This document provides the course outline for LAWS 4510A - Privacy Law & Policy, taught in the Fall 2012 term at Carleton University. The course will be taught on Thursdays from 6:05-8:55pm from September 6th to November 29th by instructor Louisa Garib. The course will provide an in-depth examination of privacy law and policy development, implications of new technologies, regulatory efforts to protect privacy, and will take philosophical, historical, legal, and policy perspectives, with a focus on Canada but also comparative international aspects. Students will be evaluated based on class participation, a personal information access assignment, a midterm exam, and a final research paper of 16-20 pages due on December
This document provides information from a Junior Parent College Night presentation at Foothill Technology High School. It includes the schedule of presentations on topics like the college timeline, standardized testing, financial aid, and college choice strategies. There are also sections providing details on these topics, such as requirements and deadlines for UC, CSU, and private colleges, when to take the SATs and ACTs, the FAFSA and scholarship application processes, and factors to consider when choosing a college.
This document provides an overview and requirements for the online Doctor of Education (EdD) degree program in Curriculum & Instruction at the University of South Carolina.
The program requires a minimum of 60 post-master's credit hours including 27 hours in core curriculum and instruction courses, 12 hours in research courses, 9 hours in a cognate area, passing a qualifying exam, completing a comprehensive exam portfolio, defending a dissertation proposal, taking 12 hours of dissertation credits, and defending the final dissertation.
The program is aimed at preparing scholarly practitioners to solve problems of practice through action research. Requirements include maintaining a 3.0 GPA, completing all degree requirements within 10 years, and satisfying residency requirements through full-time
This document is a syllabus for a 4.5 quarter credit Business Law course at Florida Technical College. The syllabus outlines the course description, learning objectives, instructional materials, schedule, assignments, grading criteria, and policies regarding attendance, academic conduct, and late work. Students will learn about legal topics and concepts, apply legal reasoning to business situations, and be evaluated through exams, assignments, attendance, and professionalism.
This transcript summarizes a student's graduate coursework and progress toward a PhD in Biological Sciences at GW University over several years. It shows the student maintaining a cumulative GPA of 3.87 while taking courses and conducting dissertation research. The transcript notes that it is not an official document and provides a phone number for questions.
The document provides information about high school graduation requirements, the differences between graduation and college entrance requirements, college admission testing programs, scholarships, career planning resources, and advice from college admissions officers. It outlines required courses and credits needed to graduate high school, recommends more rigorous classes for college entrance, and describes SAT, ACT, and Bright Futures testing and eligibility.
This document is a Higher Education Achievement Report (HEAR) for Miguel Marin Vermelho, who studied for a Bachelor of Science in Biomedical Sciences at University College London from 2013-2016. The HEAR provides information on Miguel's program of study, individual course results, and an overall classification that has not yet been awarded. It also describes UCL's context and policies regarding qualifications, credits, grading, and validation of the HEAR.
This Higher Education Achievement Report provides information about Kristian Lajkep's Bachelor of Arts with Honours degree in Philosophy and Political Economy from the University of Exeter. It details his personal information, degree information including modules and grades, and certifies that he achieved a First Class Honours classification. The report is intended to provide recognition of his qualifications to others and describes the UK higher education system and degree classification.
This document provides information from a Junior Parent College Night presentation at Foothill Technology High School. It includes the schedule of presentations on topics like the college timeline, standardized testing, financial aid, and college choice strategies. There are also sections providing details on these topics, such as requirements and deadlines for UC, CSU, and private colleges, when to take the SATs and ACTs, the FAFSA and scholarship application processes, and factors to consider when choosing a college.
This document provides an overview and requirements for the online Doctor of Education (EdD) degree program in Curriculum & Instruction at the University of South Carolina.
The program requires a minimum of 60 post-master's credit hours including 27 hours in core curriculum and instruction courses, 12 hours in research courses, 9 hours in a cognate area, passing a qualifying exam, completing a comprehensive exam portfolio, defending a dissertation proposal, taking 12 hours of dissertation credits, and defending the final dissertation.
The program is aimed at preparing scholarly practitioners to solve problems of practice through action research. Requirements include maintaining a 3.0 GPA, completing all degree requirements within 10 years, and satisfying residency requirements through full-time
This document is a syllabus for a 4.5 quarter credit Business Law course at Florida Technical College. The syllabus outlines the course description, learning objectives, instructional materials, schedule, assignments, grading criteria, and policies regarding attendance, academic conduct, and late work. Students will learn about legal topics and concepts, apply legal reasoning to business situations, and be evaluated through exams, assignments, attendance, and professionalism.
This transcript summarizes a student's graduate coursework and progress toward a PhD in Biological Sciences at GW University over several years. It shows the student maintaining a cumulative GPA of 3.87 while taking courses and conducting dissertation research. The transcript notes that it is not an official document and provides a phone number for questions.
The document provides information about high school graduation requirements, the differences between graduation and college entrance requirements, college admission testing programs, scholarships, career planning resources, and advice from college admissions officers. It outlines required courses and credits needed to graduate high school, recommends more rigorous classes for college entrance, and describes SAT, ACT, and Bright Futures testing and eligibility.
This document is a Higher Education Achievement Report (HEAR) for Miguel Marin Vermelho, who studied for a Bachelor of Science in Biomedical Sciences at University College London from 2013-2016. The HEAR provides information on Miguel's program of study, individual course results, and an overall classification that has not yet been awarded. It also describes UCL's context and policies regarding qualifications, credits, grading, and validation of the HEAR.
This Higher Education Achievement Report provides information about Kristian Lajkep's Bachelor of Arts with Honours degree in Philosophy and Political Economy from the University of Exeter. It details his personal information, degree information including modules and grades, and certifies that he achieved a First Class Honours classification. The report is intended to provide recognition of his qualifications to others and describes the UK higher education system and degree classification.
So you just finished quick start of Firebase. Or maybe you just heard about Firebase. ThreeBase tries to answer all your initial-questions-still-in-mind about Firebase effeciently right under 3 minutes!
El documento describe los diferentes tipos de capacidades físicas como la capacidad aeróbica y anaeróbica. La capacidad aeróbica se refiere a la habilidad de tolerar altos niveles de fatiga durante actividades de alta intensidad y corta duración como correr o nadar. La capacidad anaeróbica es la habilidad de soportar la falta de oxígeno por periodos prolongados como en levantamiento de pesas o abdominales. También describe diferentes métodos de entrenamiento como el continuo extensivo, continuo intensivo, continuo
Online Presentation Character development educationIwobe Kingsley S.
This document discusses the importance and benefits of character development education in schools in Africa. It argues that character education is essential for developing students' judgment, decision making, and understanding of moral principles. Character education empowers students to understand themselves and make effective personal choices that will impact their lives. It teaches ethics and helps develop students' minds and leadership skills. The document advocates for integrating character development into the curriculum to create a more well-rounded and high quality education program.
This document discusses Interhome's online optimization strategies. Interhome is a vacation rental company with over 45 years of experience and 46,000 properties. They receive over 15 million annual unique visitors to their websites. Interhome analyzes web analytics data like search terms, online campaigns, and traffic sources to understand user behavior and optimize aspects like the search functionality, marketing campaigns, and landing pages. The goal is to continuously improve the online customer experience and booking process.
The document describes an audit management system called Audit Management System IA that can automate the audit process. It allows auditors to plan audits, document controls and test plans, manage issues, and track resources. The system provides features for audit administration, documentation, issue management, and resource management. It aims to help auditors achieve a paperless audit process.
Este documento describe la potestad tributaria del Estado venezolano. Explica que la Constitución establece que solo el Estado puede ejercer la potestad tributaria al establecer obligaciones pecuniarias a los contribuyentes. Define la potestad tributaria como la facultad para crear tributos con el fin de recaudar recursos para cubrir el gasto público. Enumera las características de la potestad tributaria: es abstracta, permanente, irrenunciable e indelegable. Finalmente, distingue la competencia tributaria como la facultad legal del Estado para
Este documento define el Derecho Financiero y discute sus fuentes principales. En 3 oraciones:
El Derecho Financiero regula la obtención, manejo y aplicación de los recursos del Estado. Sus principales fuentes incluyen la Constitución, las leyes aprobadas por la Asamblea Nacional, y decretos con fuerza de ley que puede emitir el Presidente en casos de necesidad urgente y extraordinaria. El documento analiza las diferentes corrientes sobre la autonomía del Derecho Financiero y explica las características y proceso de formación de
A set is an unordered collection of objects that can be defined by listing elements or describing properties that elements satisfy. Sets are used to build discrete structures like counting, combinations, relations, and graphs. A function from a set X to a set Y is a relation where each element of X is mapped to an element of Y, and no element of X is mapped to more than one element of Y. A function is one-to-one if different elements of the domain map to different elements of the codomain, and onto if every element of the codomain is mapped to by some element of the domain.
