Logo UAB

Legislation

Code: 102745 ECTS Credits: 3
2024/2025
Degree Type Year
2502441 Computer Engineering OB 3

Contact

Name:
Cristina Blasi Casagran
Email:
cristina.blasi@uab.cat

Teachers

Albert Castellanos Rodriguez
Jose Cañabate Perez
Jose Martinez Martinez
Cristina Blasi Casagran

Teaching groups languages

You can view this information at the end of this document.


Prerequisites

There are no pre-requirements


Objectives and Contextualisation

Objectives.

The aims of this subject consists on the acquisition of the following knowledge and skills:

1. Knowledge:

- Discover and discern the juridical implications of technology

- Learn about the fundamental juridical frames that are applicable in IT fields.

- Distinguish lawful facts from illicit behaviours

- Learn the different levels of unlawfulness in the computer practices.

2. Skills in the field of IT law:

- Identify the values protected by the existing legislation

- Identify the technological control needed according to the law

- Distinguish potential normative conflicts

- Detect the commission of illicit practices

- Analyse the legal framework and take decisions to preventin possible illicit practices

- Incorporate the legal requirements in the design of IT projects and services


Competences

  • Acquire personal work habits.
  • Act ethically and professionally.
  • Analyse and evaluate the social and environmental impact of technical solutions and understand the ethical and professional responsibility of the activity of an IT engineer.
  • Capacity to design, develop, select and evaluate computer applications and systems, ensuring reliability, security and quality, in accordance with ethical principles, and applicable standards and legislation.
  • Have the capacity to produce a list of technical conditions for a computer system that fulfils applicable standards and regulations.
  • Know the standards and regulations regarding computers in the national, European and international fields.
  • Know, understand and apply the necessary legislation when exercising the profession of an IT engineer and manage compulsory specifications, regulations and standards.

Learning Outcomes

  1. Assume and respect the role of the various team members , as well as different levels of dependence on the team.
  2. Critically evaluate the work done.
  3. Discover and filter the social implications and polyvalence of technologies.
  4. Identify the regulations (laws, standards…) susceptible to application to a computer system.
  5. Know and understand the technical conditions sheet of a computer system.
  6. Know the legislative and normative framework in relation to the IT profession in the pertinent field.
  7. Respecting the diversity and plurality of ideas, people and situations.
  8. Understand and know the current ethical principles, legislation and regulations applicable to computer systems.
  9. Understand the legislative and normative framework in relation to the IT profession.

Content

Lesson 1: Introduction to law and general legal considerations
The concept of law. - The legal relationship. - The branches of law.

Lesson 2: Internet regulation
Origin and evolution of new technologies. - Legal regime of SSI, audiovisual services and telecommunications services. - Liability of intermediaries.

Lesson 3: Fundamental communication rights
Right to information. - Freedom of expression. - Right to privacy and secrecy of communications. - Right to honor. - Right to self-image. - Right to non-discrimination.

Lesson 4: Privacy, data protection and AI
Key concepts: data protection c. privacy. - Origins of European data protection legislation. - EU regulation. - The European Data Protection Regulation. - Application of the LOPDGDD in Spain. - Online marketing and behavioral advertising European developments in the field of data protection. - Security of the information. - AI regulation in the EU.

Lesson 5: Intellectual property regulation
Copyright Laws. - Laws regarding trademarks. - Patent law.- Free software licenses.

Lesson 6: Contracting of information technology goods and services
IT contracts.- The outsourcing or externalization of business functions.

Lesson 7: Cybercrimes
Cybercrimes in the EU. - Incitement to hate online. - Limits of the right to information. Crimes of revelation and discovery of secrets. – Crimes of damage and computer fraud.- Stalking. – Child Grooming.

Activities and Methodology

Title Hours ECTS Learning Outcomes
Type: Directed      
Practical Sessions 15 0.6 1, 2, 9, 8, 6, 5, 3, 4, 7
Theoretical Sessions 10 0.4 1, 2, 9, 8, 6, 5, 3, 4, 7
Type: Supervised      
Individual and team work 43.5 1.74 1, 2, 5, 7

The student will have to conduct several tasks in order to learn the contents in this course. Particularly, two types of activities will have to be completed:

1. Theoretical sessions: the lecturer will explain the contents of each lesson and students will be asked to carry out legal reflections from each of the concepts learned. Theoretical sessions will contribute to the consolidation of basic contents, necessary to perform the practical assignments defined in point 2.

2. Seminars: These sessions have for aim to put apply the concepts explained at the theoretical sessions using the methodology of resolution of practical cases. They will be divided in two types:

2.1. Non-evaluated activities: They will consist of a case study proposed at the start of the seminar which, using specific resources and materials will have to be resolved in small groups or individually. Before end the seminar, students will discuss the possible solution, guided by specific questions posed by the lecturer.

