PORTALE DELLA DIDATTICA

PORTALE DELLA DIDATTICA

PORTALE DELLA DIDATTICA

Elenco notifiche



Cybersecurity laws and regulations

01GZBUV, 01GZBUW, 01GZBWR

A.A. 2025/26

Course Language

Inglese

Degree programme(s)

Master of science-level of the Bologna process in Cybersecurity - Torino
Master of science-level of the Bologna process in Cybersecurity Engineering - Torino

Course structure
Teaching Hours
Lezioni 40
Esercitazioni in aula 20
Lecturers
Teacher Status SSD h.Les h.Ex h.Lab h.Tut Years teaching
Vaciago Giuseppe Emiliano   Docente esterno e/o collaboratore   30 0 0 0 2
Co-lectures
Espandi

Context
SSD CFU Activities Area context
IUS/01 6 C - Affini o integrative Attività formative affini o integrative
2025/26
The main aim of this course is to provide a general overview of the legal issues relating to cybersecurity and data security. Given the global dimension of data flows and their economic and strategic value, the legal framework will be considered at different levels, namely international, EU and national. The first part of the course focuses on data regulation as the legal protection provided to personal and non-personal data is at the root of cybersecurity laws that aim to safeguard these intangible assets. Moreover, some key data protection regulations, such as the GDPR, already include specific data security and cybersecurity requirements. In line with the transnational dimension of cybersecurity, attention will also be paid to international conventions and frameworks (Convention 108 and 108+ of the Council of Europe, OECD Guidelines). Specific environments, such as IoT and cloud computing, will be considered when dealing with data and cybersecurity issues. Finally, the recent development of AI regulation in Europe and the risk-based approach adopted by legislators will be discussed concerning the requirements that increase the level of data and system security. The second part of the course aims to provide case studies and practical examples in the field of information security. Special attention will be given to the Cybercrime Convention, GDPR-Data Breach, NIS2, Cybersecurity Act, and EU bodies (ENISA, CERT, etc.). The Cybercrime Convention, also known as the Council of Europe Convention on Cybercrime, was signed on November 23, 2001. It is the first international convention to address Internet and computer crime by harmonizing national laws, improving investigative techniques, and increasing cooperation among nations. The General Data Protection Regulation (GDPR), the Network and Information Systems Directive (NIS2), and the Cybersecurity Act are essential pieces of legislation aimed at protecting personal data and ensuring the security of information systems. Together, these pieces of legislation play a crucial role in promoting and protecting the security of personal data information in the digital age. Each of the individual pieces of EU legislation mentioned above will be addressed by highlighting the most relevant aspects and focusing on the practical effects in the cybersecurity world. Through case studies, the student will gain detailed knowledge of the real issues that need to be addressed to manage cybersecurity risks.
The main aim of this course is to provide a comprehensive overview of the legal and regulatory issues relating to cybersecurity and data protection, while also highlighting the interplay with technical standards and operational practices. Given the global dimension of data flows and their economic and strategic value, the legal framework will be considered at multiple levels: international, EU, and national. The first part of the course introduces data regulation as the cornerstone of cybersecurity, with attention to both personal data and its legal safeguards, and to the role of international frameworks. The course also covers the European regulatory framework, including the GDPR, and explores the growing impact of AI regulation through its risk-based approach to data and system security. A specific focus will be placed on risk assessment methodologies and ISO/IEC 27001 standards, which serve as the technical foundation for information security management. The second part of the course focuses on cybersecurity regulation in Europe, analyzing key instruments such as the NIS2 Directive, the Cybersecurity Act, the role of EU bodies such as ENISA and CERTs, as well as the DORA Regulation and the Cyber Resilience Act. These instruments will be addressed with practical examples and case studies, including breach response, operational resilience in the financial sector, and compliance with certification frameworks. The course methodology combines theoretical lectures with practical workshops and simulations. Students will engage with case studies on data breaches, ransomware attacks, international data transfers, and compliance audits, applying legal frameworks to real-world scenarios. By integrating law, technology, and governance, the course aims to provide students with the tools to analyze complex incidents and propose effective legal and compliance strategies. Expected learning outcomes include knowledge of the legal principles, regulatory instruments, and institutional actors shaping cybersecurity in Europe, as well as the ability to apply this knowledge in multidisciplinary and professional contexts.
Students will acquire knowledge of the legal requirements and safeguards characterizing the field of cybersecurity. They will have knowledge of the legal principles and language, which will give them the ability to facilitate their interaction in the corporate and public sector environment, as well as in a multidisciplinary context.
Students will acquire knowledge of the legal requirements and safeguards characterizing the field of cybersecurity. They will have knowledge of the legal principles and language, which will give them the ability to facilitate their interaction in the corporate and public sector environment, as well as in a multidisciplinary context.
