Identificació

                    

            

Master in Technology and Privacy (ON LINE)

Enrol
Imprimir

Key information

Edition: Tercera
Hours: 1500.00
Language: English
Start date: 20/10/2017
End date: 20/08/2018
Credits: 60.00 ECTS
Number of places: 24
Code: 17OHM0022
Open enrollment

Price: 2.840,00€
Price:
Timetable: ON LINE
Venue: ON LINE

PRESENTATION

This master’s degree is the result of several conversations held in recent years between practitioners and academics in the field of surveillance studies, all of whom highlighted the lack of available training in order to fill academic or technical positions in the field of privacy and data security.

In the realm of privacy and data protection, the emergence of a European Data Protection framework and the rapid growth of IT-enabled data surveillance and mining mean that privacy management is increasingly professionalised. Chief privacy officers, privacy managers and technologists are now commonplace across the public and private sectors. Privacy policies remain unevenly implemented, and there is a growing need and high demand for analysts and practitioners at the intersection of privacy and technology.

The current development of privacy-related policies (data protection, tapping communications, etc.) means that the privacy management of organisations is becoming increasingly important. The purpose of this master is  to meet the growing need to train professionals devoted to privacy management matters in order to fill the positions created to fulfil the regulations in this field. Specifically, the Master’s Degree in Technology and Privacy aims to  meet the need arising from the proposed new 2015 European Data Protection Directive, which will make it compulsory for all companies with over 250 employees and all public bodies to have a Data Privacy Officer (DPO).

This master is therefore conceived as a qualification that will meet the existing short-term demands and long-term demands, given that demand will increase exponentially in the next few years.

OBJECTIVES

This course is intended for those aiming to build or enhance their careers in the field of technology consultancy related to privacy matters. The main goals are:

– To train students to confidently tackle tasks in the field of privacy management and data protection, always linked to technological advances.

– To transfer the knowledge accumulated through collective work among academics and professionals in the fields of technology, law and policy.

– To train professionals in the field of privacy capable of designing and evaluating policies intended to protect the private sphere.

The specific aims include:

– To provide a full understanding of the social, ethical, legal and technological consequences of surveillance with special focus on the technical impact in terms of issues such as trust, proportionality and information access.

– To foster the skills to design privacy policies in a creative and analytical manner.

–To teach students how to identify key problems that threaten privacy and the stakeholders involved, and to evaluate the impact of policies.

– To develop the capacity to understand the basic elements of data protection measures, such as resistance to surveillance or privacy-enhancing tools.

– To give students a grounding in key concepts for the implementation of non-invasive technologies, such as Privacy by Design (PbD) or Privacy-enhancing technologies (PETs).

The master’s degree also addresses the sociological, political, legal and ethical context in which privacy protection policies and technologies are developed.

 

AIMED AT

This course is aimed at professionals, students or scholars interested in the field of technology consultancy related to privacy issues.

ADMISSION

– Applications from candidates with backgrounds in criminology, law, sociology, computer science, economics, and political science.

– Candidates who have completed the first cycle of a degree can also apply; however approval of the Master’s Coordination Committee is required.

Note: students who do not hold a previous university qualification will be entitled to obtain, under the same conditions, a certificate of attendance issued by the University of Girona Foundation: Innovation and Training.



PROGRAMME

1. Privacy and surveillance concepts I

The relationship between privacy, surveillance and data protection. History and Sociology of surveillance: the Panoptic and beyond. Surveillance dimensions (institutional, corporate, interpersonal). Social relations and values under surveillance. Resistance strategies: sousveillance and counterveillance. Privacy, security and transparency. Privacy Advocacy.

2. Design of secure Systems

Technological audit: software, hardware and networks. Threat detection and modelling. Cryptography, anonymity and re-identification. Secure storage and authentication management. Translating societal concerns into technological solutions.

3. Privacy and surveillance concepts II

Digital identification technologies and Dataveillance. Identification practices and techno-social relations (STS). The economics of privacy. Technology and surveillance risks (function creep, disclosure, discrimination, etc.). The surveillance industry: actors and experts.

4. Tools and sectors I

This module provides a sectoral approach to privacy issues, through the lens of law enforcement, health, smart cities, banking, and more. Examining privacy in these contexts, with an empirical focus, the module also discusses ‘data tools’. These tools are modes through which data is collected, treated, or through which the results of data treatments are applied. These include biometrics, databases, algorithms, and drones. By the end of this module, students will have a strong grasp of the landscape of privacy-invasive and privacy-enhancing tools. Metadata. Behavioral marketing. Bio-metrics. Geo-location. Gamification. Algorithms. Data Brokers. Sensitive Data. Education.

5. Law, policy, and Technology

The fundamentals of privacy law and policy. Data protection principles and data subjects’ rights. Who does what: privacy professionals, managers, and technologists. DPAs: competences, possibilities, limitations. Tapping, hacking and controversies (NSA, etc.). The transatlantic debate. Limitations, problems and new technological developments.

