Cybercrime and Information Security Law


Content, progress and pedagogy of the module

Learning objectives


  • Must have knowledge about the regulation on personal data and other related privacy rules.
  • Must have knowledge about basic regulation on Intellectual Property Rights (IPR).
  • Must have knowledge about EU law protecting business secrets that are protected and worth protecting from hacker-attacks from a civil and criminal perspective.
  • Must have knowledge about regulation covering net security (ensuring the protection of personal data, business and governments secrets).
  • Must have knowledge about regulation on information security, including the safeguarding of information through risk management.
  • Must have knowledge about reporting obligations and security plans. 
  • Must have knowledge about security regulations within the Personal Data Act and special regulations covering information security.
  • Must have knowledge about EU regulation on risk management and information security as well as the EU policy in this area.
  • Must have knowledge about securing evidence after a cyber-attack for use in further investigations or court proceedings


  • Must be able to identify which criminal acts that may be violated in different cyberattacks or hacker-attacks and the criminal procedures that cover this.
  • Must be able to identify requirements and create policies to establish a consistent IT architecture that assure information protection.
  • Must be able to identify security incidents or cybercrimes and act in timely manner to ensure relevant evidences


  • Must have the competency to select and prioritize measures for protection of networks, services, personal data and other protectable information, and thus prepare an information security policy and security plans.
  • Must be able regularly as part of a company's planning and operation to take appropriate technical and organizational measures to manage the risks to ensure personal security of networks and services that meet a certain level of security.
  • Must have the competency to act in timely manner on criminal acts and seek to establish th

Type of instruction

Types of instruction are listed in § 17



Name of examCybercrime and Information Security Law
Type of exam
Written or oral exam
Assessment7-point grading scale
Type of gradingInternal examination
Criteria of assessmentThe criteria of assessment are stated in the Examination Policies and Procedures

Facts about the module

Danish titleCyberkriminalitet og informationssikkerhed
Module codeESNMICTM1K1
Module typeCourse
Language of instructionEnglish
Location of the lectureCampus Copenhagen
Responsible for the module


Study BoardStudy Board of Electronics and IT
DepartmentDepartment of Electronic Systems
FacultyTechnical Faculty of IT and Design