.
Information Society Rights
Study Course Description
Course Description Statuss:Approved
Course Description Version:11.00
Study Course Accepted:02.02.2024 12:29:03
Study Course Information | |||||||||
Course Code: | JF_392 | LQF level: | Level 7 | ||||||
Credit Points: | 2.00 | ECTS: | 3.00 | ||||||
Branch of Science: | Law; Theory and History of Rights | Target Audience: | Juridical Science | ||||||
Study Course Supervisor | |||||||||
Course Supervisor: | Uldis Ķinis | ||||||||
Study Course Implementer | |||||||||
Structural Unit: | Faculty of Social Sciences | ||||||||
The Head of Structural Unit: | |||||||||
Contacts: | Dzirciema street 16, Rīga, szfrsu[pnkts]lv | ||||||||
Study Course Planning | |||||||||
Full-Time - Semester No.1 | |||||||||
Lectures (count) | 6 | Lecture Length (academic hours) | 2 | Total Contact Hours of Lectures | 12 | ||||
Classes (count) | 6 | Class Length (academic hours) | 2 | Total Contact Hours of Classes | 12 | ||||
Total Contact Hours | 24 | ||||||||
Part-Time - Semester No.1 | |||||||||
Lectures (count) | 4 | Lecture Length (academic hours) | 2 | Total Contact Hours of Lectures | 8 | ||||
Classes (count) | 2 | Class Length (academic hours) | 2 | Total Contact Hours of Classes | 4 | ||||
Total Contact Hours | 12 | ||||||||
Study course description | |||||||||
Preliminary Knowledge: | For the Professional Master's program – students' require knowledge in the general theory of law, philosophy of law, logic. Students should also have knowledge in constitutional, civil, criminal, administrative, administrative procedural law, and legal methodology. Academic Master students – require an understanding of the law and have the ability for logical and critical thinking. | ||||||||
Objective: | We live in an information society. It is a knowledge-based society where information technology plays a key role in ensuring the rule of law and human rights. The main goal of this course is to develop digital literacy for lawyers. Digital literacy includes not only technical and legal knowledge of technology, but also critical thinking, teamwork, case law studies, and other qualities specified in para 5.5 of the 2020 Jurist Professional Standard. Students will get knowledge about the problems of cyberspace regulation, sources of cyber law, open data, and their application in the legal field understanding how information technologies (artificial intelligence, robotics, big data, block chains, virtual reality, etc.) can affect rule of law and cybersecurity and will learn how to resolve those legal challenges. | ||||||||
Topic Layout (Full-Time) | |||||||||
No. | Topic | Type of Implementation | Number | Venue | |||||
1 | The legal concept of information society. IT and legal system similarities and differences. Regulation on cyberspace and information services. | Lectures | 1.00 | auditorium | |||||
2 | Code – regulator in cyberspace. Legal assessment of programmers error and software bugs. | Lectures | 1.00 | auditorium | |||||
3 | Problem based case law study. | Classes | 2.00 | auditorium | |||||
4 | Protection of human rights and democratic values in cyberspace. | Lectures | 1.00 | auditorium | |||||
5 | Lawyer and technology. Reg Tech, Leg tech. E- public services – algorithm based legal regulation. Lawyer's participation in making of the algorithm. | Lectures | 1.00 | auditorium | |||||
6 | Team work – Case law study. | Classes | 2.00 | auditorium | |||||
7 | Concept and features of cybersecurity. Definition of a legally protected interest in cyberspace. Regulation of critical information infrastructure in the EU and Latvia. | Lectures | 1.00 | auditorium | |||||
8 | Case law study. | Classes | 1.00 | auditorium | |||||
9 | Concept of cybercrime, categories, jurisdiction. | Lectures | 1.00 | auditorium | |||||
10 | Cybercrime – case law study. | Classes | 1.00 | auditorium | |||||
Topic Layout (Part-Time) | |||||||||
No. | Topic | Type of Implementation | Number | Venue | |||||
1 | The legal concept of information society. IT and legal system similarities and differences. Regulation on cyberspace and information services. | Lectures | 0.50 | auditorium | |||||
2 | Code – regulator in cyberspace. Legal assessment of programmers error and software bugs. | Lectures | 0.50 | auditorium | |||||
3 | Problem based case law study. | Classes | 0.50 | auditorium | |||||
4 | Protection of human rights and democratic values in cyberspace. | Lectures | 0.50 | auditorium | |||||
5 | Lawyer and technology. Reg Tech, Leg tech. E- public services – algorithm based legal regulation. Lawyer's participation in making of the algorithm. | Lectures | 0.50 | auditorium | |||||
6 | Team work – Case law study. | Classes | 0.50 | auditorium | |||||
7 | Concept and features of cybersecurity. Definition of a legally protected interest in cyberspace. Regulation of critical information infrastructure in the EU and Latvia. | Lectures | 1.00 | auditorium | |||||
8 | Case law study. | Classes | 0.50 | auditorium | |||||
9 | Concept of cybercrime, categories, jurisdiction. | Lectures | 1.00 | auditorium | |||||
10 | Cybercrime – case law study. | Classes | 0.50 | auditorium | |||||
Assessment | |||||||||
Unaided Work: | The student has to come up with a legal problem or event and prepare a detailed text for a legal case study (5 - 7 pp, word count 1000 – 1400, TNR, Word Regular 12, 1,5 space). | ||||||||
