The legal, ethical, and security issues concerning data, including aggregated data. Proactive compliance with rules and, in their absence, principles for the responsible management of sensitive data. Case studies.
By the end of the course, students will be able to:
- Identify situations in which data is sensitive, assess the risks, and articulate a reasoned response.
- Identify the pros and cons of situations in which data was collected for one purpose and later analyzed for other purposes.
- Explain trade-offs in security and privacy; explain why cybersecurity is complex and difficult.
- Explain the purpose of an ethics board, determine when an ethics board needs to be consulted, and explain the various forms of consent. Consider privacy laws and legal issues.
- Implement good security and privacy practices in data storage, use, and reporting.
- Baase, Sara. A Gift of Fire: Social, Legal, and Ethical Issues in Computer Technology, 4th Edition. Pearson, 2012.
- Rosenberg, Richard. The Social Impact of Computers, 4th Edition. Emerald Group, 2004.
- Schneier, Bruce. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. Norton, 2015.
- Schneier, Bruce. Secrets and Lies: Digital Security in a Networked World, 15th Anniversary Edition. Wiley, 2015.
- Free online resources, available on the Internet. For example:
- Abelson, Hal; Ledeen, Ken; and Lewis, Harry. Blown to Bits: Your Life, Liberty, and Happiness after the Digital Explosion. Addison-Wesley, 2008. http://www.bitsbook.com/excerpts/.
- Geist, Michael. http://www.michaelgeist.ca/blog/ (blog, privacy, ethics, Canadian focus)
- Krebs, Brian. https://krebsonsecurity.com/ (blog on security)
- Schneier, Bruce. Crypto-Gram Monthly Blog and Archives. https://www.schneier.com/crypto-gram/ (blog on security, privacy, ethics)
Note: information on this page is preliminary and subject to change.