575 Personnel Data Protection

575 Personnel Data Protection

  • Study programme and level: Master’s joint study programme Management in Administration 2nd Cycle
  • 2nd year
  • 7 ECTS
  • Course type: proffesional elective
  • Lectures: 21
  • Seminar: 11
  • Other study activities: 118
  • Individual work: 60
  • Language: English, Serbian, Slovene
  • Lecturer: Mirjana Drakulić, PhD

 

1. Content (Syllabus outline)

  • Data: the concept, importance and role of government and public sector. The types of data. Personal data. Data on employment and unemployment. Principles and methods of collection, storage and use. The right to privacy and information privacy - the development of law, regulation, characteristics. Privacy and information privacy and workplace. Personal data and computer networks. Biometric data.
  • Cross-border data flow. Regulation: international, national, self-regulation.
  • Obligations of the parties in the protection of personal data. Forms of threats to privacy and data on human resources - theft, Hacking, viruses, sabotage, espionage, and other parts of computer and cyber crime. Measures and methods of protection of personal data.
  • Medical and genetic privacy of employees. Data on employeesas information of public importance. Models of availability of data on employees in government and public sector. Using the monitoring of employees and use of data obtained by monitoringe-mail content, internal and external communications. The rights, responsibilities and powers.

2. Readings

OBVEZNA LITERATURA

  • DRAKULIĆ M., LILIĆ S., Privatnost i informaciona tehnologija, studija, JDPI, Beograd, 1998.
  • DRAKULIĆ M., Osnovi kompjuterskog prava, DOPIS, Beograd 1995.
  • FOERSTER M., Global Employee Privacy and Data Security Law, BNA Books, A Division of Bureau of National Affairs, 2011.
  • DRAKULIĆ M., DRAKULIĆ R., JOVANOVIĆ S., Public eq. private? Twilling of privacy in the time of online social networking, 56th Scientific expert meeting Parliament psychologists, development and standardization in psychology, Kopaonik, June 4rd -7rd 2008.
  • DRAKULIĆ M., DRAKULIĆ R., Regulacija Interneta, studija, RATEL, Beograd, 2009.
  • WEBSTER M, Data Protection for the HR Manager, Gower Publishing, Ltd., 2003.
  • COMER M. J., STEPHENS  T. E., An HR Guide to Workplace Fraud and Criminal Behavior: Recognition, Prevention, and Management, Gower Publishing, Ltd., 2004.
  • OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, OECD, 2003.
  • DRUGO LITERATURO
  • The Governance of Genetic Information: Who Decides? (Cambridge Law, Medicine and Ethics), еditors H. Widdows, C. Mullen, Cambridge University Press, 2009.
  • GREENSPAN A.L., Employer's Guide to Workplace Privacy, Aspen Publishers, 2007.
  • STANTON J. M., STAM K. R., The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets-Without Compromising Employee Privacy or Trust, Information Today, Inc., 2006.
  • HILL D. G., Data Protection: Governance, Risk Management, and Compliance, CRC Press, 2009.
  • COMER M. J., STEPHENS T.E., An HR Guide to Workplace Fraud and Criminal Behavior: Recognition, Prevention, and Management, Gower Publishing, Ltd., 2004.
  • USTREZNE SPLETNE STRANI, POVEZANE Z MEDNARODNIMI IN NACIONALNIMI DOKUMENTI O UREJANJU OSEBNIH PODATKOV, ZASEBNOSTI IN INFORMACIJSKE ZASEBNOSTI.

3. Objectives and competences

The main objective is to introduce students to legal concepts of data protection of human resource management and public sector, as well as understanding their role and specificity for the realization of the right to privacy and informational privacy.Specific objectives are to identify strategic and operational significance of these data in making managerial decisions in human resource management.

Students acquire competencies related to solving organizational, legal and technical aspects of data protection, as well as methods and techniques for the collection, processing, storage and use.

 

4. Intended learning outcomes:

Knowledge and understanding:
Training for application of new concepts and methods to protectpersonal data, respect for individual rights in the administration and public sector related to the use of ICT.

 

5. Learning and teaching methods:

Interacting with students in the debates, workshops, group work with problem solving and presentation solutions. Interviews and discussions with guest speakers, Commissioner for Personal Data. Visi the administration, local government or public service which may be an example of good practice. Using Moodle for distance learning and work online in forums, discussion groups.Team work in workshops, case studies, debates.

 

6. Assessment

Type (examination, oral, coursework, project):

  • Essay 10%
  • Presentation of seminar 10%
  • Creating case studies 10%
  • Preparing for and participating in the debate / discussion 20%
  • Results teamwork 20%
  • Written or oral exam 30%