Announcements

Important announcements will be posted here. Announcements will also be sent to each student via email.

Online Sessions Link

To connect to the online sessions of this module, except for the first session, please click on this link . You will be asked to register your attendance if you are not already signed in into your Zoom account. You will also be asked for the password which is below.

Meeting ID: 843 1544 7833
Passcode: 911372

Make sure that you show with your name & surname as you have been registered for the study programme. This is very important for attendance purposes.

Lecture Schedule & Notes

Lecture notes will be available during the week following the respective lecture. Schedule dates are indicative and may change. All changes, if any, may be communicated via email, SMS or telephone calls.

LectureDateTimePresentationNotes (If Any)
Lecture 0125 April 202217:30 to 20:30hrsSession 01
Lecture 022 May 202217:30 to 20:30hrsSession 02
Lecture 039 May 202217:30 to 20:30hrsSession 03
Lecture 0416 May 202217:30 to 20:30hrsSession 04
Lecture 0523 May 202217:30 to 20:30hrsSession 04
Lecture 0630 May 202217:30 to 20:00hrsSession 06
Lecture 076 June 202217:30 to 20:00hrsSession 07

Lecturer/s  

Dr Jake Camilleri

Dr Alexia Valenzia

Dr Sharon Xuereb

Lecture Summaries & Suggested Reading 

Lecture 1 - Introduction to IT and Data Protection Law

The following topics will be covered in this lecture:

  • Brief overview of topics to be discussed in this module:
    • IT:
      • Criminal Code (provisions on compute misuse)
      • Electronic Signatures (Chapter 426 of the Laws of Malta)
      • Smart contracts
      • Lex specialis (VFA framework, Proposed AI EU Regulation)
    • Data protection:
      • GDPR & E-Privacy Directive
      • Data Protection Act & Subsidiary Legislation
      • ECHR (Art 8)
    • Intellectual Property
      • Domain Names
      • Infringement of trademarks on the Internet
      • Copyright
      • Patent – patentability of software issues
  • The most salient features of current IT & data protection legislation and the manner in which they are to be applied;
  • The basic principles of IT and data protection legislation;
  • Introduction of the concept of net neutrality;
  • The main aspects of local and European IT law and its pitfalls in light of consistent technological developments;
  • The relation between IT & data privacy law and legal/personal obligations (contract and tort); and
  • IT and data privacy vis-à-vis human rights law.

Core Reading List

  • Edwards, L., 2018. Law, Policy and the Internet. Bloomsbury: Hart Publishing.
  • Borg Knight, R., Gonzi, P. and Sciberras, A., 2018. GDPR For HR Professionals
  • Voigt, P., 2018. EU General Data Protection Regulation (GDPR). Springer International PU

Supplementary Reading List

  • The GDPR Handbook: A Guide To Implementing The Eu General Data Protection Regulation.
  • Schwartz, P. and Solove, D., 2019. Privacy Law Fundamentals.
  • Bainbridge, D., Introduction to Information Technology Law 6th Edition, Trans-Atlantic Publications, Inc.

 

Lecture 2 - The implications of IT Law on legal processes (I)

The following topics will be covered in this lecture:

  • The implications of IT for legal processes, legal decision-making and related ethical and social issues;
  • General public policy and philosophical aspects of law and IT;
  • The role of local and inter-state IT crime authorities;
  • The application of IT in jurisprudence;
  • Computer misuse and related policing issues - understanding the concept of cybercrime and the correlating necessity for cybersecurity in this regard;
    • Criminal Code (provisions on compute misuse);
    • What cybercrime is and what the major challenges of cybercrime are for legislators and for practitioners.
    • Compare cybercrime provisions in own national legal system with those of the Cybercrime Convention.
    • Identify differences in national cybercrime laws and explain what the main consequences of this are.
    • Interpret articles 2-21 and 32 of the Cybercrime Convention
    • Apply substantive cybercrime provisions to a case describing a (potential) cybercriminal activity.
    • Apply procedural cybercrime provisions to a case describing a cyber-investigation.
    • Evaluate how cybercrime can be governed, including a critical assessment of the role of the law in combating cybercrime and assessing how social norms, market forces and technology can play a role in cybercrime governance.
    • Argue how specific types of cybercrime can be combated.
    • Cybercrime ecosystems and infrastructures.
    • Cybercrime methods (hacking, ddos).
    • Substantive criminal law on cybercrime (hacking, ddos, malware distribution etc.).
    • Legal aspects of digital forensics.
  • Identify substantial issues together with any remedial measures that may apply in the fields.