Part I - Data and Privacy - The international framework: Council of Europe and OECD - The GDPR and legal compliance - Sector-specific applications and Regulation 2018/1807 on non-personal data - AI regulation and risk-based approach Part II – Cybersecurity and Cybercrime - Cybercrime Convention (Budapest, November 23 2001) - Data Breach and GDPR: 3 leading cases - Nis Directive 2 and Cybersecurity Act - The role of EU bodies (ENISA, CERT) and the most important case studies
Part I – Data and Privacy International frameworks: Council of Europe (Convention 108/108+), OECD Guidelines GDPR and compliance obligations Risk assessment methodologies and ISO/IEC 27001 AI regulation and the risk-based approach International data transfers and enforcement mechanisms Case studies and GDPR compliance workshop Part II – Cybersecurity Regulation ISO/IEC 27000 standards, cloud security, and risk management NIS2 Directive and its application in practice DORA and operational resilience for financial entities The EU Cybersecurity Act and ENISA’s certification role Cyber Resilience Act: obligations for digital products and vulnerability reporting Case studies and laboratories (incident simulations, breach notifications, compliance audits)
The course is divided into lectures, and students' contributions and group activities will be encouraged.
The course is divided into lectures, which will present the international framework and then detail the individual course topics. Each topic will present both the legal background and the leading case studies; the latter will help contextualize the practical effects in the cybersecurity world. Students' contributions and group activities will be encouraged.
- Hoofnagle, Chris Jay, Bart van der Sloot, e Frederik Zuiderveen Borgesius. «The European Union general data protection regulation: what it is and what it means». Information & Communications Technology Law 28, fasc. 1 (2 gennaio 2019): 65–98. https://doi.org/10.1080/13600834.2019.1573501 (open access) - Mantelero Alessandro, Giuseppe Vaciago, Maria Samantha Esposito, e Nicole Monte. «The common EU approach to personal data and cybersecurity regulation». 2020, 28(4) International Journal of Law and Information Technology 297–328 https://doi.org/10.1093/ijlit/eaaa021 (open access) - Papakonstantinou Vagelis, «Cybersecurity as praxis and as a state: The EU law path towards acknowledgement of a new right to cybersecurity? », Computer Law & Security Review, Volume 44, April 2022, 105653 https://www.sciencedirect.com/science/article/pii/S0267364922000012
- Hoofnagle, Chris Jay, Bart van der Sloot, e Frederik Zuiderveen Borgesius. «The European Union general data protection regulation: what it is and what it means». Information & Communications Technology Law 28, fasc. 1 (2 gennaio 2019): 65–98. https://doi.org/10.1080/13600834.2019.1573501 (open access) - Mantelero Alessandro, Giuseppe Vaciago, Maria Samantha Esposito, e Nicole Monte. «The common EU approach to personal data and cybersecurity regulation». 2020, 28(4) International Journal of Law and Information Technology 297–328 https://doi.org/10.1093/ijlit/eaaa021 (open access) - Papakonstantinou Vagelis, «Cybersecurity as praxis and as a state: The EU law path towards acknowledgement of a new right to cybersecurity? », Computer Law & Security Review, Volume 44, April 2022, 105653 https://www.sciencedirect.com/science/article/pii/S0267364922000012
Dispense; Libro di testo;
Lecture notes; Text book;
Modalità di esame: Prova scritta (in aula); Prova scritta in aula tramite PC con l'utilizzo della piattaforma di ateneo;
Exam: Written test; Computer-based written test in class using POLITO platform;
... Assessment and grading criteria for the ONSITE exam. The final exam aims to evaluate the student's understanding of the topics discussed during the course and how much students apply the acquired notions to various cases. The exam is written and is 45 minutes in duration. It is divided into two sections, one focused on case analysis and one on the general legal framework (open-question).
Gli studenti e le studentesse con disabilità o con Disturbi Specifici di Apprendimento (DSA), oltre alla segnalazione tramite procedura informatizzata, sono invitati a comunicare anche direttamente al/la docente titolare dell'insegnamento, con un preavviso non inferiore ad una settimana dall'avvio della sessione d'esame, gli strumenti compensativi concordati con l'Unità Special Needs, al fine di permettere al/la docente la declinazione più idonea in riferimento alla specifica tipologia di esame.
Exam: Written test; Computer-based written test in class using POLITO platform;
The final exam is written, paper-based, and lasts 45 minutes. It is divided into two sections: 1) Case study analysis: one open-ended question focused on a practical cybersecurity scenario. Students are required to demonstrate their ability to reason critically, apply legal principles, and propose solutions for case studies (e.g. data breaches, ransomware incidents, or cross-border transfers). 2) General legal framework: four closed questions designed to assess knowledge of the main legal instruments, compliance obligations, and institutional actors in the cybersecurity ecosystem. This structure allows the evaluation of both theoretical knowledge and the ability to apply it to real-world cases. Selected students may be required to complete an additional oral exam if there are concerns regarding the evaluation of the written exam or issues with the online exam platform.
In addition to the message sent by the online system, students with disabilities or Specific Learning Disorders (SLD) are invited to directly inform the professor in charge of the course about the special arrangements for the exam that have been agreed with the Special Needs Unit. The professor has to be informed at least one week before the beginning of the examination session in order to provide students with the most suitable arrangements for each specific type of exam.
Esporta Word