This document outlines the process for constructing a football pitch including design and cost planning, setting project completion dates, managing the project progress, monitoring construction until completion, and final review of the finished pitch.
The Times implemented a paywall in July 2010 which led to a significant drop in visitors. In the first two weeks 150,000 people said they would pay but only 10-15% became subscribers. Visitor numbers fell by one third and have continued to drop. Cultural relevance, not a paywall, is key to attracting an audience and generating profits in the digital age. Allowing free access and finding new monetization methods can help publications maintain relevance.
1 School of Computer & Information Scien.docxadkinspaige22
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ISOL 535 – Cryptography
Section – 40/41
Summer 2020 – Main – Hybrid Course with Required Residency
Residency Session Date: 5/29/2020 – 5/31/2020
Friday 5pm – 10pm; Saturday 8am – 7:30pm; Sunday 8am-1pm
Residency Session Course Site: Washington, DC (Due to COVID Concerns, Summer 2020 Residency
Sessions will be hosted virtually)
Professor: Dr. Jason Hutcheson
Contact Information: Office Hours: By appointment
E-mail: [email protected]
Online Support (IT)
and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing,
information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
http://www.ucumberlands.edu/ilearn/
Course Description: The course examines methods and techniques for concealing data for security purposes. Topics covered will
include: cryptographic techniques, approaches and technologies.
Course
Objectives/Learner
Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
• Outline and explain the fundamentals of cryptography and information security.
• Understand the application of number theory to cryptography.
• Describe and Apply symmetric ciphers.
• Compare and Contrast the structure and application of block and stream ciphers.
• Describe and Apply asymmetric ciphers.
• Explain the function and application of cryptographic hash functions.
• Define and Describe the characteristics of message authentication codes.
• Define and Describe the characteristics of digital signatures.
• Summarize the goals and functions of lightweight and post-quantum cryptography.
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Required Text
Stallings, Williams. Cryptography and Network Security., 8th Ed., Pearson, 2020.
Print ISBN: 9780136681779
Other articles and readings may be assigned by course professor.
Recommended Materials/Resources
Harris, Shon. All in One CISSP Exam Guide, Sixth Edition. McGraw-Hill, 2013.
Paar, Christof, Pelzl,Jan and Preneel, Bart. Understanding Cryptography: A Textbook for Students and
Practitioners. Springer Publishing, 2010.
Rhodes-Ousley, Mark. The Complete Reference to Information Security, Second Edition. McGraw-Hill, 2013.
Professional Associations
http://www.ucumberlands.edu/it/downloads/terms.pdf
2
• International Association of Privacy Professionals (IAPP) - This Web site provides opportunity to interact
with a community of privacy professionals and to learn from their experiences. This Web site also provides
valuable career advice. https://www.privacyassociation.org/
• International Information Syste.
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ISOL 535 – Cryptography
Section – 40/41
Summer 2020 – Main – Hybrid Course with Required Residency
Residency Session Date: 5/29/2020 – 5/31/2020
Friday 5pm – 10pm; Saturday 8am – 7:30pm; Sunday 8am-1pm
Residency Session Course Site: Washington, DC (Due to COVID Concerns, Summer 2020 Residency
Sessions will be hosted virtually)
Professor: Dr. Jason Hutcheson
Contact Information: Office Hours: By appointment
E-mail: [email protected]
Online Support (IT)
and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing,
information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
http://www.ucumberlands.edu/ilearn/
Course Description: The course examines methods and techniques for concealing data for security purposes. Topics covered will
include: cryptographic techniques, approaches and technologies.
Course
Objectives/Learner
Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
• Outline and explain the fundamentals of cryptography and information security.
• Understand the application of number theory to cryptography.
• Describe and Apply symmetric ciphers.
• Compare and Contrast the structure and application of block and stream ciphers.
• Describe and Apply asymmetric ciphers.
• Explain the function and application of cryptographic hash functions.
• Define and Describe the characteristics of message authentication codes.
• Define and Describe the characteristics of digital signatures.
• Summarize the goals and functions of lightweight and post-quantum cryptography.
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Required Text
Stallings, Williams. Cryptography and Network Security., 8th Ed., Pearson, 2020.
Print ISBN: 9780136681779
Other articles and readings may be assigned by course professor.
Recommended Materials/Resources
Harris, Shon. All in One CISSP Exam Guide, Sixth Edition. McGraw-Hill, 2013.
Paar, Christof, Pelzl,Jan and Preneel, Bart. Understanding Cryptography: A Textbook for Students and
Practitioners. Springer Publishing, 2010.
Rhodes-Ousley, Mark. The Complete Reference to Information Security, Second Edition. McGraw-Hill, 2013.
Professional Associations
http://www.ucumberlands.edu/it/downloads/terms.pdf
2
• International Association of Privacy Professionals (IAPP) - This Web site provides opportunity to interact
with a community of privacy professionals and to learn from their experiences. This Web site also provides
valuable career advice. https://www.privacyassociation.org/
• International Information Syste.
1 School of Computer & Information Sciendrennanmicah
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ISOL 535 – Cryptography
Section – 40/41
Summer 2020 – Main – Hybrid Course with Required Residency
Residency Session Date: 5/29/2020 – 5/31/2020
Friday 5pm – 10pm; Saturday 8am – 7:30pm; Sunday 8am-1pm
Residency Session Course Site: Washington, DC (Due to COVID Concerns, Summer 2020 Residency
Sessions will be hosted virtually)
Professor: Dr. Jason Hutcheson
Contact Information: Office Hours: By appointment
E-mail: [email protected]
Online Support (IT)
and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing,
information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
http://www.ucumberlands.edu/ilearn/
Course Description: The course examines methods and techniques for concealing data for security purposes. Topics covered will
include: cryptographic techniques, approaches and technologies.
Course
Objectives/Learner
Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
• Outline and explain the fundamentals of cryptography and information security.
• Understand the application of number theory to cryptography.
• Describe and Apply symmetric ciphers.
• Compare and Contrast the structure and application of block and stream ciphers.
• Describe and Apply asymmetric ciphers.
• Explain the function and application of cryptographic hash functions.
• Define and Describe the characteristics of message authentication codes.
• Define and Describe the characteristics of digital signatures.
• Summarize the goals and functions of lightweight and post-quantum cryptography.
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Required Text
Stallings, Williams. Cryptography and Network Security., 8th Ed., Pearson, 2020.
Print ISBN: 9780136681779
Other articles and readings may be assigned by course professor.
Recommended Materials/Resources
Harris, Shon. All in One CISSP Exam Guide, Sixth Edition. McGraw-Hill, 2013.
Paar, Christof, Pelzl,Jan and Preneel, Bart. Understanding Cryptography: A Textbook for Students and
Practitioners. Springer Publishing, 2010.
Rhodes-Ousley, Mark. The Complete Reference to Information Security, Second Edition. McGraw-Hill, 2013.
Professional Associations
http://www.ucumberlands.edu/it/downloads/terms.pdf
2
• International Association of Privacy Professionals (IAPP) - This Web site provides opportunity to interact
with a community of privacy professionals and to learn from their experiences. This Web site also provides
valuable career advice. https://www.privacyassociation.org/
• International Information Syste ...
This course covers biometric usability testing with a focus on border control and mobile devices. The course objectives are to understand biometric systems, how people use them, testing methodologies, limitations, and research methods. Topics include genuine users, usability, attacks, border security, tokens, qualitative/quantitative research, and focus groups. Students will complete a research-based group project, assignments, and quizzes. The course uses lectures, discussions, guest speakers and students are expected to regularly attend and complete all work.
So you just finished quick start of Firebase. Or maybe you just heard about Firebase. ThreeBase tries to answer all your initial-questions-still-in-mind about Firebase effeciently right under 3 minutes!
