For those studying in the 1-year Master's Programme in IT Law the one academic year in residence leads to the degree of Master of Arts in Law (with specialization in IT Law). To qualify for the degree, students must successfully complete the following curriculum in full (60 ECTS).
In comparison, for those studying in the Continuing Education Programme in IT Law the one academic year in residence leads to the Certificate in IT Law. To qualify for the certificate, students must successfully complete the the first four (4) components of the following curriculum (36 ECTS). They do not need to complete the courses under the title "Meeting Challenges in IT Law".
The course provides an overview of the basics of networking (Internet protocols, routing, main network devices) and Internet Governance (RFC, IETF, ISOC, ICANN); basics of computer architecture, backbone and carrier infrastructure; contemporary uses of ICTs (e-everything); trends in developments and uses of ICTs (distributed systems, utility computing, mobile markets). The course also explains the main stages of IT project development (requirement analysis, design, implementation, testing, and deployment).
Read more about the course outline
The course provides an overview of technological platforms for international data processing, as well as their legal framework. The course developes the ability to understand technical and legal preconditions and requirements of international data processing, solve relevant legal problems and assess business and political risk resulting from international data processing models and interests.
Through the course you will acquire the basics of algorithmic thinking, get acquainted with some of the programming techniques and the most common programming languages. You will learn about algorithms and programs, representations of algorithms, flow-charts, branching algorithms, loops, sub-algorithms, developing algorithms for given text-based problems, program structure, names, variables, operations, Boolean expressions, comparisons, conditional statements, loop statements, arrays, sub-programs and will get an overview of the different programming languages.
The course gives an overview of threats related to information security. The topics include: password management, securing data by encryption, overview of hash functions, overview of symmetric and asymmetric cryptography, authentication, ID-card, e-voting, technical and social engineering attacks, WiFi security.
The course covers the public sector use of ICTs and information society services as well as familiarizes students with the concepts of e-governance and public administration of ICTs. Furthermore, it maps the concepts of public Information Systems, PKI, public databases, public service models and strategies. The course introduces and optimization of uses of ICTs in the public sector and applicable legal regimes and supports developing understanding of user-friendly, trusted and economically efficient public sector presence online.
The course develops a thorough understanding of the concepts, principles and regulation of privacy and personal data protection within the European regulatory framework. You will be introduced the applicable legislation, court practice by the Court of Justice of the European Union and the European Court of Human Rights of privacy and data protection and the latest developments in the respective field. In seminars, you will learn how to solve practical problems related to the covered topics.
The course prepares you to critically analyse and plan legal strategies for e-commerce as well as handle claims related to consumer protection, information society services and online sales. It focuses on mapping the main types of online transactions to applicable legal regimes under international law, regional legal instruments and local regulation (taking into account the interaction between domestic and international law in this field) as well as on analysis of relevant legal documentation which must be present on a website, drafting IT contracts and online banking.
Through the course you will obtain all necessary skills to assess and create legal strategies in support of various steps in an IPR Intensive Enterprise lifecycle and understand the different legal risks related to respective stages of an enterprise life cycle as every stage brings new challenges which require new approaches for successful resolution.
You will get to know the main legal concepts of intellectual property, they will be familiarised with the relevant laws applicable to IT related IP. Additionally you will obtain necessary skills to assess the legal status of IT related intellectual property problems and
will be able to create and analyse legal strategies and solutions for various IT related intellectual property issues.
This course will address cross-border implications of development and uses of ICTs and the resulting security concerns. It will familiarize you with international law applicable to cross-border cyber conflict and discuss national security and defence aspects of ICTs. Additionally, you will learn to understand how uses of ICTs affect international security and how to resolve relevant issues under international law.
This course explores technical and legal issues related to collection and use of electronic data and computer systems as evidence in litigation. The nature and peculiarities of ICT court procedure will be discussed. The course also examines the technical and legal aspects of criminal use of computers and networks.
The professional practice is designed:
1. to embed the knowledge and skills obtained during studies,
2. to prepare for the professional activity in the area of IT law, and
3. to create additional incentives to acquire new knowledge and skills.
The practice will give an experience in solving actual problems in IT Law and get you acquainted with one narrow subject area within their specialization. Additionally, you will acquire experience in group work and the practice will further your communication skills.
The Master’s Exam is designed to systematize the legal knowledge and skills acquired during the studies in IT Law, and to integrate them into a comprehensive understanding of IT Law. This objective will be achieved in the course of two assignments. In the first, you will complete two studies on current challenges in IT Law. In the second, you will complete a written comprehensive exam in IT Law.
Consists of a variety of courses you can choose from to supplement your studies in the IT Law related courses.