This module on Ethics, Security & Privacy emphasizes that cybersecurity extends beyond technical defenses to safeguarding human rights, dignity, and societal trust. In an era where data is a valuable asset, ethical considerations and legal compliance are crucial to prevent misuse, discrimination, and harm. Students will explore how laws and ethical frameworks guide security practices, ensuring systems respect privacy while balancing security needs. By the end of this module, students will be able to:
This module integrates ethical reasoning with practical compliance, drawing on case studies like the Cambridge Analytica scandal or recent AI privacy breaches. As of August 2025, with ongoing GDPR simplifications for SMEs and full enforcement of Law 25, emphasize adaptability to evolving regulations.
Estimated Time: 4-6 hours of lecture/discussion, plus case studies and policy drafting exercises.
Prerequisites: Introduction to Cybersecurity, Basic Data Management.
Assessment Ideas:
Ethics involves moral principles guiding decisions in security practices, such as balancing surveillance for safety against privacy invasion. Frameworks like utilitarianism (greatest good for the greatest number) or deontology (duty-based rules) help navigate dilemmas.
Ethical Decision-Making: A structured process to evaluate actions' impacts. Steps include identifying stakeholders, assessing risks, considering alternatives, and justifying choices. In cybersec, this applies to issues like vulnerability disclosure (e.g., responsible disclosure vs. full disclosure).
Policy Drafting: Creating formal documents outlining organizational rules for security and privacy. Policies should be clear, enforceable, and aligned with laws, covering topics like data handling, access controls, and incident response.
These laws protect individuals' data rights and impose obligations on organizations.
GDPR (General Data Protection Regulation): EU law effective since 2018, applying to any entity processing EU residents' data. Key principles: Lawfulness, fairness, transparency, purpose limitation, data minimization, accuracy, storage limitation, integrity/confidentiality, accountability.
Quebec's Law 25 (Bill 64): Modernizes Quebec's privacy framework, fully effective by September 2024. Modeled after GDPR, it applies to organizations handling Quebec residents' personal information.
A proactive approach to integrate privacy into systems from inception, based on 7 foundational principles by Ann Cavoukian: Proactive not reactive; Privacy as default; Embedded into design; Full functionality; End-to-end security; Visibility/transparency; Respect for user privacy.
PII includes any data identifying an individual (e.g., name, email, SSN, biometrics).
Secure Management: Classify PII (sensitive vs. non-sensitive), encrypt in transit/rest, use secure storage (e.g., hashed passwords), and limit access via RBAC (Role-Based Access Control).
Privacy Impact Assessment (PIA/DPIA): A systematic process to evaluate privacy risks in projects. Mandatory under GDPR for high-risk processing; recommended in Law 25.
Breach Notification: Reporting data breaches to authorities and affected individuals.
Use these in slides; students can practice recreating them.
Flowchart for GDPR/Law 25 breach response.
flowchart TD
A[Breach Detected] --> B{Assess Risk?}
B -->|Low Risk| C[Document Internally]
B -->|High Risk| D[Notify Authority <72 hrs]
D --> E{Impacts Individuals?}
E -->|Yes| F[Notify Affected Persons Without Delay]
E -->|No| G[Document & Mitigate]
F --> G
subgraph "Key Steps"
D
F
end
style A fill:#f66,stroke:#333
style G fill:#6f6,stroke:#333
Explanation in Class: Discuss timelines and what constitutes "high risk" (e.g., identity theft potential).
Mind map of the 7 principles.
mindmap
root((Privacy-by-Design))
Proactive["Proactive not Reactive"]
Default["Privacy as Default Setting"]
Embedded["Privacy Embedded into Design"]
PositiveSum["Full Functionality (Positive-Sum)"]
Lifecycle["End-to-End Security Lifecycle"]
Transparency["Visibility & Transparency"]
Respect["User-Centric Respect"]
Explanation in Class: Link each to examples, like "Default" meaning opt-out not required for privacy features.
Sequence for resolving dilemmas.
sequenceDiagram
participant SecurityPro as Security Professional
participant Stakeholders
SecurityPro->>SecurityPro: Identify Ethical Issue
SecurityPro->>Stakeholders: Gather Facts & Perspectives
Stakeholders->>SecurityPro: Input on Impacts
SecurityPro->>SecurityPro: Evaluate Options (Utilitarian/Deontological)
SecurityPro->>SecurityPro: Decide & Justify
SecurityPro->>Stakeholders: Implement & Monitor
Explanation in Class: Apply to a scenario like deciding to report a zero-day vulnerability.
Stay current with sources like the EDPB website or privacy newsletters, as laws like the EU Data Act evolve. End with discussions on emerging issues like AI ethics in 2025.