Checking date: 08/05/2025 22:47:09


Course: 2025/2026

Legal regime of cybersecurity and cybercrime
(20310)
Master in Telecommunications Law and Information Technology (Plan: 314 - Estudio: 299)
EPD


Coordinating teacher: VIDA FERNANDEZ, JOSE

Department assigned to the subject: Pascual Madoz Institute of Land, Urbanism and Environment

Type: Compulsory
ECTS Credits: 3.0 ECTS

Course:
Semester:




Requirements (Subjects that are assumed to be known)
Fundamentals of telecommunications law Institutions of the telecommunications law
Objectives
GENERAL OBJECTIVES - To be able to identify, understand, and apply in practice the essential principles governing the field of cybersecurity. - To develop the capacity to interpret the legal and organisational framework applicable to cybersecurity. - To analyse, plan, evaluate, and manage the risks arising from non-compliance with cybersecurity regulations. - To identify the public bodies and authorities involved in this field, including their competences, actions, and decisions. - To identify and understand the roles of the different stakeholders operating within the sector, along with their rights and obligations. - To recognise the organisational and service provision requirements relevant to legal advice in the field of cybersecurity. - To interpret, analyse, and assess the regulatory framework governing cybersecurity in order to provide general legal advice. - To develop critical analysis skills of legal texts to enable their accurate interpretation and, where appropriate, application in the context of the Master¿s programme. SPECIFIC OBJECTIVES - To identify and understand the purpose, structure, and scope of the cybersecurity sector. - To acquire knowledge of the main policy initiatives in cybersecurity at the international, European, and national levels. - To develop the ability to advise on key areas of cybersecurity regulation, including digital service providers and critical infrastructure. - To design and coordinate a security compliance plan in both public and private sector contexts. - To provide legal defence and advice in matters relating to the interception of electronic communications. - To understand and address the criminal implications arising from the use of information technologies.
Learning Outcomes
Description of contents: programme
1. Cybersecurity: Strategies, Plans and Risk Management 1.1. General aspects of cybersecurity: mission and effective governance of information security. 1.2. The institutional framework for cybersecurity. 1.3. Security policy for information services and telecommunications networks: the European and National Cybersecurity Strategies. 1.4. Security of network and information systems (NIS Directive): essential service operators and digital service providers. 1.5. Protection of information systems in Critical Infrastructures. 1.6. Cybersecurity in Public Administrations: the National Security Framework. 2. Compliance and Practice in Cybersecurity 2.1. An introduction to cybersecurity audits: public and private sectors. 2.2. Cybersecurity in Public Administrations: auditing public security systems. 2.3. Cybersecurity compliance in the private sector: obligations and liability. 2.4. The role of legal experts in the cybersecurity market. 2.5. ¿Master Security Plans¿ and the importance of having a robust cybersecurity strategy. 2.6. Management of cybersecurity risks in the supply chain. 2.7. Quantum technologies: applications and challenges for cybersecurity. 3. Security and Privacy in Information Systems and Telecommunications Networks 3.1. Basic concepts of security in information systems and telecommunications networks: technical aspects, actors, and dimensions of action. 3.2. Secrecy, integrity and security of networks and services provided by electronic communications operators under the General Telecommunications Act. 3.3. Cybersecurity measures for telecommunications networks and services. 3.4. Privacy and confidentiality in electronic communications services (ePrivacy Regulation). 4. Criminal Law: Cybercrime and Technology-Driven Offences 4.1. Criminal Law: cybercrime and offences committed through the use of ICTs (I). 4.2. Criminal Law: cybercrime and offences committed through the use of ICTs (II).
Learning activities and methodology
LEARNING ACTIVITIES - Theoretical-practical classes. - Research of training materials, such as case law, rulings, etc., and work involving understanding and presenting them. - Individual student work, presentations, oral defenses, etc. - Resolution of practical cases. Active student participation in sessions is important. As this is an in-person master¿s program, class attendance is essential for student assessment. Students must comply with the attendance requirements set out in the academic regulations of the Master¿s Program and in AULA GLOBAL in order to be evaluated. TEACHING METHODOLOGY The teaching methodology for this subject will include: Lectures delivered by various instructors using digital and audiovisual tools, in which the core concepts of the subject are presented and bibliographic references are provided to support student learning. Critical reading of texts recommended by the course instructor: press articles, reports, rulings, textbooks and/or academic articles, either for later class discussion or to broaden and consolidate understanding of the subject. Resolution of practical cases, problems, etc., proposed by the instructor, individually or in groups. Class presentations and discussions, moderated by the instructor, on topics related to the subject, such as case law, legislation, rulings, etc. Preparation of individual or group papers and reports, including information research by the student. TUTORING SESSIONS Students will have access to tutoring sessions with the person responsible for coordinating the subject. These sessions aim to guide the teaching and learning process based on student-teacher interaction with the purpose of: (i) Guiding the student¿s independent and group work. (ii) Exploring various aspects of the subject in greater depth. (iii) Supporting the student¿s academic and personal development. Tutoring sessions will take place at the time and under the conditions set by the instructor on Aula Global.
Assessment System
  • % end-of-term-examination 50
  • % of continuous assessment (assigments, laboratory, practicals...) 50

Calendar of Continuous assessment


Basic Bibliography
  • Christian Conal. Ciberseguridad y Derecho penal, Aranzadi . Aranzadi. 2023
  • María Angeles Rueda Martín; Carlos María Romeo Casabona. : Derecho penal, ciberseguridad, ciberdelitos e Inteligencia Artificial - Volumen I: Ciberseguridad y ciberdelitos. Comares. 2023
  • María Angeles Rueda Martín; Carlos María Romeo Casabona. Derecho penal, ciberseguridad, ciberdelitos e Inteligencia Artificial - Volumen II: Inteligencia Artificial y responsabilidad penal. Comares. 2023
  • Miguel Ortego Ruiz. Manual de privacidad, protección de datos y ciberseguridad. Tirant lo Blach. 2024
Recursos electrónicosElectronic Resources *
(*) Access to some electronic resources may be restricted to members of the university community and require validation through Campus Global. If you try to connect from outside of the University you will need to set up a VPN


The course syllabus may change due academic events or other reasons.