2.2 Evaluated activities. These activities are part of the continuous-assessment. They will evaluate the knowledge of the student through a case study, using material referred by the lecturer. It may be resolved individually or in small groups. At the end of the session, the solution will be proposed and debated.

At the end of the course, a final test will be completed. This test will allow to evaluate the knowledge and skills learned by students during the course.

Crosscutting competencies will be acquired and evaluated along the course. Specifically:

T02.08 Critical assessment through the case studies, students will assess realsituations and solve questions using specific legislation.

T05.01 Assume social, ethical, professional and legal responsibility through the knowledge of the applicable legislation and the consequences of its misusage.

T05.02 Respect of diversity and plurality of ideas, people and situations through the debates that will be generated during the theoretical sessions as well as the practical seminars.

 

Annotation: Within the schedule set by the centre or degree programme, 15 minutes of one class will be reserved for students to evaluate their lecturers and their courses or modules through questionnaires.


Assessment

Continous Assessment Activities

Title Weighting Hours ECTS Learning Outcomes
Continuous-Assessment activity 20% 3.5 0.14 1, 2, 9, 8, 6, 5, 3, 4, 7
Final Test 40% 1.5 0.06 1, 9, 8, 6, 5, 3, 4
Mid-term exam 40% 1.5 0.06 9, 8, 6, 4

Evaluation

Evaluation criteria

Both the knowledge acquired by the student in relation to the objectives set in the subject and the skills and competences developed will be taken into account in the final score of the course.

a) Scheduled evaluation process and activities

The subject will be assessed through:

- Mid-term exam (April): It will consist of a test-type exam on topics 1, 2, 3 and some sections of topic 4. This test is worth 40% of the final grade.

- Final exam (June): It will consist of a test-type exam on the remaining lessons, not evaluated on the first exam. This test is worth 40% of the final grade.

- Continuous assessment activities (the teacher will indicate at the beginning of the course the number and submission date), which will be submitted individually or in groups (according to the teacher's instructions).

In the event that a student cannot attend a session for a justified reason, they must notify the teacher two days in advance and provide the corresponding proof.

Only those students who do not achieve a final grade of 5 out of 10 once the percentages of the entire evaluation process have been weighted, can opt for second-call exam. In other words, only if after calculating the score of the mid-term exam (40%) , final exam (40%) and continuous assessment (20%) the student does not reach a 5/10, there is the option to go to the second call. The second call will consist of a test covering all the topics of the course plus a case study to be completed.

There is no special treatment for students that did not pass the course on previous years.

b) Programming of assessment activities

The dates of the continuous assessment sessions will be published in the virtual space (Virtual Campus) and may be subject to schedule changes for reasons of adaptation to possible incidents. These changes will always bereported in the virtual space as it is understood to be the usual mechanism for information exchange between teacher and students.

c) Second-call examination

Students who have not passed the course after calculating the three assessment tests (mid-term exam, final exam and continuous assessment activity) can access to the second call. This will consist of the following tests:

 

1. A test covering all the lessons of the course.

2. A case study applying any of the topics learned in the course.

 

 d) Qualification review procedure

Continuous assessment activities will be reviewed in group sessions following the publication of grades. The mid term evaluations can be reviewed individually, upon request. 

e) Grades

- The grade of Not Evaluated will only be given to those students who do not participate in any of the assessment activities.

- The lecturer may assign Honors to those students who have stood out throughout the course, both for the grades obtained in the practical sessions and partial tests, and for their participation in class. In order to qualify for Honors  a minimum grade of 9 at the end of the subject will be required.

f) Irregularities by the student, copying, use of IA and plagiarism

Without prejudice to other disciplinary measures that are deemed appropriate, and in accordance with current academic regulations, irregularities committed by a student that may lead to a variation of the grade will be given a zero (0). For example, plagiarising, copying, submitting an activity fully generated by IA, allowing copying, etc., of an assessment activity, will result in failing that assessment activity with a zero (0). Assessment activities qualified in this way and by this procedure will not be recoverable. If it is necessary to pass any of these assessment activities to pass the subject, this subject will be failed directly, with no opportunity to recover it in the course.

h) Single evaluation

Single evaluation will only be accepted upon request by the student during the first week of the course and duly justified. Eligible students who opt for this evaluation will have a final exam covering the following:

- A test-type examination of the entire course. (70%)

- A case study with questions to be completed. (20%)

- Oral presentation of a topic related to the programme (10%)

- Second-call examination: If a student do not pass this exam, will have the possibility to access the second call, in the same conditions stated in section c) above.


