Data Protection and Privacy

2025/2026

Content, progress and pedagogy of the module

The course gives the participants theoretical knowledge with privacy and data protection and different methods and theories to use for analysis. Methods for mitigation includes a combination of technological solutions, laws and regulations, and user adapted behavior (Kahneman’s theory).  Ethical perspectives of the data processing are discussed and can be used to set a sort of risk level to how the data processes are handled.

Learning objectives

Knowledge

  • Must have knowledge about basic concepts about data protection and privacy
  • Must have knowledge about Privacy as a concept and how it can change with the focus of technical, organisation, user and ethical
  • Must have knowledge about legal problems and measures to prevent and diminish problems within: Personal data and other related information on privacy; intellectual property rights; protecting business secrets; net and information security and criminal cyberattacks
  • Must have knowledge about Data protection and ethical perspectives of data protection
  • Must have knowledge about Privacy theories and models
  • Must have knowledge about the concept of privacy engineering and its different perspectives and areas of expertise
  • Must have knowledge about examples of systems and emerging technologies and how they challenge privacy and data protection

Skills

  • Must have the ability to consider privacy issues in IT systems
  • Must have the ability to identify data protection acts in a selected IT-System and discuss what the impacts are on the system
  • Must have the ability to do a data risk analysis of selected emerging technologies
  • Must have the ability to see data protection and privacy from an ethical angle

Competences

  • Must have competencies to identify privacy challenges on an IT system analysing Data protection regulations, GDPR, NIST and other which are relevant for enterprises and organisations
  • Must have competencies to apply privacy theories and data protection to a specific system or technology
  • Must have competencies to apply ethical criteria to privacy and data protection to provide a more diverse understanding these and what they mean

Type of instruction

Types of instruction are listed at the start of §17; Structure and contents of the programme.

Exam

Exams

Name of examData Protection and Privacy
Type of exam
Written or oral exam
ECTS5
Assessment7-point grading scale
Type of gradingInternal examination
Criteria of assessmentThe criteria of assessment are stated in the Examination Policies and Procedures

Facts about the module

Danish titleDatabeskyttelse og privacy
Module codeESNMCSPM1K2
Module typeCourse
Duration1 semester
SemesterAutumn
ECTS5
Language of instructionEnglish
Empty-place SchemeYes
Location of the lectureCampus Copenhagen
Responsible for the module

Organisation

Education ownerMaster of Cyber Security and Privacy
Study BoardStudy Board of Electronics and IT
DepartmentDepartment of Electronic Systems
FacultyThe Technical Faculty of IT and Design