Skip to main content

Information Society Rights

Study Course Description

Course Description Statuss:Approved
Course Description Version:11.00
Study Course Accepted:02.02.2024 12:29:03
Study Course Information
Course Code:JF_392LQF level:Level 7
Credit Points:2.00ECTS:3.00
Branch of Science:Law; Theory and History of RightsTarget Audience:Juridical Science
Study Course Supervisor
Course Supervisor:Uldis Ķinis
Study Course Implementer
Structural Unit:Faculty of Social Sciences
The Head of Structural Unit:
Contacts:Dzirciema street 16, Rīga, szfatrsu[pnkts]lv
Study Course Planning
Full-Time - Semester No.1
Lectures (count)6Lecture Length (academic hours)2Total Contact Hours of Lectures12
Classes (count)6Class Length (academic hours)2Total Contact Hours of Classes12
Total Contact Hours24
Part-Time - Semester No.1
Lectures (count)4Lecture Length (academic hours)2Total Contact Hours of Lectures8
Classes (count)2Class Length (academic hours)2Total Contact Hours of Classes4
Total Contact Hours12
Study course description
Preliminary Knowledge:
For the Professional Master's program – students' require knowledge in the general theory of law, philosophy of law, logic. Students should also have knowledge in constitutional, civil, criminal, administrative, administrative procedural law, and legal methodology. Academic Master students – require an understanding of the law and have the ability for logical and critical thinking.
Objective:
We live in an information society. It is a knowledge-based society where information technology plays a key role in ensuring the rule of law and human rights. The main goal of this course is to develop digital literacy for lawyers. Digital literacy includes not only technical and legal knowledge of technology, but also critical thinking, teamwork, case law studies, and other qualities specified in para 5.5 of the 2020 Jurist Professional Standard. Students will get knowledge about the problems of cyberspace regulation, sources of cyber law, open data, and their application in the legal field understanding how information technologies (artificial intelligence, robotics, big data, block chains, virtual reality, etc.) can affect rule of law and cybersecurity and will learn how to resolve those legal challenges.
Topic Layout (Full-Time)
No.TopicType of ImplementationNumberVenue
1The legal concept of information society. IT and legal system similarities and differences. Regulation on cyberspace and information services.Lectures1.00auditorium
2Code – regulator in cyberspace. Legal assessment of programmers error and software bugs.Lectures1.00auditorium
3Problem based case law study.Classes2.00auditorium
4Protection of human rights and democratic values in cyberspace.Lectures1.00auditorium
5Lawyer and technology. Reg Tech, Leg tech. E- public services – algorithm based legal regulation. Lawyer's participation in making of the algorithm.Lectures1.00auditorium
6Team work – Case law study.Classes2.00auditorium
7Concept and features of cybersecurity. Definition of a legally protected interest in cyberspace. Regulation of critical information infrastructure in the EU and Latvia.Lectures1.00auditorium
8Case law study.Classes1.00auditorium
9Concept of cybercrime, categories, jurisdiction.Lectures1.00auditorium
10Cybercrime – case law study.Classes1.00auditorium
Topic Layout (Part-Time)
No.TopicType of ImplementationNumberVenue
1The legal concept of information society. IT and legal system similarities and differences. Regulation on cyberspace and information services.Lectures0.50auditorium
2Code – regulator in cyberspace. Legal assessment of programmers error and software bugs.Lectures0.50auditorium
3Problem based case law study.Classes0.50auditorium
4Protection of human rights and democratic values in cyberspace.Lectures0.50auditorium
5Lawyer and technology. Reg Tech, Leg tech. E- public services – algorithm based legal regulation. Lawyer's participation in making of the algorithm.Lectures0.50auditorium
6Team work – Case law study.Classes0.50auditorium
7Concept and features of cybersecurity. Definition of a legally protected interest in cyberspace. Regulation of critical information infrastructure in the EU and Latvia.Lectures1.00auditorium
8Case law study.Classes0.50auditorium
9Concept of cybercrime, categories, jurisdiction.Lectures1.00auditorium
10Cybercrime – case law study.Classes0.50auditorium
Assessment
Unaided Work:
The student has to come up with a legal problem or event and prepare a detailed text for a legal case study (5 - 7 pp, word count 1000 – 1400, TNR, Word Regular 12, 1,5 space).
Assessment Criteria:
