Checking date: 09/05/2022


Course: 2022/2023

Supervision, control, audit and security measures
(12208)
Study: Master in Telecommunications Law and Information Technology (299)
EPD


Coordinating teacher: SERNA BILBAO, MARIA NIEVES DE LA

Department assigned to the subject: "Pascual Madoz" Institute of Land, Urbanism and Environment

Type: Compulsory
ECTS Credits: 3.0 ECTS

Course:
Semester:




Requirements (Subjects that are assumed to be known)
Those required by the master program
Objectives
The objectives pursued with the development of this subject are the following: -Develop skills and abilities to choose the correct strategy for the defense of the rights of users and those affected by an incorrect use of their personal data. -Acquire basic capacity to identify situations in which fundamental rights of citizens in this sector may be found to be particularly compromised, and in particular, adopt preventive measures to avoid the possible violation of those rights. -Know and become basically familiar with the techniques of planning, organizing and conducting audits in the field of data protection as well as identifying what measures should be taken to improve the detected dysfunctions. -Be able to train people in the areas of data protection and prepare guides or documents necessary for this purpose. -Analyze, plan, evaluate and control the risks derived from not complying with the data protection regulations and propose basic solutions in this regard -Know how to identify the provision and organization requirements that are decisive for legal advice on data protection. -Work with ISO standards related to the subject -Knowledge of essential documents, jurisprudence and bibliography on this matter -Search and management of official websites related to this matter AEPD, INCIBE, ETC.
Skills and learning outcomes
Description of contents: programme
II . Monitoring , control, audit and security measures ( 3 ECTS ) 1. The security measures regarding data protection. 2. Monitoring and Control on Data Protection . 3. Cybersecurity 4. Casos prácticos 5.Evaluation
Learning activities and methodology
FORMATION ACTIVITIES Theoretical-practical classes. Search for training materials, such as jurisprudence, resolutions, etc. and comprehension and exposition works Individual or group work of the student, presentation, defense, etc. It is important that students participate actively in the sessions. Being a master in person, attendance at the classes will be essential to qualify the student. The attendance determined in the regulation of the Master and in GLOBAL AULA must be met to be evaluated. . TEACHING METHODOLOGIES The methodology that will be followed in this subject will be the following: Exhibitions in class of the different professors with support of computer and audiovisual media, in which the main concepts of the subject are developed and the bibliography is provided to complement the students' learning. Critical reading of texts recommended by the professor of the subject: Press articles, reports, resolutions, manuals and / or academic articles, either for further discussion in class, or to expand and consolidate the knowledge of the subject Resolution of practical cases, problems, etc. raised by the teacher individually or in groups Exhibition and discussion in class, under the teacher's moderation, of topics related to the content of the subject, such as jurisprudence, legislation, resolutions, etc. Preparation of papers and reports individually or in groups, with information search by the student TUTORIALS: Students will have access to tutorials with the person responsible for the coordination of the subject. The purpose of tutoring is to organize the teaching and learning processes based on the interaction between the student and the teacher with the purpose of: (i) Direct the students' autonomous and group work (ii) Deepen in different aspects of the subject (iii) Guide the academic and integral formation of the student. The tutorials will be held at the time and under the conditions determined by the teacher in Aula Global. If new extraordinary measures are adopted that require distance teaching, it will continue to be taught under the same conditions initially foreseen (with the same programming, methodology, activities, etc.), although all practical sessions will be taught online .
Assessment System
  • % end-of-term-examination 50
  • % of continuous assessment (assigments, laboratory, practicals...) 50
Calendar of Continuous assessment
Basic Bibliography
  • Fundación Telefónica. Ciberseguridad , la protección de la información en un mundo digital. edit. Ariel. 2016 ISBN:9788408163046
  • GALÁN PASCUAL, C. La certificación como mecanismo de control de la inteligencia artificial en Europa¿. Instituto Español de Estudios Estratégicos ¿ . Instituto Español de Estudios Estratégicos ¿ Ministerio de Defensa . Mayo, 2019
  • GALÁN PASCUAL, C.. ¿El Derecho a la Ciberseguridad¿, en Derechos Digitales de los ciudadanos. Coords. Tomás de la Quadra Salcedo y José Luis Piñar Mañas. (BOE, 2018). 2018
  • GALÁN PASCUAL, C.. ¿Amenazas híbridas: nuevas herramientas para viejas aspiraciones¿. Real Instituto Elcano (Diciembre, 2018). Diciembre, 2018)
  • GALÁN PASCUAL, C.. Guía de Seguridad de las TIC - CCN-STIC 801 ENS: Responsabilidades y Funciones.¿. Centro Criptológico Nacional ¿ Centro Nacional de Inteligencia - Ministerio de Defensa . (Marzo, 2019)
  • GALÁN PASCUAL, C.. ¿Un libro blanco para la cooperación público-privada en ciberseguridad¿. . Real Instituto Elcano (Junio, 2019). (Junio, 2019)
  • Lacasta, Ramón; Sanmartí, Ermengol; Velasco Dobaño, Jordi. Auditoría de la protección de datos. Editorial Bosch, S.A.. 2009
  • Marzo Portera, Ana; Macho-Quevedo Pérez-Victoria, Aleja . La auditoría de seguridad en la protección de datos de carácter personal. edit. Experiencia S.L. . 2009
  • Miguel Pérez, Julio César. Miguel Pérez, Julio César; Protección de datos y seguridad de la información. Edit. RAMA, 2015 ISBN:9788499645605. 2015 ISBN:9788499645605
  • Segura Serrano, Antonio; Gordo García, Fernando . Ciberseguridad global oportunidades y compromisos en el uso del ciberespacio. Editorial Universidad de Granada . 2014 ISBN:9788433856005
  • VVAA. Comentario al Reglamento General de Protección de Datos y a la Ley Orgánica de Protección de Datos personales y Garantía de los Derechos Digitales. Civitas, 2021, ISBN: 978-84-9197-927-2. 2021
Recursos electrónicosElectronic Resources *
Additional Bibliography
  • PUYOL MONTERO, J. Libro de Test Delegado de Protección de Datos (DPO). Tirant Lo Blanch. 2016
  • TOURIÑO A . Derecho digital: De la protección de datos a la ciberseguridad. The Valley, Digital Business School.. 2018
  • Velasco Núñez, Eloy. Delitos cometidos a través de internet. Cuestiones procesales. Ed. La Ley. 2010
(*) Access to some electronic resources may be restricted to members of the university community and require validation through Campus Global. If you try to connect from outside of the University you will need to set up a VPN


The course syllabus may change due academic events or other reasons.


More information: https://www.uc3m.es/master/derecho-telecomunicaciones