Core Reading List

  • Edwards, L., 2018. Law, Policy and the Internet. Bloomsbury: Hart Publishing.
  • Borg Knight, R., Gonzi, P. and Sciberras, A., 2018. GDPR For HR Professionals
  • Voigt, P., 2018. EU General Data Protection Regulation (GDPR). Springer International PU

Supplementary Reading List

  • The GDPR Handbook: A Guide To Implementing The Eu General Data Protection Regulation.
  • Schwartz, P. and Solove, D., 2019. Privacy Law Fundamentals.
  • Bainbridge, D., Introduction to Information Technology Law 6th Edition, Trans-Atlantic Publications, Inc.

 

Lecture 3 - The implications of IT Law on legal processes (II)

The following topics will be covered in this lecture:

  • Lex specialis:
    • Smart Contracts
    • VFA framework
    • Proposed AI EU Regulation - identify and explain key regulatory, legal and ethical issues particular to AI.
  • Intellectual property rights in algorithms, chips, databases, software etc:
    • Copyright
    • Patentability issues with software
    • Domain names
    • Protection of trademarks on the internet
  • Relationship between IT and competition law:
    • Art 101 TFEU and art 102 TFEU
    • Technology transfer block exemption
    • R&D block exemption
  • Specialisation block exemption

Core Reading List

  • Edwards, L., 2018. Law, Policy and the Internet. Bloomsbury: Hart Publishing.
  • Borg Knight, R., Gonzi, P. and Sciberras, A., 2018. GDPR For HR Professionals
  • Voigt, P., 2018. EU General Data Protection Regulation (GDPR). Springer International PU

Supplementary Reading List

  • The GDPR Handbook: A Guide To Implementing The Eu General Data Protection Regulation.
  • Schwartz, P. and Solove, D., 2019. Privacy Law Fundamentals.
  • Bainbridge, D., Introduction to Information Technology Law 6th Edition, Trans-Atlantic Publications, Inc.

 

Lecture 4 - E-Commerce

The following topics will be covered in this lecture:

  • Electronic contracts (contracting informally, regulating offer and acceptance, contractual terms, formal contracts, signatures);
  • The role of smart contracts;
  • Electronic payments (PSD II and EMD II), payments via cryptocurrencies;
  • Consumer protection – distance and online selling;
  • Directive 2019/770 of the European Parliament and of the Council of 20 May 2019 on certain aspects concerning contracts for the supply of digital content and digital services (Digital Content Directive);
  • Proposal for a Directive of the European Parliament and of the Council on Certain Aspects Concerning Contracts For The Online And Other Distance sales of goods; and
  • New concepts and developments in IT legislation today:
    • Financial services IT specific regulation; and
    • Digital Services Act.

Core Reading List

  • Edwards, L., 2018. Law, Policy and the Internet. Bloomsbury: Hart Publishing.
  • Borg Knight, R., Gonzi, P. and Sciberras, A., 2018. GDPR For HR Professionals
  • Voigt, P., 2018. EU General Data Protection Regulation (GDPR). Springer International PU

Supplementary Reading List

  • The GDPR Handbook: A Guide To Implementing The Eu General Data Protection Regulation.
  • Schwartz, P. and Solove, D., 2019. Privacy Law Fundamentals.
  • Bainbridge, D., Introduction to Information Technology Law 6th Edition, Trans-Atlantic Publications, Inc.

 

Lecture 5 - An Introduction to Data Protection Legislation & Freedom of Information

The following topics will be covered in this lecture:

  • The concept, nature of and necessity for data privacy and the need to protect it through legislation;
  • Grasp the basic concept of the need for privacy and the rights related thereto, especially in the context of the digital age;
  • Application of Freedom of Information Act (Cap 496)
  • Criminal content liability and freedom of expression (Criminal Code provisions)

Core Reading List

  • Edwards, L., 2018. Law, Policy and the Internet. Bloomsbury: Hart Publishing.
  • Borg Knight, R., Gonzi, P. and Sciberras, A., 2018. GDPR For HR Professionals
  • Voigt, P., 2018. EU General Data Protection Regulation (GDPR). Springer International PU

Supplementary Reading List

  • The GDPR Handbook: A Guide To Implementing The Eu General Data Protection Regulation.
  • Schwartz, P. and Solove, D., 2019. Privacy Law Fundamentals.
  • Bainbridge, D., Introduction to Information Technology Law 6th Edition, Trans-Atlantic Publications, Inc.