Assessment Criteria: | The final grade will consist of the sum of all percentage estimates obtained during the course. Knowledge be assessed in percentage (1 – 100%) and the final evaluation will be converted to grades (1 – 10): overall score for participation and answer quality in workshops – 20%; tests – 10%; case study – 15%; The assessment of the report consists of average percentage (in the scale form 1 – 100%) of the sum of lecturer's assessment + 2 student's peer reviews. the quality of the review is assessed by the lecturer – 5%; assesment of the examination – 50%. | ||||||||
Final Examination (Full-Time): | Exam (Written) | ||||||||
Final Examination (Part-Time): | Exam (Written) | ||||||||
Learning Outcomes | |||||||||
Knowledge: | Students will gain knowledge about the peculiarities of the application of the law in the information society, including the evaluation of legal and factual conditions caused by the operation of information technology; further development of law and application of analogy in the field of technology; identification and use of independent and auxiliary sources of information society law; preparation of legal documents on issues related to the legal aspects of the use of the e-environment. | ||||||||
Skills: | Students will obtain the skills required to a lawyer, including, ability to assess legal issues related to the e-environment, including the assessment of legal consequences, skills further law development in the e-environment, skills mentioned in the professional standard of the lawyer. | ||||||||
Competencies: | Students must be able to integrate the knowledge gained in the course in different areas of law. The student must be able to provide legal assistance to a person in cases where the legal relationship is related to the use of the e-environment, regardless of the field of law in which the legal consequences have occurred. The student must be able to prepare the necessary legal documents, be able to select and apply the necessary legal norm, etc. competencies specified in the standard of the legal profession. The competencies acquired as a result of the course must promote the student's research activities and understanding of ethical responsibility. | ||||||||
Bibliography | |||||||||
No. | Reference | ||||||||
Required Reading | |||||||||
1 | Latvijas Republikas Satversme | ||||||||
2 | Informācijas tehnoloģiju drošības likums | ||||||||
3 | Krimināllikums 132-1, 145, 150, 177-1, 241- 244. pants. | ||||||||
4 | Valsts informācijas sistēmu likums | ||||||||
5 | Informācijas atklātības likums. | ||||||||
6 | Nacionālās drošības likums// http://www.likumi.lv/doc.php?id=14011likumi.lv | ||||||||
7 | 2015. gada 28. 07. Ministru kabineta noteikumi Nr. 442 "Kārtība, kādā tiek nodrošināta informācijas un komunikācijas tehnoloģiju sistēmu atbilstība minimālajām drošības prasībām" | ||||||||
8 | Latvijas kiberdrošības stratēģija | ||||||||
9 | D. Šmite, D. Dosbergs, J. Borzovs Informācijas un komunikācijas tehnoloģijas nozares tiesību un standartu pamati. Rīga, LU Akadēmiskais apgāds, 2005. 11- 17. | ||||||||
10 | History lessons for a general theory of law and technology by Gregory N. Mandel | ||||||||
11 | Cyberspace and law of the horse F.H. Easterbrook, 1996 | ||||||||
12 | Why have a theory of law and technological change L.B. Moses | ||||||||
13 | Informācijas un komunikāciju tiesības I.d. Autoru kolektīvs U. Ķiņa vadībā. Rīga, Turība, 2002. 66-75, 89-120, 112- 135 lpp. | ||||||||
14 | U. Ķinis „Valsts informācijas sistēmu krimināltiesiskā aizsardzība”. Jurista vārds, 2011.gada septembris. | ||||||||
15 | Declaration of Principles Building the Information Society: a global challenge in the new Millennium | ||||||||
16 | U. Ķinis Kibernoziedzība, kibernoziegumi un Jurisdikcija i. Rīga, Jumava, 2015. 69-80; 121-149; 270-301 | ||||||||
17 | Saeimas, MK datu bāzes, politikas dokumentu datu bāze, RSU bibliotēkā tiešsaistē abonējamās d/b u.c. | ||||||||
18 | L. Lessig Code version 2.0. 2006 CC (Creative commons) 1-9;38- 83. | ||||||||
19 | Raagna I. Protecting the right to respect for private and family life under European Convention on Human rights. Council of Europe Human Rights handbooks. | ||||||||
20 | U. Ķinis ,I. Gudele Informācijas sistēmu drošība. Informācijas un komunikāciju tiesības II.d. Autoru kolektīvs U. Ķiņa vadībā. Rīga, Turība, 2002. 200-220 lpp. | ||||||||
21 | Jebkuri citi avoti par seminārā apspriežamiem jautājumiem. http://hudoc.echr.coe.int/sites/eng/pages/search.aspx?i=001…{"itemid":["001-117513"]} | ||||||||
Additional Reading | |||||||||
1 | ECT lietas, piem , Frederik NeIJ and Sunde Kolmisippi, 2013.gada februāra spriedums, | ||||||||
2 | Rumbles W. Theft of the digital: can you steal virtual property?// http://www.laws.canterbury.ac.nz/documents/17_2_354_374.pdf | ||||||||
3 | U. Ķinis Noziedzīgi nodarījumi datortīklos- kibernoziegumi, TNA, 2000. | ||||||||
4 | Ķinis U. Kibernoziegumi, Turība, 2007. | ||||||||
5 | Article 8: The right to respect for private and family life, home and correspondence. Human Right review 2012// http://www.equalityhumanrights.com/uploaded_files/humanrigh… | ||||||||
6 | Erlank W. The legal acceptance of virtual property// http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1591384 | ||||||||
7 | The EU-US Privacy Collision: a turn to institutions and procedures By Swartz P.M. Harward law review. Vol. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2290261 | ||||||||
8 | A. Murrey Looking Back at the Law of the Horse: Why Cyberlaw and the Rule of Law are Important | ||||||||
9 | Human rights in the digital age | ||||||||
10 | Robolaw Guidelines and regulations for robotics | ||||||||
11 | EU Commission Ethics guidelines for truthworthy AI |