El documento describe los diferentes tipos de capacidades físicas como la capacidad aeróbica y anaeróbica. La capacidad aeróbica se refiere a la habilidad de tolerar altos niveles de fatiga durante actividades de alta intensidad y corta duración como correr o nadar. La capacidad anaeróbica es la habilidad de soportar la falta de oxígeno por periodos prolongados como en levantamiento de pesas o abdominales. También describe diferentes métodos de entrenamiento como el continuo extensivo, continuo intensivo, continuo
Online Presentation Character development educationIwobe Kingsley S.
This document discusses the importance and benefits of character development education in schools in Africa. It argues that character education is essential for developing students' judgment, decision making, and understanding of moral principles. Character education empowers students to understand themselves and make effective personal choices that will impact their lives. It teaches ethics and helps develop students' minds and leadership skills. The document advocates for integrating character development into the curriculum to create a more well-rounded and high quality education program.
This document discusses Interhome's online optimization strategies. Interhome is a vacation rental company with over 45 years of experience and 46,000 properties. They receive over 15 million annual unique visitors to their websites. Interhome analyzes web analytics data like search terms, online campaigns, and traffic sources to understand user behavior and optimize aspects like the search functionality, marketing campaigns, and landing pages. The goal is to continuously improve the online customer experience and booking process.
The document describes an audit management system called Audit Management System IA that can automate the audit process. It allows auditors to plan audits, document controls and test plans, manage issues, and track resources. The system provides features for audit administration, documentation, issue management, and resource management. It aims to help auditors achieve a paperless audit process.
Este documento describe la potestad tributaria del Estado venezolano. Explica que la Constitución establece que solo el Estado puede ejercer la potestad tributaria al establecer obligaciones pecuniarias a los contribuyentes. Define la potestad tributaria como la facultad para crear tributos con el fin de recaudar recursos para cubrir el gasto público. Enumera las características de la potestad tributaria: es abstracta, permanente, irrenunciable e indelegable. Finalmente, distingue la competencia tributaria como la facultad legal del Estado para
Este documento define el Derecho Financiero y discute sus fuentes principales. En 3 oraciones:
El Derecho Financiero regula la obtención, manejo y aplicación de los recursos del Estado. Sus principales fuentes incluyen la Constitución, las leyes aprobadas por la Asamblea Nacional, y decretos con fuerza de ley que puede emitir el Presidente en casos de necesidad urgente y extraordinaria. El documento analiza las diferentes corrientes sobre la autonomía del Derecho Financiero y explica las características y proceso de formación de
A set is an unordered collection of objects that can be defined by listing elements or describing properties that elements satisfy. Sets are used to build discrete structures like counting, combinations, relations, and graphs. A function from a set X to a set Y is a relation where each element of X is mapped to an element of Y, and no element of X is mapped to more than one element of Y. A function is one-to-one if different elements of the domain map to different elements of the codomain, and onto if every element of the codomain is mapped to by some element of the domain.
This document outlines the process for constructing a football pitch including design and cost planning, setting project completion dates, managing the project progress, monitoring construction until completion, and final review of the finished pitch.
The Times implemented a paywall in July 2010 which led to a significant drop in visitors. In the first two weeks 150,000 people said they would pay but only 10-15% became subscribers. Visitor numbers fell by one third and have continued to drop. Cultural relevance, not a paywall, is key to attracting an audience and generating profits in the digital age. Allowing free access and finding new monetization methods can help publications maintain relevance.
1 School of Computer & Information Scien.docxadkinspaige22
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ISOL 535 – Cryptography
Section – 40/41
Summer 2020 – Main – Hybrid Course with Required Residency
Residency Session Date: 5/29/2020 – 5/31/2020
Friday 5pm – 10pm; Saturday 8am – 7:30pm; Sunday 8am-1pm
Residency Session Course Site: Washington, DC (Due to COVID Concerns, Summer 2020 Residency
Sessions will be hosted virtually)
Professor: Dr. Jason Hutcheson
Contact Information: Office Hours: By appointment
E-mail: [email protected]
Online Support (IT)
and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing,
information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
http://www.ucumberlands.edu/ilearn/
Course Description: The course examines methods and techniques for concealing data for security purposes. Topics covered will
include: cryptographic techniques, approaches and technologies.
Course
Objectives/Learner
Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
• Outline and explain the fundamentals of cryptography and information security.
• Understand the application of number theory to cryptography.
• Describe and Apply symmetric ciphers.
• Compare and Contrast the structure and application of block and stream ciphers.
• Describe and Apply asymmetric ciphers.
• Explain the function and application of cryptographic hash functions.
• Define and Describe the characteristics of message authentication codes.
• Define and Describe the characteristics of digital signatures.
• Summarize the goals and functions of lightweight and post-quantum cryptography.
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Required Text
Stallings, Williams. Cryptography and Network Security., 8th Ed., Pearson, 2020.
Print ISBN: 9780136681779
Other articles and readings may be assigned by course professor.
Recommended Materials/Resources
Harris, Shon. All in One CISSP Exam Guide, Sixth Edition. McGraw-Hill, 2013.
Paar, Christof, Pelzl,Jan and Preneel, Bart. Understanding Cryptography: A Textbook for Students and
Practitioners. Springer Publishing, 2010.
Rhodes-Ousley, Mark. The Complete Reference to Information Security, Second Edition. McGraw-Hill, 2013.
Professional Associations
http://www.ucumberlands.edu/it/downloads/terms.pdf
2
• International Association of Privacy Professionals (IAPP) - This Web site provides opportunity to interact
with a community of privacy professionals and to learn from their experiences. This Web site also provides
valuable career advice. https://www.privacyassociation.org/
• International Information Syste.
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ISOL 535 – Cryptography
Section – 40/41
Summer 2020 – Main – Hybrid Course with Required Residency
Residency Session Date: 5/29/2020 – 5/31/2020
Friday 5pm – 10pm; Saturday 8am – 7:30pm; Sunday 8am-1pm
Residency Session Course Site: Washington, DC (Due to COVID Concerns, Summer 2020 Residency
Sessions will be hosted virtually)
Professor: Dr. Jason Hutcheson
Contact Information: Office Hours: By appointment
E-mail: [email protected]
Online Support (IT)
and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing,
information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
http://www.ucumberlands.edu/ilearn/
Course Description: The course examines methods and techniques for concealing data for security purposes. Topics covered will
include: cryptographic techniques, approaches and technologies.
Course
Objectives/Learner
Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
• Outline and explain the fundamentals of cryptography and information security.
• Understand the application of number theory to cryptography.
• Describe and Apply symmetric ciphers.
• Compare and Contrast the structure and application of block and stream ciphers.
• Describe and Apply asymmetric ciphers.
• Explain the function and application of cryptographic hash functions.
• Define and Describe the characteristics of message authentication codes.
• Define and Describe the characteristics of digital signatures.
• Summarize the goals and functions of lightweight and post-quantum cryptography.
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Required Text
Stallings, Williams. Cryptography and Network Security., 8th Ed., Pearson, 2020.
Print ISBN: 9780136681779
Other articles and readings may be assigned by course professor.
Recommended Materials/Resources
Harris, Shon. All in One CISSP Exam Guide, Sixth Edition. McGraw-Hill, 2013.
Paar, Christof, Pelzl,Jan and Preneel, Bart. Understanding Cryptography: A Textbook for Students and
Practitioners. Springer Publishing, 2010.
Rhodes-Ousley, Mark. The Complete Reference to Information Security, Second Edition. McGraw-Hill, 2013.
Professional Associations
http://www.ucumberlands.edu/it/downloads/terms.pdf
2
• International Association of Privacy Professionals (IAPP) - This Web site provides opportunity to interact
with a community of privacy professionals and to learn from their experiences. This Web site also provides
valuable career advice. https://www.privacyassociation.org/
• International Information Syste.
1 School of Computer & Information Sciendrennanmicah
1
School of Computer & Information Sciences
COURSE SYLLABUS
Course Name: ISOL 535 – Cryptography
Section – 40/41
Summer 2020 – Main – Hybrid Course with Required Residency
Residency Session Date: 5/29/2020 – 5/31/2020
Friday 5pm – 10pm; Saturday 8am – 7:30pm; Sunday 8am-1pm
Residency Session Course Site: Washington, DC (Due to COVID Concerns, Summer 2020 Residency
Sessions will be hosted virtually)
Professor: Dr. Jason Hutcheson
Contact Information: Office Hours: By appointment
E-mail: [email protected]
Online Support (IT)
and I-Learn Policy:
All members of the University of the Cumberlands’ community who use the University’s computing,
information or communication resources must act responsibly.
http://www.ucumberlands.edu/it/downloads/terms.pdf
Course Website: Access to the course website is required via the iLearn portal on the University of the Cumberlands website:
http://www.ucumberlands.edu/ilearn/
Course Description: The course examines methods and techniques for concealing data for security purposes. Topics covered will
include: cryptographic techniques, approaches and technologies.