 

Lecture 6 - The Foundational Concepts of Data Protection Law

The following topics will be covered in this lecture:

  • The distinction between data controllers and data processors, and overlaps thereof;
  • The notion of positive consent in data issues;
  • Data breaches, notification, reporting and risk management;
  • The role of local and inter-state data protection authorities; and
  • The application of data protection and privacy law in jurisprudence.

Core Reading List

  • Edwards, L., 2018. Law, Policy and the Internet. Bloomsbury: Hart Publishing.
  • Borg Knight, R., Gonzi, P. and Sciberras, A., 2018. GDPR For HR Professionals
  • Voigt, P., 2018. EU General Data Protection Regulation (GDPR). Springer International PU

Supplementary Reading List

  • The GDPR Handbook: A Guide To Implementing The Eu General Data Protection Regulation.
  • Schwartz, P. and Solove, D., 2019. Privacy Law Fundamentals.
  • Bainbridge, D., Introduction to Information Technology Law 6th Edition, Trans-Atlantic Publications, Inc.

 

Lecture 7 - Comparative analysis of common IT & data privacy laws within the EU

The following topics will be covered in this lecture:

  • Comparative analyses between the application of common IT & data privacy law across the European Union member states; and
  • Identifying new concepts and developments in data protection legislation today:
    • Cookie war;
    • E-Privacy Regulation;
    • Introduction of subsidiary legislation 12.32; and
    • New SCCs.

Core Reading List

  • Edwards, L., 2018. Law, Policy and the Internet. Bloomsbury: Hart Publishing.
  • Borg Knight, R., Gonzi, P. and Sciberras, A., 2018. GDPR For HR Professionals
  • Voigt, P., 2018. EU General Data Protection Regulation (GDPR). Springer International PU

Supplementary Reading List

  • The GDPR Handbook: A Guide To Implementing The Eu General Data Protection Regulation.
  • Schwartz, P. and Solove, D., 2019. Privacy Law Fundamentals.
  • Bainbridge, D., Introduction to Information Technology Law 6th Edition, Trans-Atlantic Publications, Inc.

 

Methods of Assessment

2 out of a choice of 4 assignment titles - 100% weighting

Assignment

You have to choose 2 out of the 4 questions which will be made available in the Assignment Submission form below. Assignment should be submitted by not later than Friday 22 July 2022. The assignments have to be submitted together with the Assignment Submission Form. Please indicate the questions which you have addressed in the Assignment Submission form.

Assignment Submission Form

If you need information on how to plan, draft and submit your assignment follow the 21 Academy presentation on Writing and Submitting your Assignment.

We are also making the 21 Academy's Assignments Rubric available for your guidance. This is a performance-based assessment tool. Tutors will use the rubric to assist them to allocate scoring while it allows students to understand what is required in the assignment and how it will be graded. For referencing purposes, as much as possible please use the Oscola Referencing Guide.

Assignment should be sent accompanied by the respective assignment submission form on info@advisory21.com.mt. Please send assignments in pdf format. Do not scan assignment but convert/save it directly to pdf.

Note that the submitted assignment will be scanned for plagiarism.

Use the following free online plagiarism checker - https://www.paperpass.net - which also provides a detailed report and also indicates the sentences in your assignment which are showing as copied and pasted. Such sentences should be paraphrased.
Together with each assignment you must submit a copy of the plagiarism report which confirms that you have submitted your assignment with a similarity score which does not exceed 20%. We will still be verifying the score from our end but this will give an initial peace of mind to those receiving your assignments that you have checked them from your end.
We ask you to keep the similarity percentage very low and definitely below 20%. You should  review and rephrase any assignments which show more than 20% similarity.

Referencing Style

Oscola Referencing Guide

Academy Documents

Complaints Procedure Policy

Complaints Form

Students' Evaluation Form

Students Privacy Notice

Upcoming related courses...