correction and integrity management Legal compliance in digital response Implementing a data breach incident response plan
  • ObjectivosObjectives
    - Raise awareness of the importance of privacy and protection of personal data across the entire digital spectrum of the business chain. - Recommend technology that guarantees adequate security to comply with legal compliance applicable to the various types of data. - Recognize the potential and limitations of the technology to be developed and implemented in a privacy program to lead to data evaluation. - Implement a privacy incident response plan.
  • BibliografiaBibliography
    Leenes,R. , van Brakel,R. , Gutwirth,S. , Hert, P. (2018). Data Protection and Privacy: The Internet of Bodies. United Kingdom: Hart Publishing. Stalla-Bourdillon, S., Phillips, J., & Ryan, M. D. (2014). Privacy vs security. (Springer Briefs in Cybersecurity). London, GB: Springer  
  • MetodologiaMethodology
    This curricular unit include theoretical sessions, guided discussions and practical sessions for demonstration of thematic cases. ¿ In theoretical sessions we'll use the expository method. ¿ Targeted discussions will focus on case studies. ¿ Practical sessions include the resolution of practical cases to enable the skills acquired to be validated  
  • LínguaLanguage
    Português
  • TipoType
    Anual
  • ECTS
    1
  • NaturezaNature
    Mandatory
  • EstágioInternship
    Não