Show/hide contentOpenClose All
Curricular information is subject to change
By the end of this module students will be able to:
* Identify the most important legal rules constraining and guiding the actions of persons involved in Information Technology security and forensics;
* Evaluate the effect which those rules may have on such persons and on IT security and forensics generally;
* Analyse factual scenarios, determine the legal issues presented and apply those rules to evaluate the legal effects of certain courses of action.
Student Effort Type | Hours |
---|---|
Lectures | 24 |
Autonomous Student Learning | 226 |
Total | 250 |
Not applicable to this module.
Description | % of Final Grade | Timing |
---|---|---|
Assignment: End of semester take home exam, 5 day time limit (time limit may vary), 2,500 words | 50 |
Coursework (End of Trimester) |
Assignment: Assignment 1 - Privacy related issues - Word Limit 1000 words | 20 |
Varies over the Trimester |
Assignment: Assignment 2 - Litigation related issues - Word Limit 1000 words | 20 |
Varies over the Trimester |
Continuous Assessment: Forum Discussion | 10 |
Varies over the Trimester |
Compensation
This module is not passable by compensation
Resit Opportunities
In-semester assessment
Remediation
If you fail this module you may repeat, resit or substitute where permissible
Name | Role |
---|---|
Assoc Professor Pavel Gladyshev | Lecturer / Co-Lecturer |
Dr Babak Habibnia | Tutor |