Part A: Course Overview

Course Title: Case Studies in Data Protection and Privacy

Credit Points: 12.00


Course Coordinator: Maggie Liu

Course Coordinator Phone: -

Course Coordinator Email: Maggie.liu@rmit.edu.au

Course Coordinator Location: -

Course Coordinator Availability: Contact via email


Pre-requisite Courses and Assumed Knowledge and Capabilities

Recommended Prior Study 

It is recommended to have satisfactorily completed the following course/s before you commence this course: 

Alternatively, if you have the equivalent skills and knowledge covered in the above course/s you may be eligible for recognition of prior learning.  

Please contact your course coordinator for further details.


Course Description

Case Studies in Data Privacy and Security is a cutting-edge course designed to provide you with a comprehensive understanding of how to protect and manage data in an increasingly interconnected world. This course will introduce you to the fundamental concepts and practical applications of data privacy and security measures.

Throughout this course, you will engage with the principles and practices essential for safeguarding data. You will be introduced to state-of-the-art encryption methods that ensure data remains confidential, and collaborative computation techniques that enable collective data analysis while preserving individual privacy. The course will also cover advanced protection strategies to create secure environments within computing infrastructures.

In parallel with these technical aspects, you will learn about the legal frameworks that govern data privacy globally, including the General Data Protection Regulation (GDPR) and other significant privacy statutes. Understanding these regulations is crucial for navigating the complexities of compliance and ethical data handling in professional settings.

By examining a series of real-world case studies, you will gain insights into the challenges and consequences of data breaches and the importance of robust security protocols. These case studies will illustrate the practical realities of implementing data privacy and security measures, providing a rich context for learning. 

This course includes a Work Integrated Learning experience in which your knowledge and skills will be applied and assessed in a simulated workplace context and where feedback from the industry will be provided. Type of WIL activities involved: simulation of an industrial secure software engineering project. 


Objectives/Learning Outcomes/Capability Development

Program Learning Outcomes 

This course contributes to the program learning outcomes for the following program(s):

MC159 Master of Cyber Security

PLO 1: Apply an advanced and integrated understanding of scientific theories, principles, concepts, and practices in Cyber Security.

PLO 2: Design Cyber Security systems to meet enterprise requirements by employing advanced Cyber Security development tools, techniques and emerging technologies.

PLO 3: Design and implement Cyber Security solutions for contemporary Cyber Security issues using systematic problem solving and decision-making methodologies.

PLO 4: Formulate judgements in a team environment to develop Cyber Security solutions that adhere to organisational governance, professional standards, legal and ethical frameworks.

PLO 5: Communicate and collaborate ideas, threat analysis outcomes, project proposals and deliverables to multi-disciplinary stakeholders in various contexts, utilising a variety of digital platforms and traditional formats.

 

For more information on the program learning outcomes for your program, please see the program guide.


Course Learning Outcomes (CLOs) 

Upon successful completion of this course, you will be able to:  

CLO 1 Apply key theories, principles, and techniques in data privacy and security protection.

CLO 2 Demonstrate critically evaluating skills of the effectiveness of privacy-preserving techniques for practical applications.

CLO 3 Analyse the implications of data privacy laws and regulations, including the GDPR and Privacy Act, on organizational practices and compliance requirements.

CLO 4 Assess and interpret case studies that illustrate data privacy vulnerabilities faced by IT professionals and broader societal context of computing, and formulate strategies to mitigate potential security threats.

CLO 5 Demonstrate effective professional communication skills about complex data privacy issues and transmit this knowledge effectively to both specialist and non-specialist audiences, ensuring clarity and comprehension.

CLO 6 Demonstrate tangible evidence of research and practical capabilities to assess and improve upon current data privacy protection practices.


Overview of Learning Activities

You will be actively engaged in a range of learning activities such as lectorials, tutorials, laboratories, project work, class discussion, individual and group activities. Delivery may be face to face, online or a mix of both.

Key concepts are given on Canvas; Lectorial enables Q&A and further discussions; tools and software used will be demonstrated in the lab-tute. Laboratories are focused on practice which allow exploration of security loopholes, and give feedback on your progress and understanding. Assignments, as described in Overview of Assessment (below), require an integrated understanding of the subject matter; and private study, working through the course as presented in classes and learning materials, and gaining practice at solving conceptual and technical problems.


Overview of Learning Resources

RMIT will provide you with resources and tools for learning in this course through myRMIT Studies Course. The learning resources accessible through myRMIT Studies Course include: course related material, e-books, journals and databases.

There are services available to support your learning through the University Library. The Library provides guides on academic referencing and subject specialist help as well as a range of study support services. For further information, please visit the Library page on the RMIT University website and the myRMIT student portal


Overview of Assessment

Assessment Tasks 

The assessment for this course comprises three assignments. The lab practices and assignment involve implementation of cloud security techniques.

Note: This course has no hurdle requirements.

Assessment tasks

Assessment Task 1: Assignment 1 Industry Focused Assignment to demonstrate the fundamental concepts and techniques for data privacy protection.
Weighting: 30%
This assessment task supports CLOs 1, 2 & 3

Assessment Task 2: Assignment 2 Industry Focused Assignment demonstrating the ability to identify and mitigate different issues in existing data privacy protection applications.
Weighting: 40%
This assessment task supports CLOs 1, 2, 3, 4, 5 & 6

Assessment Task 3: Assignment 3 Industry Focused Assignment on designing data privacy protection systems for different scenarios.
Weighting: 30%
This assessment task supports CLOs 1, 2, 3, 4, 5 & 6

If you have a long-term medical condition and/or disability it may be possible to negotiate to vary aspects of the learning or assessment methods. You can contact the program coordinator or Equitable Learning Services if you would like to find out more.