Cyber Security Law, Policy and Ethics
Overview
The unit aims to help students operate effectively in the cyber security governance arena implementing frameworks and developing policy responses to issues that arise. The unit introduces students to legal frameworks that govern cyber security in Australia and the key governance organisations. Students are also exposed to the General Data Protection Regulation (GDPR) in the European Union and mandatory reporting of data breaches in Australia and the growing body of Integrated configuration management system (ICMS) including ISO 27K. Students will learn about the changing nature of cyber security threats and the requirement for managers to maintain an up-to-date tool kit in relation to cyber law and policy.
Requisites
08-June-2025
08-February-2026
Learning outcomes
Students who successfully complete this unit will be able to:
- Critically evaluate the legal and regulatory structure for dealing with cyber security both domestically and internationally
- Analyse cyber security policy and law in Australia and their application to business
- Research and analyse the international standards that support cyber security governance frameworks in Australia
- Critically analyse ethics in relation to governance and policy in cyber security
Teaching methods
Swinburne Online
Type | Hours per week | Number of weeks | Total (number of hours) |
---|---|---|---|
Online Directed Online Learning and Independent Learning | 12.50 | 12 weeks | 150 |
TOTAL | 150 |
Assessment
Type | Task | Weighting | ULO's |
---|---|---|---|
Assignment | Individual | 50 - 60% | 1,2,3,4 |
Project | Individual | 40 - 50% | 1,2,3,4 |
Content
- Laws and legal frameworks that govern cyber security and cyber crime in Australia, including the key governance bodies of the internet
- Governance of cyber crime and the internet in Australia and other common law jurisdictions, including the United States, Canada and the European Union (EU)
- Understand the variety of national and international laws that have been enacted and proposed to deal with issues of data breaches, management of information, cyber attacks and online privacy
- Appreciate the ethical issues that relate to the investigation/prosecution of cyber crime and the formation of laws in this area
- Demonstrate an ability to identify some legal problems that may arise in business (e.g. privacy requirements, contractual relations and consumer protection) and some ability to predict how a legal problem might be solved.
- Pivacy Act, ISO27,000(K)
- Continuous improvement principles
- Corporate policy
- Policy framework
- Risk acceptance, reduction, transfer and avoidance
- Research methods
Study resources
Reading materials
A list of reading materials and/or required textbooks will be available in the Unit Outline on Canvas.