The final grade will consist of the sum of all percentage estimates obtained during the course. Knowledge be assessed in percentage (1 – 100%) and the final evaluation will be converted to grades (1 – 10): overall score for participation and answer quality in workshops – 20%; tests – 10%; case study – 15%; The assessment of the report consists of average percentage (in the scale form 1 – 100%) of the sum of lecturer's assessment + 2 student's peer reviews. the quality of the review is assessed by the lecturer – 5%; assesment of the examination – 50%.
Final Examination (Full-Time):Exam (Written)
Final Examination (Part-Time):Exam (Written)
Learning Outcomes
Knowledge:Students will gain knowledge about the peculiarities of the application of the law in the information society, including the evaluation of legal and factual conditions caused by the operation of information technology; further development of law and application of analogy in the field of technology; identification and use of independent and auxiliary sources of information society law; preparation of legal documents on issues related to the legal aspects of the use of the e-environment.
Skills:Students will obtain the skills required to a lawyer, including, ability to assess legal issues related to the e-environment, including the assessment of legal consequences, skills further law development in the e-environment, skills mentioned in the professional standard of the lawyer.
Competencies:Students must be able to integrate the knowledge gained in the course in different areas of law. The student must be able to provide legal assistance to a person in cases where the legal relationship is related to the use of the e-environment, regardless of the field of law in which the legal consequences have occurred. The student must be able to prepare the necessary legal documents, be able to select and apply the necessary legal norm, etc. competencies specified in the standard of the legal profession. The competencies acquired as a result of the course must promote the student's research activities and understanding of ethical responsibility.
Bibliography
No.Reference
Required Reading
1Latvijas Republikas Satversme
2Informācijas tehnoloģiju drošības likums
3Krimināllikums 132-1, 145, 150, 177-1, 241- 244. pants.
4Valsts informācijas sistēmu likums
5Informācijas atklātības likums.
6Nacionālās drošības likums// http://www.likumi.lv/doc.php?id=14011likumi.lv
72015. gada 28. 07. Ministru kabineta noteikumi Nr. 442 "Kārtība, kādā tiek nodrošināta informācijas un komunikācijas tehnoloģiju sistēmu atbilstība minimālajām drošības prasībām"
8Latvijas kiberdrošības stratēģija
9D. Šmite, D. Dosbergs, J. Borzovs Informācijas un komunikācijas tehnoloģijas nozares tiesību un standartu pamati. Rīga, LU Akadēmiskais apgāds, 2005. 11- 17.
10History lessons for a general theory of law and technology by Gregory N. Mandel
11 Cyberspace and law of the horse F.H. Easterbrook, 1996
12Why have a theory of law and technological change L.B. Moses
13Informācijas un komunikāciju tiesības I.d. Autoru kolektīvs U. Ķiņa vadībā. Rīga, Turība, 2002. 66-75, 89-120, 112- 135 lpp.
14 U. Ķinis „Valsts informācijas sistēmu krimināltiesiskā aizsardzība”. Jurista vārds, 2011.gada septembris.
15Declaration of Principles Building the Information Society: a global challenge in the new Millennium
16U. Ķinis Kibernoziedzība, kibernoziegumi un Jurisdikcija i. Rīga, Jumava, 2015. 69-80; 121-149; 270-301
17Saeimas, MK datu bāzes, politikas dokumentu datu bāze, RSU bibliotēkā tiešsaistē abonējamās d/b u.c.
18L. Lessig Code version 2.0. 2006 CC (Creative commons) 1-9;38- 83.
19Raagna I. Protecting the right to respect for private and family life under European Convention on Human rights. Council of Europe Human Rights handbooks.
20U. Ķinis ,I. Gudele Informācijas sistēmu drošība. Informācijas un komunikāciju tiesības II.d. Autoru kolektīvs U. Ķiņa vadībā. Rīga, Turība, 2002. 200-220 lpp.
21Jebkuri citi avoti par seminārā apspriežamiem jautājumiem. http://hudoc.echr.coe.int/sites/eng/pages/search.aspx?i=001…{"itemid":["001-117513"]}
Additional Reading
1ECT lietas, piem , Frederik NeIJ and Sunde Kolmisippi, 2013.gada februāra spriedums,
2Rumbles W. Theft of the digital: can you steal virtual property?// http://www.laws.canterbury.ac.nz/documents/17_2_354_374.pdf
3U. Ķinis Noziedzīgi nodarījumi datortīklos- kibernoziegumi, TNA, 2000.
4Ķinis U. Kibernoziegumi, Turība, 2007.
5Article 8: The right to respect for private and family life, home and correspondence. Human Right review 2012// http://www.equalityhumanrights.com/uploaded_files/humanrigh…
6Erlank W. The legal acceptance of virtual property// http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1591384
7The EU-US Privacy Collision: a turn to institutions and procedures By Swartz P.M. Harward law review. Vol. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2290261
8A. Murrey Looking Back at the Law of the Horse: Why Cyberlaw and the Rule of Law are Important
9Human rights in the digital age
10Robolaw Guidelines and regulations for robotics
11 EU Commission Ethics guidelines for truthworthy AI