1. Knowledge and understanding. The Course aims to provide students with a correct approach to the use of technology by the jurist ("Advanced Legal Informatics"), with particular attention to the practical use of the computer and the network connection for professional purposes, in Court, in the activity typical of a law firm or notary and for the business lawyer. 2. Application of knowledge and understanding. The acquired notions will be of immediate theoretical and practical utility to improve the relationship between the user and the technologies used, and will allow a more accurate understanding of all aspects of a constantly evolving field. 3. Formulation of judgments. The course will provide students with the ability to choose at any time a correct use of the technologies in the environment in which they will operate, with independent evaluation approaches (and not necessarily linked to the product or to the "most used" software) and with a constant practical attention to a use of technologies that is useful in the future professional context. 4. Communication skills. The Course will give students the opportunity to present complex technological and IT-legal issues with language properties and with clarity. 5. Learning skills. The course aims to provide students with a concrete improvement in their IT-legal skills with a very rapid learning curve and with the possibility of immediately using the concepts learned even outside the university context The Course has, also, the specific purpose of giving students: a thorough knowledge of the topics covered by the course, both from a technical and legal point of view, on the assumption of the acquisition of the first basic elements during the previous university career; the ability to critically address issues and resolve legal issues through the revision of the concepts learned; strengthening the technical and IT language relevant to the subject; the ability to link the different topics in order to elaborate useful proposals for the solution of concrete cases, also through practical lessons carried out with the active participation of the students.
Expected learning outcomes
At the end of the course the student who has successfully learned the subject will have an in-depth knowledge of the Course topics, with the acquisition of a reasoning method suitable for dealing with more specific and complex IT-legal topics with respect to institutional notions.
Lesson period: Second semester
(In case of multiple editions, please check the period, as it may vary)
The aim of the Course is to teach students with an approach to the correct use of technology by the jurist, in order to significantly improve their IT-legal skills and to allow independent evaluation procedures, useful for the future professional context. The program will be divided into twenty lessons of two hours each, during which the Professor will explain questions concerning surveillance, control, secrets, computer crimes, cyberstalking, cyberbullying, digital investigations. · First lesson (2 hours): control and surveillance in the digital society. · Second lesson (2 hours): the "liquid society" and the Snowden case. Political and technological issues. · Third lesson (2 hours): leaking, whistleblowing and the WikiLeaks case. · Fourth lesson (2 hours): profiling, micro-targeting and the case of Cambridge Analytica. Profiling for electoral purposes. · Fifth lesson (2 hours): the framework of computer crimes. Classic computer crimes and computer-related crimes. · Sixth lesson (2 hours): online defamation and identity theft. · Seventh lesson (2 hours): cyberstalking. · Eighth lesson (2 hours): cyberbullying. · Ninth lesson (2 hours): grooming of minors online. · Tenth lesson (2 hours): hate speech online. · Eleventh lesson (2 hours): hate on the web and on social networks. · Twelfth lesson (2 hours): cybersecurity. · Thirteenth lesson (2 hours): the deep web and the dark web. · Fourteenth lesson (2 hours): the information war. · Fifteenth lesson (2 hours): fake news and disinformation. · Sixteenth lesson (2 hours): basics of digital forensics. · Seventeenth lesson (2 hours): digital investigations. · Eighteenth lesson (2 hours): hacking tools for Law Enforcement. · Nineteenth lesson (2 hours): drafting of policies for information security purposes. The importance of rules and behaviors for cybersecurity. · Twentieth lesson (2 hours): viruses and malware. Virus protection, best protection methods, ransomware.
Prerequisites for admission
There are no particular pre-requisites for adequately addressing the contents of the course. The first lessons are, in fact, dedicated to an introduction to the themes that can guarantee a basic preparation for the whole class. It is suggested to follow, before this Course, the Legal Informatics Course.
The Course consists of 40 hours of classroom lessons held by the Professor.
P. Perri, G. Ziccardi (edited by), Tecnologia e diritto. Informatica Giuridica Avanzata, Volume III (2019), Giuffrè, Milan, 2019. The text must be studied in full.
Assessment methods and Criteria
The final exam takes place orally in the exam session, with a question consisting of at least three questions on three different parts of the program. At the end of the course, it is possibile for the student who attended at least 75% of the lesson hours to have the exam in the form of an essay or a Multiple Choice test with 30 multiple choice questions, depending on the student's preferences