Ethics, Security & Privacy

Overview and Objectives

This module on Ethics, Security & Privacy emphasizes that cybersecurity extends beyond technical defenses to safeguarding human rights, dignity, and societal trust. In an era where data is a valuable asset, ethical considerations and legal compliance are crucial to prevent misuse, discrimination, and harm. Students will explore how laws and ethical frameworks guide security practices, ensuring systems respect privacy while balancing security needs. By the end of this module, students will be able to:

This module integrates ethical reasoning with practical compliance, drawing on case studies like the Cambridge Analytica scandal or recent AI privacy breaches. As of August 2025, with ongoing GDPR simplifications for SMEs and full enforcement of Law 25, emphasize adaptability to evolving regulations.

Estimated Time: 4-6 hours of lecture/discussion, plus case studies and policy drafting exercises.

Prerequisites: Introduction to Cybersecurity, Basic Data Management.

Assessment Ideas:

Key Concepts and Explanations

1. Ethics in Cybersecurity

Ethics involves moral principles guiding decisions in security practices, such as balancing surveillance for safety against privacy invasion. Frameworks like utilitarianism (greatest good for the greatest number) or deontology (duty-based rules) help navigate dilemmas.

2. Privacy Laws: GDPR and Law 25

These laws protect individuals' data rights and impose obligations on organizations.

3. Privacy-by-Design Strategies

A proactive approach to integrate privacy into systems from inception, based on 7 foundational principles by Ann Cavoukian: Proactive not reactive; Privacy as default; Embedded into design; Full functionality; End-to-end security; Visibility/transparency; Respect for user privacy.

4. Managing PII Securely

PII includes any data identifying an individual (e.g., name, email, SSN, biometrics).

Visualizations Using Mermaid Script

Use these in slides; students can practice recreating them.

Visualization 1: Breach Notification Process

Flowchart for GDPR/Law 25 breach response.

flowchart TD A[Breach Detected] --> B{Assess Risk?} B -->|Low Risk| C[Document Internally] B -->|High Risk| D[Notify Authority <72 hrs] D --> E{Impacts Individuals?} E -->|Yes| F[Notify Affected Persons Without Delay] E -->|No| G[Document & Mitigate] F --> G subgraph "Key Steps" D F end style A fill:#f66,stroke:#333 style G fill:#6f6,stroke:#333

Explanation in Class: Discuss timelines and what constitutes "high risk" (e.g., identity theft potential).

Visualization 2: Privacy-by-Design Principles

Mind map of the 7 principles.

mindmap root((Privacy-by-Design)) Proactive["Proactive not Reactive"] Default["Privacy as Default Setting"] Embedded["Privacy Embedded into Design"] PositiveSum["Full Functionality (Positive-Sum)"] Lifecycle["End-to-End Security Lifecycle"] Transparency["Visibility & Transparency"] Respect["User-Centric Respect"]

Explanation in Class: Link each to examples, like "Default" meaning opt-out not required for privacy features.

Visualization 3: Ethical Decision-Making Framework

Sequence for resolving dilemmas.

sequenceDiagram participant SecurityPro as Security Professional participant Stakeholders SecurityPro->>SecurityPro: Identify Ethical Issue SecurityPro->>Stakeholders: Gather Facts & Perspectives Stakeholders->>SecurityPro: Input on Impacts SecurityPro->>SecurityPro: Evaluate Options (Utilitarian/Deontological) SecurityPro->>SecurityPro: Decide & Justify SecurityPro->>Stakeholders: Implement & Monitor

Explanation in Class: Apply to a scenario like deciding to report a zero-day vulnerability.

Hands-On Activities and Examples

Key Skills Development

Resources and Further Reading

Stay current with sources like the EDPB website or privacy newsletters, as laws like the EU Data Act evolve. End with discussions on emerging issues like AI ethics in 2025.