Skip to content | Change text size

M O N A T A R

InfoTech Unit Avatar

FIT2036 Information Technology Law & Security (DISESTABLISHED FB 05/07)

Chief Examiner

This field records the Chief Examiner for unit approval purposes. It does not publish, and can only be edited by Faculty Office staff

To update the published Chief Examiner, you will need to update the Faculty Information/Contact Person field below.

NB: This view restricted to entries modified on or after 19990401000000

Unit Code, Name, Abbreviation

FIT2036 Information Technology Law & Security (DISESTABLISHED FB 05/07) (13 Dec 2007, 10:36am) [INFO TECH LAW & SEC (22 Jun 2005, 3:34pm)]

Reasons for Introduction

Reasons for Introduction (13 Jun 2005, 10:15am)

FIT2036 is an elective introduced for second year undergraduates in the Faculty of Information Technology

Reasons for Change (13 Jun 2005, 10:16am)

This is the first generation entry for this unit in the re-structure of FIT undergraduate programs.

Role of Unit (13 Jun 2005, 10:20am)

FIT2036 is an elective for second year FIT undergraduate students. Its key objectives are to provide students with:

* Understanding of the legal ramifications of current IT practices.

* Understanding of the security measures to be integrated into network architecture, protocols and implementations to offer reasonable assurance as to privacy and user identity.

* Knowledge of the steps that an organisation should consider taking to reduce both the legal and commercial risks associated with a breach of security.

Relationship of Unit (09 Jun 2005, 12:07pm)

FIT2036 is a second year elective.

Relevance of Unit (22 Jun 2005, 3:36pm)

The continued growth in the use of electronic commerce as well as data warehousing poses novel and complex legal and security problems. The collection of customer data and use of information through the Internet raises the importance of the issue of privacy. As a communication medium, the Internet has the increased potential for causing damage (eg defamation) with its wide readership. An organisation is legally obliged to take reasonable steps to protect personal information stored in their databases from misuse and loss and unauthorised access, modification or disclosure.

It is important for every IT graduate to have an understanding of the legal ramifications of current IT practices and the steps that an organisation should consider taking to reduce both the legal and commercial risks associated with a breach of security. Students require an understanding of the security measures to be integrated into network architecture, protocols and implementations to offer reasonable assurance as to privacy and user identity.

Objectives

Knowledge and Understanding (Cognitive Domain Objectives) (14 Jun 2005, 10:47am)

At the completion of this unit, students will have a theoretical and conceptual understanding of:

C1. The Australian legal system and how laws operate and may be enforced in a global context.

C2. The legal implications of selling goods and services via the Internet, including issues of consumer protection laws, trade marks and domain names and transacting on the Internet.

C3. The applicability of copyright principles to the digital environment of the Internet.

C4. The operation of the law of defamation in an online context including what constitutes publication, and how this interacts with concepts of free speech.

C5. Privacy laws as they arise in the online context.

C6. Network-related security threats and vulnerabilities.

C7. Controls for preserving confidentiality, integrity and availability of networks.

C8. The management of the security function.

Attitudes, Values and Beliefs (Affective Domain Objectives) (13 Jun 2005, 11:46am)

At the completion of this unit, students will have developed attitudes that enable them to:

A1. Appreciate the legal implications of the use of IT for an organisation.

A2. Appreciate the security implications of the use of IT for an organisation.

A3. Recognise the importance of data privacy and security for those engaging in online transactions.

Practical Skills (Psychomotor Domain Objectives) (14 Jun 2005, 10:39am)

At the completion of this unit, students will have the skills to:

P1. Identity and discuss the legal implications of using IT in organisations.

P2. Assess the security threats and vulnerabilities faced by organisations.

P3. Identify the controls for preserving confidentiality, integreity and availability of networks.

Relationships, Communication and TeamWork (Social Domain Objectives) (14 Jun 2005, 10:28am)

At the completion of this unit, students will have developed skills needed to:

R1. Recognise that information security is both a technological and organisational issue.

R2. Recognise the team skills necessary for successful management of information security in organisations.

Unit Content

Summary (24 Jun 2005, 10:47am)

ASCED Discipline Group Classification: 029999 Information Technology not elsewhere classified.

The continued growth in the use of electronic commerce as well as data warehousing poses novel and complex legal and security problems. An organisation is legally obliged to take reasonable steps to protect personal information stored in their databases from misuse and loss and unauthorised access, modification or disclosure. This unit examines legal and security issues of IT. Legal issues such as copyright, privacy, defamation and consumer protection will be discussed. The unit will also provide students with knowledge to identify network security problems that may arise and to explore measures that may be used to prevent or resolve such security problems.