Bibliography

 

Handbook for the course

 

-  Blasi Casagran C. & Cañabate Pérez, J (2024): LEGISLACION Y DERECHO DIGITAL PARA NO JURISTAS, Servei de Publicacions UAB, ISBN13 9788419333933

 

Additional bibliography

-      Barberán, Pascual (2020): Propiedad Intelectual para estudios de grado. Con cuadros sinópticos, preguntas de autoevaluación y glosario español-inglés, 1ª ed., Tecnos, I.S.B.N.: 978-84-309-7924-0

-      Blasi Casagran Cristina (2016): Global data protection in the field of law enforcement: An EU perspective, Routledge. Taylor & Francis Group, Oxfordshire, UK, June 2016. ISBN-10: 1138655384.

-      Davava Fernández Marcos, Elena, Davara Fernández Marcos, Laura, Davara Rodríguez, Miguel Ángel, (2020): Manual de Derecho Informático,  Madrid, Thomson Reuters Aranzadi, 2020, ISBN: 978-84-1346-478-7  (electronic resource)

-      del Rey Morató, Javier (2019): Comunicación política, Internet y campañas electorales. De la teledemocracia a la ciberdemocr@cia, Tecnos, Segunda edición, I.S.B.N.:  978-84-309-7720-8

-      López Calvo, José (2017): Comentarios al Reglamento Europeo de Protección de Datos, Sepin, Madrid, ISBN: 978-84-17009-04-5

-      Martínez González, Mª Mercedes (2014): Informática jurídica para estudiantes de derecho. Introducción a los sistemas de información y seguridad, Tecnos,  1ª edición, I.S.B.N.:  978-84-309-6193-1

-      Presno Linera, Miguel Ángel (2023): Inteligencia Artificial y derechos fundamentales, Marcial Pons, Madrid, ISBN: 978-84-1381-539-8

-      Garrote Fernández-Díez, Ignacio (2015) La responsabilidad de los intermediarios en Internet en materia de Propiedad Intelectual. Un estudio de Derecho Comparado, Tecnos, 1era ed., I.S.B.N.:  978-84-309-6458-1

-      De Miguel Asensio, Pedro A. (2015): Derecho privado de internet, editorial Civitas, Madrid.

-      Santos García, Daniel (2012) Nociones Generales de la Ley Orgánica de Protección de Datos y su Reglamento”, Editorial Tecnos, segunda edición, Madrid (España), 2012.

-      Savin, Andrej (2013): EU Internet Law, Editorial Elgar European Law, Glos (UK), 2013.

-      Soler, Pere; Piattini, Mario; Elias, Eduard (dir). (2016): Manual de Gestión y contratación informática (comentarios, jurisprudencia actualizada y formularios de contratos comentados, modelos oficiales del COEINF), editorial Aranzadi, Pamplona.

Besides this bibliography, the lecturer may provide other appropriate and up-to-date resources, along with regulations and legal texts. In addition, the lecturer will indicate what pieces are of obligatory reading and study, and what are recommendable.                                            

Links web

-      Handbook on European Data Protection Law: https://fra.europa.eu/en/publication/2018/handbook-european-data-protection-law-2018-edition

-       Spanish Agency of Data Protection: http://www.agpd.es/

-       Spanish Institute of Cybersecurity: https://www.incibe.es/

-       Spanish Cryptologic Centre: https://www.ccn-cert.cni.es/

-       E.Signature Portal: http://firmaelectronica.gob.es/

-       Spanish Cybersecurity Law: https://www.boe.es/legislacion/codigos/abrir_pdf.php?fich=173

-       Spanish Security Scheme: https://www.ccn-cert.cni.es/ens.html

-       WIPO portal: http://www.wipo.int/portal/es/ 

-        PCI DSS Law (e-payment): https://es.pcisecuritystandards.org  

-       ISO 27001 Law: http://www.iso.org/iso/home/standards/management-standards/iso27001.htm

 


Software

The subject does not require any specific software.


Language list

Name Group Language Semester Turn
(PAUL) Classroom practices 411 Spanish second semester morning-mixed
(PAUL) Classroom practices 412 Spanish second semester morning-mixed
(PAUL) Classroom practices 414 Catalan second semester morning-mixed
(PAUL) Classroom practices 415 Catalan second semester morning-mixed
(PAUL) Classroom practices 416 Spanish second semester afternoon
(PAUL) Classroom practices 417 Spanish second semester afternoon
(TE) Theory 410 Spanish second semester morning-mixed
(TE) Theory 415 Catalan second semester morning-mixed
(TE) Theory 417 Spanish second semester afternoon