Course
Objectives/Learner
Outcomes:
Course Objectives/Learner Outcomes:
Upon completion of this course, the student will:
• Outline and explain the fundamentals of cryptography and information security.
• Understand the application of number theory to cryptography.
• Describe and Apply symmetric ciphers.
• Compare and Contrast the structure and application of block and stream ciphers.
• Describe and Apply asymmetric ciphers.
• Explain the function and application of cryptographic hash functions.
• Define and Describe the characteristics of message authentication codes.
• Define and Describe the characteristics of digital signatures.
• Summarize the goals and functions of lightweight and post-quantum cryptography.
Prerequisites: There are no prerequisites for this course.
Books and
Resources:
Required Text
Stallings, Williams. Cryptography and Network Security., 8th Ed., Pearson, 2020.
Print ISBN: 9780136681779
Other articles and readings may be assigned by course professor.
Recommended Materials/Resources
Harris, Shon. All in One CISSP Exam Guide, Sixth Edition. McGraw-Hill, 2013.
Paar, Christof, Pelzl,Jan and Preneel, Bart. Understanding Cryptography: A Textbook for Students and
Practitioners. Springer Publishing, 2010.
Rhodes-Ousley, Mark. The Complete Reference to Information Security, Second Edition. McGraw-Hill, 2013.
Professional Associations
http://www.ucumberlands.edu/it/downloads/terms.pdf
2
• International Association of Privacy Professionals (IAPP) - This Web site provides opportunity to interact
with a community of privacy professionals and to learn from their experiences. This Web site also provides
valuable career advice. https://www.privacyassociation.org/
• International Information Syste ...
This course covers biometric usability testing with a focus on border control and mobile devices. The course objectives are to understand biometric systems, how people use them, testing methodologies, limitations, and research methods. Topics include genuine users, usability, attacks, border security, tokens, qualitative/quantitative research, and focus groups. Students will complete a research-based group project, assignments, and quizzes. The course uses lectures, discussions, guest speakers and students are expected to regularly attend and complete all work.
SDV 100_49w_Fall 2012 8 week_FYE section Class syllabus_Work In ProgressCedric Steele
This document provides information about an SDV 100 First Year Experience course at Northern Virginia Community College. It outlines the course details including instructor information, materials, description, student learning outcomes, policies, schedule and assignments. The course aims to help students transition successfully to college by developing academic skills, self-management techniques, decision-making abilities, and an understanding of campus resources and policies. Students will complete readings, activities, and assignments over the 8-week session to assess their progress towards these learning outcomes.
This document outlines the syllabus for an economics course on development planning and project evaluation. The course will introduce tools for analyzing the financial and economic impacts of development projects. It will cover principles of cost-benefit analysis, identification and valuation of costs and benefits, and decision criteria for project evaluation. Students will be evaluated based on class participation, an assignment, two midterm exams, and a final exam. The course readings will include a textbook on economic analysis of investment operations as well as other sources on cost-benefit analysis and development planning.
This document provides the course syllabus for an online college success strategies course. The syllabus outlines the instructor contact information, course description and competencies, student learning outcomes, required materials, assignments and activities, technology needs, academic integrity policy, attendance policy, grading scale, and tentative course calendar. The course aims to help students develop strategies for academic and career success through assignments such as creating a Starfish profile, completing library and campus activities, participating in online discussions, and meeting with an advisor. Students will earn points toward their final grade by completing pre-tests, weekly attendance checks, assignments related to time management, test anxiety, and diversity awareness.
School of computer and information sciences course syllabusAKHIL969626
This course syllabus outlines an online graduate course on organizational leadership and decision making. The course will use a case study approach to examine technology decisions in business. Students will develop skills in understanding the components of technology decisions and assessing associated risks. The syllabus provides information on the instructor, course objectives, learner outcomes, required materials, assignments, and policies. Students will be evaluated based on exams, assignments, discussions, and a practical connection project. The course schedule lists weekly topics, resources, and assignment due dates.
This document outlines the syllabus for the ACA 122 College Transfer Success course at Cleveland Community College. The course is online for 7 weeks during the fall 2015 semester and aims to provide students with strategies to develop clear academic and career goals beyond community college. Topics include the Comprehensive Articulation Agreement, college resources and policies, career exploration, and transferring to four-year institutions. Students will create an academic plan and evaluate their learning styles and interests to aid in their transition to a university. The syllabus details course objectives, assignments, grading policies, technology requirements, and the instructor's contact information.
This document provides a course syllabus for an online college success strategies course. It outlines the instructor contact information, course description and competencies, learning outcomes, required activities and assignments, technology needs, academic integrity policy, attendance policy, grading scale, and tentative weekly schedule. The course introduces students to strategies for self-management, use of campus resources, and academic success. Students are required to complete various assignments each week related to topics like time management, test anxiety, learning styles, and careers. They must also participate in at least 5 approved campus activities.
This document provides information about the Junior/Intermediate Language Arts course EDUC8P20 taught by Ruth McQuirter Scott in the Fall 2014/2015 term. The course examines principles of language learning and their application to teaching listening, speaking, reading and writing. Students will explore using language in various contexts and develop a blended learning unit. The course has assignments including weekly postings, a novel study, infographic, and collaborative inquiry unit. Policies around attendance, academic integrity and accommodation are also outlined.
Bramson ort college_distance_learning_instructor_guideShelly Santos
This document provides policies and guidelines for instructors teaching distance learning courses at Bramson ORT College. It outlines instructor responsibilities such as maintaining up-to-date course content, checking email frequently, entering grades on time, and complying with college policies. It also provides guidance on using Blackboard, the learning management system, including how to post course content and assessments. Instructors are expected to support student success and direct students to available resources.
This 3 credit hour course titled "Technology for Teachers" meets on Tuesdays and Thursdays from 2:30-3:45pm in room NKM 117. The course focuses on helping future teachers learn how to integrate instructional technology into K-12 classrooms. Students will study software programs, presentation tools, and telecommunication tools, as well as social, ethical, and legal issues related to technology use. The course involves various projects using technological tools. Grades are based 80% on assignment projects and 20% on a comprehensive final exam. The syllabus outlines course objectives, policies on attendance, late work, and other relevant information.
NUR 2680L Community Health Nursing lab Course NuVannaJoy20
NUR 2680L Community Health Nursing lab
Course Number: NUR 2680L Term: 2213 (Spring 2021)
Course Reference Number: 4946
Meeting Days/Time: Mondays 5:00pm- 8:00pm (January 11th- April 19th, 2021)
Location: Remote Learning via Blackboard Collaborate
Instructor’s Name: Rashida Stewart, MPH, MSN-Ed, RN
E-mail Address: [email protected]
Office Phone: 305-237-4519, for faster contact use the Remind app class code CHN2021
Office Hours: Before Class on Mondays
Course Description: This laboratory course assists the students in applying knowledge of
community health resources. Students will learn to manage health resources to
support the delivery of care to the individuals, families, and target populations
within the community. Special emphasis is placed on the understanding cultural
influences, social justice, and the impact of the nurse on the community.
Course Credits: 1 Credit
Pre-requisites: NUR 1025, NUR 1025C, NUR 1025L, NUR 1060C, NUR 1141, NUR 1211, NUR
1211L, NUR 1214C, NUR 1002, NUR 1002L, NUR1142
Co-requisites: NUR 2310, NUR 2310L, NUR 2520, NUR 2520L, NUR 2420L,
NUR2420
MDC Learning Outcomes:
1. Communicate effectively using listening, speaking, reading, and writing skills.
2. Use quantitative analytical skills to evaluate and process numerical data.
3. Solve problems using critical and creative thinking and scientific reasoning.
4. Formulate strategies to locate, evaluate, and apply information.
5. Demonstrate knowledge of diverse cultures, including global and historical perspectives.
6. Create strategies that can be used to fulfill personal, civic, and social responsibilities.
7. Demonstrate knowledge of ethical thinking and its application to issues in society.
8. Use computer and emerging technologies effectively.
9. Demonstrate an appreciation for aesthetics and creative activities.
10. Describe how natural systems function and recognize the impact of humans on the environment.
End-of-Program Student Learning Outcomes:
1. Develop a professional identity that demonstrates teamwork, collaboration, effective communication
and adhere to standards of practice for nursing.