Handbook Summary (05 Jul 2005, 08:59am)

The continued growth in the use of electronic commerce as well as data warehousing poses novel and complex legal and security problems. An organisation is legally obliged to take reasonable steps to protect personal information stored in their databases from misuse and loss and unauthorised access, modification or disclosure. This unit examines legal and security issues of IT. Legal issues such as copyright, privacy, defamation and consumer protection will be discussed. The unit will also provide students with knowledge to identify network security problems that may arise and to explore measures that may be used to prevent or resolve such security problems.

Recommended Reading (16 Jun 2005, 09:21am)

Corporate Computer and Network Security, Raymond Panko

Security in Computing, Charles Pfleeger, Shari Pfleeger

NetLaw, C. Brien & J. Brien

Teaching Methods

Mode (13 Jun 2005, 10:41am)

On-campus

Strategies of Teaching (13 Jun 2005, 11:48am)

The teaching of the unit will be conducted through lectures and tutorials:

* One 2-hour lecture per week for 13 weeks

* One 1-hour tutorial per week for 13 weeks

Teaching Methods Relationship to Objectives (13 Jun 2005, 11:48am)

* Knowledge and understanding objectives: achieved mainly through lectures and tutorials exercises.

* Attitudes, values and belief objectives: achieved mainly through tutorial discussions and assignment work.

* Practical skill objectives: achieved mainly thorough tutorial exercises and assignment work.

* Relationships, communication and team work objectives: achieved mainly through tutorial discussions and assignment work.

Assessment

Strategies of Assessment (13 Jun 2005, 10:56am)

Assessment breakdown is as follows:

* Assignments (30%)

* Examination (70%)

Students must pass the examination in order to pass the unit.

Assessment Relationship to Objectives (13 Jun 2005, 10:57am)

* Knowledge and understanding objectives: assessed mainly through the examination.

* Attitudes, values and belief objectives: assessed through assignments and examination.

* Practical skill objectives: assessed mainly through assignments.

* Relationships, communication and team work objectives: assessed mainly through assignments.

Workloads

Workload Requirement (13 Jun 2005, 10:45am)

Students should expect to spend an average of 12 hours per week for 13 weeks on this unit. The breakdown of the workload is as follows:

* Attending lectures and tutorials: 3 hours

* Reading and preparation for lectures and tutorials: 3 hours

* Assignments: 6 hours

Resource Requirements

Lecture Requirements (13 Jun 2005, 10:58am)

High tech lecture theatre with internet access for 2 hours per week for 13 weeks

Tutorial Requirements (13 Jun 2005, 11:01am)

Rooms with facilties for Powerpoint presentations for 1 hour for 13 weeks per 20 students

Staff Requirements (13 Jun 2005, 11:08am)

1 lecturer and 1 tutor per tutorial session.

Software Requirements (21 Oct 2005, 1:04pm)

Library Requirements (13 Jun 2005, 11:09am)

Adequate copies of recommended texts listed above

Teaching Responsibility (Callista Entry) (16 Jun 2005, 09:24am)

Faculty of Information Technology 50%, Faculty of Law 50%

Implications for CASPA (09 Jun 2005, 1:38pm)

Nil

Interfaculty Involvement (13 Jun 2005, 11:12am)

This unit has been developed in partnership with the Faculty of Law (Melissa de Zwart). Development of course materials and delivery of the unit will be shared equally between the Faculty of Information Technology and the Faculty of Law.

Interschool Involvement (09 Jun 2005, 1:38pm)

Nil

Other Resource Requirements (09 Jun 2005, 1:39pm)

Nil

Prerequisites

Prerequisite Units (11 Jul 2005, 10:43am)

At least 24 points of level one IT study.