6. Tools and sectors II

This module provides a sectoral approach to privacy issues, through the lens of law enforcement, health, smart cities, banking, and more. Examining privacy in these contexts, with an empirical focus, the module also discusses ‘data tools’. These tools are modes through which data is collected, treated, or through which the results of data treatments are applied. These include biometrics, databases, algorithms, and drones. By the end of this module, students will have a strong grasp of the landscape of privacy-invasive and privacy-enhancing tools. Statistics and data mining. Internet of Things. Data Bases. Browsing. Drones. Location tracking, government surveillance, illegal activity and scams. CBRN Forensics. Journalism. Banking. Technological sovereignty: community networks.

7. Chief privacy officer I

This two-pronged module addresses the now well-entrenched professionalization of privacy managers in the public and private sectors. Building on the knowledge acquired in all the modules, this module gives students a grounding in (1) the policy elements of privacy and data protection such as European and international data protection frameworks and (2) the technical and managerial elements of a role – the Chief Privacy Officer – that is in growing demand. This includes learning how to undertake a privacy impact assessment (PIA) and how to engineer principles such as privacy by design (PbD) and how to set an organizational privacy program. Duties and responsibilities of privacy managers.European and international privacy and data protection frameworks.

Privacy policies in the public and private sectors and Public-Private Partnerships (PPP).Assessment of privacy risks and management of information requests

.8. Chief privacy officer II

This two-pronged module addresses the now well-entrenched professionalization of privacy managers in the public and private sectors. Building on the knowledge acquired in all the modules, this module gives students a grounding in (1) the policy elements of privacy and data protection such as European and international data protection frameworks and (2) the technical and managerial elements of a role – the Chief Privacy Officer – that is in growing demand. This includes learning how to undertake a privacy impact assessment (PIA) and how to engineer principles such as privacy by design (PbD) and how to set an organizational privacy program. Data management and computer security. Role of chief privacy officers and data protection officers. Implementing an organizational privacy program and strategy. Conducting a Privacy Impact Assessment (PIA). Engineering: Implementing Privacy by Design (PbD, PETs)

9. Measuring privacy and technology impacts

PIAs, SIAs, DPIAs, etc. The policy cycle: problem definition, design, implementation, evaluation and indicators. Stakeholders and value transfers: public authorities, private actors, media and civil society. Responsible research and innovation and ethics. Research project assessment and case studies.

10. Master's degree final project

The programme must be completed through the writing of a research paper, which takes the form of a final research project, and involves presenting a proposal beforehand.

Modular structure

This course is part of a program that includes the possibility of enrolling independently in the following degrees:
 

– Master in Technology and Privacy 

– Postgraduate Diploma Technology and Privacy

 

TEACHING STAFF
Teaching staff

– Antonella Galetta. PhD researcher, Vrije Universiteit Brussel.

– Augusto Délkader. Political scientist and public sector consultant.

– Claudia Diaz, PhD. Assistant Professor at the COSIC research group of the Department of Electrical Engineering (ESAT) at the KU Leuven.

– Elvira Santiago. Postdoctoral researcher.

– Francesco Flammini. PhD, IEEE Senior Member and ACM Distinguished Speaker.

– Gemma Galdon Clavell. PhD in Public Policy.

– Genís Margarit. Telecom engineer and IT security consultant.

– Gertjan Boulet. PhD candidate in Law at Faculty of Law & Criminology of Vrije Universiteit Brussel.

– Gioacchino Mazzurco. Computer science engineer.

– Gloria Gonzalez Fuster. PhD in Law.

– Hervé Falciani. Systems Engineer, whistle-blower and creator of the Falciani list, providing information on 130,000 suspected tax evaders with Swiss bank accounts.

– Jacqui Taylor. PhD, web scientist.

– Javier Toret. Degree in Psychology, member of the IN3/UOC Networks, Movements & Technopolitics research group.

– Jose Manuel Pérez Marzabal. Master of Laws, PhD candidate.

– Josian Llorente. Cultural manager.

– Katarzyna Szymielewicz. Lawyer specialised in human rights and technology, co-founder and President of the Panoptykon Foundation.

– Lisa Lucile Owens. PhD candidate and Paul F. Lazarsfeld Fellow at Columbia University, New York.

– Mario Viola. PhD in Law.

– Xosé Quiroga. Bachelor of Laws, journalist.

*The management team  reserves all rights to make changes If any teacher can’t teach a subject, always ensuring the same quality and professional category levels.


Management

Gemma Galdon Clavell. PhD in Public Policy.



Coordination

Griselda Casadellà Cunillera.



Organised by:

 

Enrol
PRINT
Share this course:    Share to Facebook   Share to Twitter  
Cercador

de cursos

Àmbits de coneixement
Tipus de curs
Modalitats
Paraules clau
       

 


Política de cookiesAvís legal | Tel. 972 210 299 | E-mail: info.fundacioif@udg.edu

 

Aquest lloc web fa servir cookies. Si hi segueix navegant considerarem que n’està acceptant el seu ús. Més informació sobre les cookies.