2. Implement safety and quality initiatives in the delivery of holistic patient-centered care.
3. Utilize technological resources to effectively deliver care which enhances positive patient outcomes.
4. Deliver compassionate care to diverse populations with respect to individuality and clients’ needs.
5. Uses relevant evidence to improve clients’ outcomes within a dynamic environment.
Course Student Learning Outcomes:
At the end of the course the student will be able to:
At the end of the course the student will be able to:
1. Understand the dynamic and inter-related factors influencing health outcomes for various segments
of the population. (Meets Unit Objectives/ Competencies 1 &2)
2. Analyze and apply data to support the care of individuals, fa ...
The document provides information about the Department of Computer Science at George Washington University. It includes the following key details:
- The department has 20 full-time faculty, 30 part-time faculty, and over 700 graduate students between MS and PhD programs. Annual research expenditures total over $2 million.
- Areas of focus within the computer science program include cybersecurity, artificial intelligence, robotics, systems, and communications.
- Requirements for the PhD program include a minimum number of course credits, preliminary examinations, colloquium attendance, and the acceptance of peer-reviewed papers for publication by the time of dissertation defense.
- Contact information and links to resources like the registrar, course schedules,
This document provides information about an online Success and Study Skills course at Cleveland Community College. The course is 14 weeks long and covers topics like time management, learning styles, critical thinking, and choosing a major. Students must complete weekly modules that include readings, discussions, and quizzes. The final grade is based on participation and completion of 12 modules. The course aims to help students develop skills for academic and career success.
Internet Explorer 6 is no longer supported. Please use a newer bro.docxmariuse18nolet
Internet Explorer 6 is no longer supported. Please use a newer browser.
Internet Explorer 7 is no longer supported. Please consider a newer browser.
Concourse works best with JavaScript enabled.
Toggle navigation
· Syllabus
· View
· Print
· Info
CMIT 451 6380 Implementing Cisco IP Routing (2162)
University of Maryland University College • Adelphi • Syllabus •
CMIT 451 6380 Implementing Cisco IP Routing (2162) CMIT-451
· Spring 2016
· Section 6380
· 3 Credits
· 01/11/2016 to 03/06/2016
Faculty Contact
Robert Chubbuck [email protected]
Course Description
Designed to help students prepare for the Cisco 300-101 ROUTE [Implementing Cisco IP Routing] Exams.) Prerequisite: CMIT 350. A comprehensive study of the implementation of a routed network using Cisco Systems Technologies. The goal is to use advanced IP routing and scalability solutions to increase the number of routers and sites without redesigning the LAN or WAN. Topics include configuration of secure routing solutions, configuration and troubleshooting of various routed environments (access, distributed, and core), and management of access and control. Students may receive credit for only one of the following: CMIT 451 or CMIT 499E.
Course Introduction
This course covers the requirements for one of the qualifying exams for the Cisco Certified Network Professional (CCNP), Cisco Certified Internetwork Professional (CCIP), and Cisco Certified Design Professional (CCDP) certifications.
Projects include configuring and implementing EIGRP, OSPF, and BGP routing protocols, implementing teleworking support services, configuring basic broadband connections, and using GRE tunnels for implementing VPNs.
UMUC does not guarantee that by completing this course you will pass the exam, nor does it provide the exam to you. The cost of the exam is not included in registration fees for the course. Registration for the exam can be done online at www.prometric.com or www.vue.com
Course Outcomes
After completing this course, students should be able to
· analyze network requirements to determine appropriate routing solutions for an organization's needs
· develop valid and reliable implementation, verification, and proactive monitoring plans based on industry standards
· configure and implement appropriate routing solutions that are scalable and secure
Course Materials
Click to access your course materials information
Class Guidelines
Students with Questions or Concerns
If you have questions related to the course content or any of the graded deliverables, contact me. For questions and concerns related to advising, e-mail [email protected] or call 301-985-7000 (toll-free: 800-888-8682).
For other questions and concerns, you can contact your academic director by writing to [email protected] or calling (240) 684-2882. Be sure to mention the course name, course number, and your section number in the subject field of your e-mail. Your e-mail will be treated confidentially.
Writing and Research
Effective w.
Columbia Southern University has several policies and procedures to ensure high quality education. These include using Remote Proctor Now (RP Now) for virtual proctoring of exams, following the Academic Integrity Policy and violation procedures, and allowing students to resubmit assignments by ignoring the first attempt. Faculty must also encourage students to improve general education competencies and submit faculty absence requests in advance. Part-time faculty may have reduced pay for absences exceeding 14 days.
This syllabus outlines the course information, objectives, format, and policies for FIN 487 - Derivatives, a 3-credit course offered in the fall 2015 semester. The course will cover forwards, futures, swaps, and options using lectures, homework, quizzes, a midterm exam, and a final exam. Students are expected to participate in online discussions and complete all assignments by the stated deadlines. Grades will be based on in-class participation, quizzes, exams, and adherence to the university's academic integrity and conduct policies.
Gpmt 385 syllabus university content fall ii 2010Meej Xyooj
This 3 credit course focuses on global project management topics through open forum discussions with corporate project managers. Students will learn how project management applies across industries and global environments. Specific topics that may vary each year include managing people globally, project planning, risk management, and professional responsibilities. Learning outcomes include explaining the role of project management domestically and abroad, applying theories to case studies, preparing project charters, implementing strategies, and assessing risks. Required textbooks provide foundation in contemporary project management practices.
Similar to Laws 4510 Privacy Law And Policy 2012 (20)
1. Last Updated Sept 15 2012
Carleton University Department of Law and Legal Studies
Course Outline
COURSE: LAWS 4510 A – Privacy Law & Policy
TERM: FALL 2012
PREREQUISITES: fourth-year Honours standing and 1.0 credit from LAWS 2005
[1.0] (no longer offered), LAWS 2501, LAWS 2502
CLASS: Day & Thursdays, 6:05-8:55 PM (September 6th – November 29 2012)
Time:
Room: Please confirm with Carleton Central for current room location.
INSTRUCTOR: Louisa Garib, MA, LLB, LLM
(CONTRACT)
CONTACT: Office Hrs: Thursdays, 5:00-6:00pm – *in advance, by appointment*
Telephone: 613-995-2066 during regular work hours (9am-5pm).
Email: Louisa_Garib@carleton.ca
You may need special arrangements to meet your academic obligations during the term. For an accommodation
request the processes are as follows:
Pregnancy obligation: write to me with any requests for academic accommodation during the first two weeks of
class, or as soon as possible after the need for accommodation is known to exist. For more details visit the Equity
Services website: http://www2.carleton.ca/equity/
Religious obligation: write to me with any requests for academic accommodation during the first two weeks of
class, or as soon as possible after the need for accommodation is known to exist. For more details visit the Equity
Services website: http://www2.carleton.ca/equity/
Academic Accommodations for Students with Disabilities: The Paul Menton Centre for Students with
Disabilities (PMC) provides services to students with Learning Disabilities (LD), psychiatric/mental health
disabilities, Attention Deficit Hyperactivity Disorder (ADHD), Autism Spectrum Disorders (ASD), chronic medical
conditions, and impairments in mobility, hearing, and vision. If you have a disability requiring academic
accommodations in this course, please contact PMC at 613-520-6608 or pmc@carleton.ca for a formal
evaluation. If you are already registered with the PMC, contact your PMC coordinator to send me your Letter of
Accommodation at the beginning of the term, and no later than two weeks before the first in-class scheduled test
or exam requiring accommodation (if applicable). After requesting accommodation from PMC, meet with me to
ensure accommodation arrangements are made. Please consult the PMC website for the deadline to request
accommodations for the formally-scheduled exam (if applicable) at http://www2.carleton.ca/pmc/new-and-current-
students/dates-and-deadlines/
You can visit the Equity Services website to view the policies and to obtain more detailed information on
academic accommodation at http://www2.carleton.ca/equity/
COURSE DESCRIPTION
This seminar course provides an in-depth look into privacy: privacy law and policy development; the
privacy implications of information technologies and new business models; state encroachment into the
private sphere; and regulatory efforts to protect privacy. Students will study privacy from philosophical,
historical, legal, and policy perspectives. While rooted in the Canadian context, the course will also
have a comparative international facet.
2. LAWS 4510A Privacy Law & Policy 2 Prof. L Garib Fall 2012
This course is intended primarily for upper year (4th year) students. Students do not necessarily require
a background in law, public affairs or political science however the course will include a considerable
amount of reading, class discussion and critical thinking. Writing, research, analytical and
communication skills will be emphasized. This is a seminar course. Students are expected to regularly
participate and at times lead class discussions based on the weekly readings and privacy issues in the
news.
The course syllabus may change to accommodate student/instructor requirements. Changes will be
made with as much advance notice as possible. Please check WebCT regularly for updates and
additional information and materials and Carleton’s Undergraduate Calendar for relevant dates and
deadlines: http://www4.carleton.ca/calendars/ugrad/current/pdf/ and
http://calendar.carleton.ca/undergrad/undergraduniversity/academicyear/
REQUIRED TEXTS
None.
SUPPLEMENTARY TEXTS
Links to relevant video and audio resources, articles, news clippings and administrative decisions will
be distributed to the class and/or posted to Carleton WebCT in advance.
EVALUATION (All components must be completed in order to get a passing grade.)
Class Participation/Group Discussion (20%)
- Weekly participation in group discussions, throughout the course.
Access to personal information assignment (10%) (3-5 pages)
• A copy of the written access request you made to a municipal or provincial institution is due by
September 20th.
• Report on the process, summary of the institutional response and privacy analysis due by
November 29th at the last class
• The Report should include whether you, as the requestor were satisfied with the institution’s
response. Why or why not? Were there any corrections to your personal information needed or
other concerns? Did the institution respond to you within statutory deadlines and according to
other statutory requirements?
• The Report should reflect your analysis of the access process and outcome in terms of your
perspective on how your personal information is collected, used, retained and potentially
disclosed. The Report should also comment on your ability to access, correct and control your
personal information.
Midterm Exam on Thursday, October 18th (30%)
• An Exam Guide will be posted on WebCT.
Final Research Paper (16-20 pages) DUE Monday December 3rd (40%)
• Students are strongly encouraged to discuss their final essay topic with me after the mid-term
exam.
• An Essay Guide will be posted on WebCT
For both the mid-term exam and final paper, students should note the Law Department’s Style Sheet at
3. LAWS 4510A Privacy Law & Policy 3 Prof. L Garib Fall 2012
http://www1.carleton.ca/law/ccms/wp-content/ccms-files/legal_style_sheet.pdf
**Confirm what time the Department of Law & Legal Studies Office closes on
Monday, December 3rd to ensure that your final paper is stamped as being received by
the due date.**
How is participation graded?
I will be looking for a number of things when I evaluate student participation throughout this seminar
course:
1) Preparedness. Has the student done the reading and brought the reading and notes to class?
2) Quality of comments. Did the student contribute to the overall flow of discussion, make
3) comments that were informed by the readings and the issues at hand, move the conversation
forward, use examples from the readings to help back up their points?
4) Initiative and responsiveness. Did the student both initiate dialogue and engage in the
5) dialogue initiated by others?
6) Quality of listening. Did the student listen to others, follow up on other students’ comments,
ask questions of classmates?
DEPARTMENTAL POLICY AND PROCEDURE:
Deferred Final Examinations and Final Assignments (including final papers/essays)
A student who is unable to write a scheduled final examination, or complete a final take-home
assignment (0.5 credit/one term course), because of illness or other circumstances beyond his/her
control, or whose performance on the examination has been impaired by such circumstances, may, on
application to the Registrar’s Office, be granted permission to write a deferred final exam or assignment
with proper documentation. Your instructor cannot grant you a deferral of a Final Assignment.
Applications for deferred final assignments must:
• be made in writing to the appropriate Registrar’s Office no later than 5 business days after the
date of the examination or the last day of classes; and
• be fully supported in the case of illness by a medical certificate or by appropriate documents in
other cases (e.g. bereavement documentation).
• Medical documents must specify the date of the onset of the illness, the (expected) date of
recovery, and the extent to which the student was/is incapacitated during the time the exam or
assignment was to be prepared. For further information see:
http://www1.carleton.ca/registrar/special-requests/deferral/
Granting of a deferral requires that the student has performed satisfactorily in the course according to
the evaluation scheme established in the Course Outline (excluding the final exam for which deferral
privileges are requested). Reasons for denial of a deferral may include, among other conditions, a
failure to (i) achieve a minimum score in the course before the final examination; (ii) attend a minimum
number of classes; (iii) successfully complete a specific task (e.g. term paper, critical report, group
project, computer or other assignment); (iv) complete laboratory work; (v) successfully complete one or
more midterms; or (vi) meet other reasonable conditions of successful performance. Consult Carleton’s
Undergraduate Calendar for 2012-2013 for academic and administrative deadlines:
http://calendar.carleton.ca/undergrad/
Important Note: Plagiarism on Exams, Papers and Class Assignments
4. LAWS 4510A Privacy Law & Policy 4 Prof. L Garib Fall 2012
Each student’s assignment, exam answers and final paper must be exclusively his or her own work
product. All work must be done independently; no group work or consultation other than class
discussion is permitted. Students are not permitted to discuss the exam questions and possible
answers with each other, with the exception of discussion supervised by the Instructor.
Carleton’s Academic Integrity Policy: http://www1.carleton.ca/studentaffairs/academic-integrity/ . For
further instructions and warnings on issues such as prerequisites, assignments and grading (including
the Department’s policy on plagiarism), students should consult the Law Department’s Policy and
Procedure Statement and the relevant pages in the University’s Undergraduate Calendar
http://calendar.carleton.ca/undergrad/
STUDENT SERVICES:
The Student Academic Success Centre (SASC) can provide you with help learning how to research
and write a solid academic paper. The Advising Centre is at 302 Tory and the Writing Tutorial Service is
located on the 4th Floor MacOdrum Library. For more information see
http://www1.carleton.ca/sasc/writing-tutorial-service/. You are strongly encouraged to avail yourself of
these helpful resources, particularly if you feel that you need to develop your research and writing skills.
MY POLICY:
Reasonableness: The "Reasonable Person Principle" applies throughout this seminar course. This
principle is simply that a reasonable request made in a reasonable fashion shall be reasonably handled
by reasonable persons. Let's all be "reasonable people" working on the same team to make this a
positive learning experience.
Reading: You will be given reading assignments associated with each class. You should finish the
readings before coming to class in order to effectively participate and engage in a meaningful
discussion with your colleagues. LAWS 4510A is a 4th year seminar class, not a lecture course.
Seminar participation: A seminar is a group of people who come together to discuss a particular topic.
The topic of this seminar course is privacy law and policy. While your past lecture classes likely tended
to emphasize canvassing a topic through lectures and readings, this seminar will emphasize intense
reading of a variety of books and articles followed by group discussion about questions and themes that
arise from the materials and ideas that resonate with your classmates. There will be no lectures in this
class. This class is about what you think, after having read the materials and engaging your colleagues
about what they think.
ADVICE FOR SUCCESS IN THIS COURSE:
1) Read the course outline.
2) Do the seminar readings.
3) Make notes as you read.
4) Come to class.
5) Engage in discussion.
5. LAWS 4510A Privacy Law & Policy 5 Prof. L Garib Fall 2012
6) Listen and be respectful of others. In order to create a productive learning environment, you are
expected to treat all comments and questions with respect and civility.
7) Take chances and speak your mind, even (especially!) when you disagree with others or with
your Instructor. Ask questions when you are confused or curious about something — chances are
that you are not alone.
8) Check Web CT regularly – it’s where readings, instructions, the course syllabus and other course
materials are posted and updated
9) Communicate with me via my Carleton.ca email address listed in the syllabus rather than Web
CT. You can also always call me at my office during regular business hours (613-995-2066) and
leave a message. I will endeavour to return your phone call within 48 hours. You can always speak
to me before or after class or arrange for an appointment.
10) Identify concerns or needs ASAP and get the help you need – take control of the situation.
Don’t let things get out of hand and try to address issues at the last minute or after the fact. As your
Professor, I will do my best to help you.
Cheating/Plagiarism is considered a very serious offense. Please don't do it. Concern about cheating
and plagiarism creates an unpleasant environment for everyone. If you cheat or plagiarize, you risk
losing your position as a student in your programme and the university - and I have zero tolerance for
it. The Department's policy on cheating is to report any cases to the Department Chair. What follows
afterwards is not fun for anyone. It’s not worth it. Just do the work, and put it in your own words. Be
assured that I do take the time to carefully read all of your exams and assignments.
MID-TERM (Thursday October 18, 2012) ACCOMMODATION & DEFERRALS
You must pass the mid-term in order to pass the course. Paul Menton Students should request exam
accommodation a minimum of two weeks in advance. You are strongly encouraged to make
arrangements sooner. Deferrals will only be granted for medical reasons. Contacting your Instructor via
phone and/or email and obtaining documentation should be done in a timely manner and:
• be fully supported in the case of illness by a medical certificate or by appropriate documents in
other cases (e.g. bereavement documentation).
• Medical documents must specify the date of the onset of illness, that the student was/is
incapacitated during the time the exam was to be written, and the expected date of recovery.
(See http://www1.carleton.ca/registrar/special-requests/deferral/ as a guide)
ANTICIPATED COURSE SCHEDULE (Thursday evenings, 6:04-9:04)
Important Dates:
First Class: Thursday, Sept 6th
Last Class: Thursday, November 29th - ATIP Assignment DUE
Access to (personal) information assignment:
• Hand in copy of written access request made on Thursday, September 20th
• Report due by Thursday November 29th at the last class
Mid-Term Exam: Thursday, October 18th 2012
Final Essay: DUE Monday, December 3rd 2012 (Last day that can be specified by a course
6. LAWS 4510A Privacy Law & Policy 6 Prof. L Garib Fall 2012
instructor as a due date for term work for fall term courses)
Dates I will not be available via phone or e-mail:
•
Monday and Tuesday September 17th-18th
•
Wednesday September 26th
Week 1: Course Introduction, Expectations, ATIP Assignment
Sept 06
Resource: CIPPIC’s Access to Information Manual - See Section II: Access to
Somebody's Personal Information
Watching Me, http://www.idtrail.org/index.php?option=com_content&task=view&id=284&Itemid=8
Rockwell 8
I always feel like /
Somebody's Tom Chivers, “The Get Out Clause, Manchester stars of CCTV
watching me / Many people are uncomfortable with the march of the surveillance state – but a
And I have no Manchester band has used it to their advantage,” The Telegraph, May 2008
privacy
http://www.telegraph.co.uk/news/newstopics/howaboutthat/1938076/The-Get-Out-
Clause-Manchesters-stars-of-CCTV-cameras.html
Week 2: What is Privacy? Privacy as a Legal & Philosophical Concept: An examination of
Sept 13 privacy from various perspectives: the relationship between the individual and society;
privacy, identity and autonomy; privacy as a human right; the role of privacy in
Cowardly mediating the relationship between the individual and state; the role of privacy in a
Custard, King democracy.
Creosote
George Orwell, Nineteen Eighty-Four, 1949 (Part 1, Ch. 1)
Did you just have http://ebooks.adelaide.edu.au/o/orwell/george/o79n/
me wired/
Keeping a tab on R. v. Tessling, 2004 SCC 67, [2004] 3 S.C.R. 432
my motion/ http://scc.lexum.org/en/2004/2004scc67/2004scc67.html
I've a notion we're
through/
Bruce Schneier, The Eternal Value of Privacy, WIRED Magazine, May 18, 2006
I'm more than a
little bit tired/ http://www.wired.com/politics/security/commentary/securitymatters/2006/05/70886
Tired of all of your
snooping/ Jane Bailey, Privacy As a Social Value, April 24, 2007, The Anonymity Project
And it's to be IDTrail Blog
good riddance http://www.idtrail.org/index2.php?option=com_content&do_pdf=1&id=673
Week 3: Why Privacy isn’t Everything: Critical Privacy Perspectives
Sept 20
Is Privacy Passé? For Old People? Dead? Why Individual Privacy Isn’t Everything:
Mother, Pink gender and privacy; group privacy; cultural and communitarian concepts of privacy;
Floyd what is a “reasonable expectation” of privacy? The value of transparency and
openness in the information economy and internet culture.
Momma's gonna Amatai Etzioni, A Communitarian Perspective on Privacy, Connecticut Law Review,
check out all your 32(3), 897-905 (2000) http://www.amitaietzioni.org/A279.pdf.pdf
girlfriends for you/
Momma won't let Anita L. Allen, “Nudity,” Ch. 4 pgs 78-96 in Unpopular Privacy: What Must We
anyone dirty get
through Hide? Oxford University Press (2011) (review of Canadian cases)
Momma's gonna
wait up until you Jeff Jarvis, “What is Privacy?”, Ch. 6 at pgs 93-113 in Public Parts: How Sharing in
7. LAWS 4510A Privacy Law & Policy 7 Prof. L Garib Fall 2012
get in the Digital Age Improves the Way We Work and Live, Simon and Shuster, (2012)
Momma will
always find out 7. “Privacy Beyond the Individual” in For Your Information: Australian Privacy Law
where you've and Practice (2008), Australian Law Reform Commission
been
http://www.austlii.edu.au/au/other/alrc/publications/reports/108/7.html#Heading28
Week 4: State Accountability I: Privacy Protections under the Criminal Code of Canada and
Sept 27 the Charter against unwarranted search and seizure; Lawful Access and other Public
Safety Legislation
Big Brother,
David Bowie Stanley A. Cohen, Ch. 2, “Privacy,” pgs 9-48 in Privacy, Crime and Terror: Legal
Rights and Security in a Time of Peril (Markham: LexisNexis Butterworths, 2005)
Someone to claim
us, someone to
follow/Someone to R. v. Tse, 2012 SCC 16 http://scc.lexum.org/en/2012/2012scc16/2012scc16.html
shame us, some
brave Everything You Always Wanted to Know About Lawful Access, But Were
Apollo/Someone to (Understandably) Afraid To Ask, Prof. M. Geist (Feb 2012)
fool us, someone
like you
http://www.michaelgeist.ca/content/view/6316/125/
We want you Big
Brother, Big Brother
Week 5: Privacy and Civil Liberties vs. National Security and Public Safety: State
Oct 04 Surveillance; Arar Inquiry; Security Certificate Cases; information-sharing oversight;
border security.
Watching the
Detectives, Elvis Charkaoui v. Canada (Minister of Citizenship and Immigration), 2007 SCC 9 -
Costello READ EXCERPT ONLY available at
www.emp.ca/links/adminlaw/.../AdminLaw_11_c1_Charkaoui.doc from Ch 11, “The
You think you're Limits of Administrative Law in the National Security State,” Craig Forcese in
alone until you Administrative Law in Context, Flood and Sossin eds., at
realize you're in it. http://www.emp.ca/links/adminlaw/
Now fear is here
to stay. Love is
Link to full case: http://scc.lexum.org/en/2007/2007scc9/2007scc9.html
here for a visit.
They call it instant
justice when it's Jennifer A. Chandler, “Personal Privacy versus National Security: Clarifying and
past the legal Reframing the Trade-off” in Kerr, Lucock and Steeves, eds. On the Identity Trail:
limit. Anonymity, Privacy and Identity in a Networked Society, (Oxford Univ. Press, 2009)
Someone's pp. 121-138
scratching at the http://www.idtrail.org/files/ID%20Trail%20Book/9780195372472_kerr_07.pdf
window. I wonder
who is it? Serge Gutwirth and Mireille Hildebrandt, “Some Caveats on Profiling,” Ch. 2 at pgs
31-39 in Data Protection in a Profiled World, Springer Books 2010,
http://www.newbooks-
services.de/MediaFiles/Texts/2/9789048188642_Excerpt_001.pdf
Paul Cavalluzzo, Counsel to Maher Arar, “Perimeter Security, Information Sharing
and RCMP Oversight in PRISM,” January 6, 2012 http://prism-
magazine.com/2012/01/perimeter-security-information-sharing-and-rcmp-oversight/
Week 6: Privacy Protection - The Civil Context: Privacy and trust; privacy and relationships;
Oct 11 privacy harms; damages and compensation
Fear Not of Man, Samuel Warren and Louis D. Brandeis, “The Right to Privacy,” Harvard Law
Mos Def
8. LAWS 4510A Privacy Law & Policy 8 Prof. L Garib Fall 2012
Review (1890)
You got a lot of http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2
societies and .html
governments
tryin to be God,
N.A. Moreham, “Why is Privacy Important? Privacy, Dignity and Development of
wishin that they
were God/ the New Zealand Breach of Privacy Tort,” in Law, Liberty, Legislation Jeremy Finn
They wanna and Stephen Todd (eds) LexisNexis NZ Ltd, (2008) pgs 231-247
create satellites http://www.victoria.ac.nz/law/pdf/nm-law-liberty-legislation.pdf
and cameras
everywhere Jones v. Tsige, 2012 ONCA 32 (CanLII), http://canlii.ca/t/fpnld
and make you
think they got the Wendy Matheson, “Privacy Class Actions are here, but do we need them?” in
all-seein eye Canadian Privacy Law Review, Volume 8 • Number 2 (Jan 2011)
http://www.torys.com/Publications/Documents/Publication%20PDFs/AR2011-2.pdf
Week 7: MID-TERM (In Class)
Oct 18
Week 8: Survey Says….Privacy Polls and Policymaking: Research into societal values and
Oct 25 attitudes towards privacy and public policy.