Prohibitions (11 Jul 2005, 10:40am)

Alias Titles (09 Jun 2005, 1:41pm)

Nil

Level (09 Jun 2005, 1:41pm)

Level 2

Frequency of Offering (09 Jun 2005, 1:42pm)

Semester 1

Location of Offering (09 Jun 2005, 1:43pm)

Clayton

Faculty Information

Proposer

Ai Yeo

Approvals

School: 13 Dec 2007 (Julianna Dawidowicz)
Faculty Education Committee: 13 Dec 2007 (Julianna Dawidowicz)
Faculty Board: 13 Dec 2007 (Julianna Dawidowicz)
ADT:
Faculty Manager:
Dean's Advisory Council:
Other:

Version History

09 Jun 2005 Ai Yeo Initial Draft; modified UnitName; modified ReasonsForIntroduction/RIntro; modified ReasonsForIntroduction/RChange; modified ReasonsForIntroduction/RRelevance; modified ReasonsForIntroduction/RIntro; modified ReasonsForIntroduction/RRole; modified ReasonsForIntroduction/RRole; modified ReasonsForIntroduction/RRole; modified ReasonsForIntroduction/RRelation; modified ReasonsForIntroduction/RRelevance; modified ReasonsForIntroduction/RIntro; modified UnitObjectives/ObjCognitive; modified UnitObjectives/ObjAffective; modified UnitObjectives/ObjText; modified UnitObjectives/ObjPsychomotor; modified UnitObjectives/ObjSocial; modified UnitObjectives/ObjSocial; modified UnitContent/Summary; modified ReasonsForIntroduction/RRelevance; modified UnitContent/RecommendedReading; modified Teaching/Mode; modified Teaching/Strategies; modified Teaching/Objectives; modified Assessment/Strategies; modified Assessment/Objectives; modified Workload/WorkHours; modified Workload/WorkHours; modified ResourceReqs/LectureReqs; modified ResourceReqs/TutorialReqs; modified ResourceReqs/LabReqs; modified ResourceReqs/StaffReqs; modified ResourceReqs/SoftwareReqs; modified ResourceReqs/LabReqs; modified ResourceReqs/SchoolReqs; modified ResourceReqs/CaspaImpact; modified ResourceReqs/InterFaculty; modified ResourceReqs/IntraFaculty; modified ResourceReqs/OtherResources; modified Prerequisites/PreReqUnits; modified Prerequisites/PreReqKnowledge; modified Prohibitions; modified AliasTitles; modified Level; modified Frequency; modified LocationOfOffering; modified LocationOfOffering; modified FacultyInformation/FIContact
10 Jun 2005 Ai Yeo modified ReasonsForIntroduction/RRole; modified ReasonsForIntroduction/RRelevance; modified UnitObjectives/ObjCognitive; modified UnitName; modified UnitObjectives/ObjCognitive; modified UnitObjectives/ObjAffective; modified UnitObjectives/ObjCognitive; modified UnitObjectives/ObjCognitive; modified UnitObjectives/ObjAffective; modified UnitObjectives/ObjPsychomotor; modified UnitObjectives/ObjSocial; modified UnitObjectives/ObjPsychomotor; modified UnitContent/Summary; modified UnitContent/RecommendedReading; modified Assessment/Objectives; modified Assessment/Objectives
14 Jun 2005 Ai Yeo modified UnitObjectives/ObjSocial; modified UnitObjectives/ObjPsychomotor; modified UnitObjectives/ObjCognitive; modified UnitContent/RecommendedReading; modified Prerequisites/PreReqUnits; modified Prerequisites/PreReqKnowledge; modified Prohibitions; modified FacultyInformation/FICoordinator
16 Jun 2005 Ai Yeo modified UnitContent/RecommendedReading; modified ResourceReqs/SchoolReqs
22 Jun 2005 Christine Jessup modified Abbreviation; modified Abbreviation; modified ReasonsForIntroduction/RRelevance
24 Jun 2005 John Betts modified UnitContent/Summary
05 Jul 2005 Ai Yeo modified UnitContent/HandbookSummary
07 Jul 2005 John Betts modified Prohibitions
07 Jul 2005 John Betts
11 Jul 2005 Ralph Gillon Modified Prerequisites. Deleted Prohibitions
12 Jul 2005 Geraldine DCosta Approved for Submission
12 Jul 2005 Geraldine DCosta FIT School Approval, Approved for submission FEC Mtg 5/05
12 Jul 2005 Geraldine DCosta FEC Approval
21 Jul 2005 Annabelle McDougall FacultyBoard Approval
17 Oct 2005 David Sole Added Software requrirements template
21 Oct 2005 David Sole Updated requirements template to new format
13 Dec 2007 Julianna Dawidowicz modified UnitName
13 Dec 2007 Julianna Dawidowicz FIT2036 Chief Examiner Approval, ( proxy school approval )
13 Dec 2007 Julianna Dawidowicz FEC Approval
13 Dec 2007 Julianna Dawidowicz FacultyBoard Approval - Faculty Board approved the disestablishment of this unit at 05/07 meeting

This version: