Information Society Rights
Study Course Implementer
Dzirciema street 16, Rīga, szf@rsu.lv
About Study Course
Objective
Preliminary Knowledge
Learning Outcomes
Knowledge
1.Students will gain knowledge about the peculiarities of the application of the law in the information society, including the evaluation of legal and factual conditions caused by the operation of information technology; further development of law and application of analogy in the field of technology; identification and use of independent and auxiliary sources of information society law; preparation of legal documents on issues related to the legal aspects of the use of the e-environment.
Skills
1.Students will obtain the skills required to a lawyer, including, ability to assess legal issues related to the e-environment, including the assessment of legal consequences, skills further law development in the e-environment, skills mentioned in the professional standard of the lawyer.
Competences
1.Students must be able to integrate the knowledge gained in the course in different areas of law. The student must be able to provide legal assistance to a person in cases where the legal relationship is related to the use of the e-environment, regardless of the field of law in which the legal consequences have occurred. The student must be able to prepare the necessary legal documents, be able to select and apply the necessary legal norm, etc. competencies specified in the standard of the legal profession. The competencies acquired as a result of the course must promote the student's research activities and understanding of ethical responsibility.
Assessment
Individual work
|
Title
|
% from total grade
|
Grade
|
|---|---|---|
|
1.
Individual work |
20.00% from total grade
|
10 points
|
|
The student must prepare a prompt for the artificial intelligence system to create a task related to the topics covered in the course. Word count not less than 1000, not more than 1400 words. The results of the assignment, the methodology used, and the conclusions must be presented in a PowerPoint presentation and defended orally. Presentation time: 7-10 minutes. |
||
Examination
|
Title
|
% from total grade
|
Grade
|
|---|---|---|
|
1.
Examination |
50.00% from total grade
|
10 points
|
|
A written exam in a computer lab covering the topics covered during the course. To pass the exam, the student must achieve a minimum of 40%. By retaking the exam (board exam) the student can obtain up to 70%. |
||
Study Course Theme Plan
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
The legal concept of information society. IT and legal system similarities and differences. Regulation on cyberspace and information services.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Code – regulator in cyberspace. Legal assessment of programmers error and software bugs.
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Problem based case law study.
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Team work – Case law study.
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Team work – Case law study.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Concept and features of cybersecurity. Definition of a legally protected interest in cyberspace. Regulation of critical information infrastructure in the EU and Latvia.
|
-
Class/Seminar
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Case law study.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Concept of cybercrime, categories, jurisdiction.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Concept and features of cybersecurity. Definition of a legally protected interest in cyberspace. Regulation of critical information infrastructure in the EU and Latvia.
|
-
Lecture
|
Modality
|
Location
|
Contact hours
|
|---|---|---|
|
On site
|
Auditorium
|
2
|
Topics
|
Concept of cybercrime, categories, jurisdiction.
|
Bibliography
Required Reading
Latvijas Republikas Satversme
Krimināllikums 132-1, 145, 150, 177-1, 241- 244. pants.
U. Ķinis „Valsts informācijas sistēmu krimināltiesiskā aizsardzība”. Jurista vārds, 2011.gada septembris.
Declaration of Principles Building the Information Society: a global challenge in the new Millennium
U. Ķinis Kibernoziedzība, kibernoziegumi un Jurisdikcija i. Rīga, Jumava, 2015. 69-80; 121-149; 270-301
Saeimas, MK datu bāzes, politikas dokumentu datu bāze, RSU bibliotēkā tiešsaistē abonējamās d/b u.c.
Informācijas Sabiedrības tiesību pamati. U. Ķiņa zin. red, RSU, 20222, 1, 2, 3 un 9. nodaļa.
Additional Reading
ECT lietas, piem , Frederik NeIJ and Sunde Kolmisippi, 2013.gada februāra spriedums,
Rumbles W. Theft of the digital: can you steal virtual property?// http://www.laws.canterbury.ac.nz/documents/17_2_354_374.pdf
U. Ķinis Noziedzīgi nodarījumi datortīklos- kibernoziegumi, TNA, 2000.
Ķinis U. Kibernoziegumi, Turība, 2007.
Erlank W. The legal acceptance of virtual property// http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1591384
The EU-US Privacy Collision: a turn to institutions and procedures By Swartz P.M. Harward law review. Vol. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2290261