Spying Glass, Public Opinion Surveys and the Formation of Privacy Policy, Oscar Gandy Jr.
Massive Attack Journal of Social Issues Volume 59, Issue 2, pages 283–299, July 2003
http://www.asc.upenn.edu/usr/ogandy/JSIpublished.pdf
You move to the
country/You live Hoofnagle, Chris Jay, King, Jennifer, Li, Su and Turow, Joseph, How Different are
in the hills/ Young Adults from Older Adults When it Comes to Information Privacy Attitudes
You invite all and Policies? (April 14, 2010). Available at SSRN:
company/When http://ssrn.com/abstract=1589864 or http://dx.doi.org/10.2139/ssrn.1589864
you check it in the
new spying 2011 Canadians and Privacy Survey, Final Report by Harris/Decima for The Office
glass/They want of the Privacy Commissioner of Canada
to know all your http://www.priv.gc.ca/information/por-rop/2011/por_2011_01_e.asp
business
H. Nissenbaum, "A Contextual Approach to Privacy Online," Daedalus 140 (4), Fall
2011: 32-48
http://www.amacad.org/publications/daedalus/11_fall_nissenbaum.pdf
Week 9: The Privacy Regulators: Privacy Commissioners and data protection legislation in
Nov 01 Canada; international privacy protection.
A Little Less David Elder, “Canada,” in Data Protection & Privacy, European Lawyer Reference
Conversation, Series, Thomson Reuters, (2012) pgs 1-26
Elvis Presley http://www.stikeman.com/2011/images/core/DP_Canada.pdf
A little less Ian Kerr, “Dreamin’ Man: the role of idealism and pragmatisms in privacy
conversation, a advocacy,” Speech at the Performing at the Speed of Change Conference, 23 Jul
little more action 2008. Text and audio file available at:
please/
http://iankerr.ca/content/2008/07/23/dreamin-man-the-role-of-idealism-and-
All this
aggravation ain’t pragmatisms-in-privacy-advocacy/
satisfactioning
me/ A little more The Economist, “Privacy Laws: Private data, public rules,” January 28, 2012
bite and a little http://www.economist.com/node/21543489
less bark/A little
less fight and a
9. LAWS 4510A Privacy Law & Policy 9 Prof. L Garib Fall 2012
little more spark Greenleaf, Graham, Global Data Privacy Laws: 89 Countries, and Accelerating
Privacy Laws & Business International Report, Issue 115, Queen Mary School of
Law Legal Studies Research Paper No. 98/2012. Available at SSRN:
http://ssrn.com/abstract=2000034 (14 pages)
Week 10: Workplace Privacy: “Quality Control,” Reputation, and negotiating privacy protection
Nov 08 with “Little Brother.”
Integral, Pet Shop Tipple v. Canada (Attorney General), 2012 FCA 158 (CanLII), READ PARAS 1-19
Boys ONLY http://canlii.ca/t/frqw5
Everyone has
Their own Kirstie Ball, “Categorizing the Workers, Electronic Surveillance and Social Ordering
number/In the in the Call Centre,” Ch, 10, pgs 201-222 in In Lyon, D (ed) Surveillance as Social
system that/ Sorting. London: Routledge (2002).
We operate
under/ We're Kiss, Simon and Vincent Mosco. "Negotiating Electronic Surveillance in the
moving to/ A Workplace: A Study of Collective Agreements in Canada."The Canadian Journal of
situation/ Where Communication, Vol. 30, No. 4 (December 2005). http://www.cjc-
your lives exist/ online.ca/index.php/journal/article/view/1671
As information
Week 11: Big Data and Social Sorting - How Big Data is Reinventing Society: Information
Nov 15 technologies, analytics and predictive search, new business models, surveillance and
discrimination.
I Google You,
Amanda Palmer Daniel Solove, The Digital Person: Technology and Privacy in the Information Age,
I Google you/ NYU Press (2004) http://docs.law.gwu.edu/facweb/dsolove/Digital-Person/text.htm
When I'm all alone
and don't know
what to do/ And • Ch. 2, “The Rise of the Digital Dossier,” pgs 13-26
each shred of
information that I
• Ch. 3, “Kafka and Orwell: Reconceptualizing Information Privacy,” pgs 27-55
gather/Says you've
found somebody Office of the Information and Privacy Commissioner of Ontario, “Privacy by Design
new/ And it really in the Age of Big Data,” June 8 2012, pgs 2-14
shouldn't matter/ http://privacybydesign.ca/content/uploads/2012/06/pbd-big_data.pdf
Ought to blow up
my computer/
But instead... Gandy Jr., O. H. Data Mining, Surveillance, and Discrimination in the Post- 9/11
I Google you Environment Presentation at IAMCR, Barcelona (2002)
http://www.asc.upenn.edu/usr/ogandy/iamcrdatamining.pdf (18 pages)
Week 12: Future of Privacy Law and Privacy: Challenges of Genetic Privacy; Brain Privacy
Nov 22 and Bodily Emanations; Artificial Intelligence and Privacy; Nano-surveillance;
Continuous Capture. The Right to be Forgotten
Santa Claus is
Coming to Ryan Calo, “Robots and Privacy” (April 2, 2010) in Robot Ethics: The Ethical and
Town, Wizo Social Implications of Robotics, Patrick Lin, George Bekey, and Keith Abney, eds.,
10. LAWS 4510A Privacy Law & Policy 10 Prof. L Garib Fall 2012
He sees you Cambridge: MIT Press, Forthcoming. Available at SSRN:
when you’re http://ssrn.com/abstract=1599189 (19 pages)
sleeping/
He knows when Kerr, Ian R., Aoki, Cynthia and Binnie, Max, “Tessling on My Brain: The Future of
you’re awake/ Lie Detection and Brain Privacy in the Criminal Justice System” (2008). Canadian
He knows if Journal of Criminology and Criminal Justice 50:8. Available at SSRN:
you’ve been
http://ssrn.com/abstract=1299291 (17 pages)
bad or good…
Ragnhildur Guðmundsdóttir vs. The State of Iceland, Icelandic Supreme Court No.
151/2003 http://epic.org/privacy/genetic/iceland_decision.pdf (10 pages)
Jeffrey Rosen, “The Right to Be Forgotten,” The Atlantic, July/Aug 2012
http://www.theatlantic.com/magazine/archive/2012/07/the-right-to-be-
forgotten/309044/ (4 paragraphs)
European Commission Proposal for a Regulation of the European Parliament and
of The Council on the General Data Protection Regulation, January 25, 2012
READ ONLY: Article 17 Right to be Forgotten and Erasure at pages 51-53
http://ec.europa.eu/justice/data-
protection/document/review2012/com_2012_11_en.pdf
Week 13: LAST CLASS – Hand in ATIP Assignment, Discussion of responses.
Nov 29
George Orwell, Nineteen Eighty-Four, 1949 (Part 3 Ch. 6)
All Along the http://ebooks.adelaide.edu.au/o/orwell/george/o79n/
Watchtower,
Jimi Hendrix
All along the
watchtower
Princes kept the
view/ While all the
women came and
went/
Barefoot servants
too
Monday, Final Paper DUE
December 3rd
2012 Students should confirm what time the Department of Law & Legal Studies Office
closes to ensure that your final paper is stamped as received by the due date. I will
pick up all essays handed in immediately after the Office closes on December 3rd.