(SOT82130) Current Issues in Cybersecurity Law
| Lecturer (assistant) |
Nicolas Ziegler
|
|---|---|
| Number | 0000001035 |
| Type | seminar |
| Duration | 2 SWS |
| Term | Wintersemester 2025/26 |
| Language of instruction | German |
| Position within curricula | See TUMonline |
| Dates | See TUMonline |
- 13.10.2025 18:15-19:45 H.004, CIP-Raum
- 20.10.2025 18:15-19:45 H.004, CIP-Raum
- 27.10.2025 18:15-19:45 H.004, CIP-Raum
- 03.11.2025 18:15-19:45 H.004, CIP-Raum
- 10.11.2025 18:15-19:45 H.004, CIP-Raum
- 17.11.2025 18:15-19:45 H.004, CIP-Raum
- 24.11.2025 18:15-19:45 H.004, CIP-Raum
- 01.12.2025 18:15-19:45 H.004, CIP-Raum
- 08.12.2025 18:15-19:45 H.004, CIP-Raum
- 15.12.2025 18:15-19:45 H.004, CIP-Raum
- 22.12.2025 18:15-19:45 H.004, CIP-Raum
- 12.01.2026 18:15-19:45 H.004, CIP-Raum
- 19.01.2026 18:15-19:45 H.004, CIP-Raum
- 26.01.2026 18:15-19:45 H.004, CIP-Raum
- 02.02.2026 18:15-19:45 H.004, CIP-Raum
Admission information
Objectives
Further information (ECTS, description of assessment methods, etc.) can be found in the module description in TUMonline.
How do I find a module description?
ttps://collab.dvb.bayern/spaces/TUMdocs/pages/72792403/Module+Catalog
How do I find a module description?
ttps://collab.dvb.bayern/spaces/TUMdocs/pages/72792403/Module+Catalog
Description
While software and software development were largely unregulated for a long time and private standardization set the security standards, the regulation of cybersecurity has experienced a new dynamic in recent years. Based on European regulations and directives, we can currently speak of the emergence of a new area of law: cybersecurity law. Following this dynamic is not easy, neither for computer scientists nor for lawyers. The seminar will first examine the basic approaches and requirements of European software regulation. In addition to fundamental institutions such as ENISA, which was created by the Cybersecurity Act, the NIS-2 Directive and the Cyber Resilience Act will be examined in particular. In the area of national law, the seminar will focus on the regulation of critical infrastructures and other sector-specific security requirements in business and administration, the planned comprehensive revision of the BSI Act in 2025 and the criminal law pitfalls of IT security research.
Prerequisites
Basic Knowlegde of the technical and organisational methods of information security
Teaching and learning methods
Further information (ECTS, description of assessment methods, etc.) can be found in the module description in TUMonline.
How do I find a module description?
ttps://collab.dvb.bayern/spaces/TUMdocs/pages/72792403/Module+Catalog
How do I find a module description?
ttps://collab.dvb.bayern/spaces/TUMdocs/pages/72792403/Module+Catalog
Recommended literature
Further information (ECTS, description of assessment methods, etc.) can be found in the module description in TUMonline.
How do I find a module description?
ttps://collab.dvb.bayern/spaces/TUMdocs/pages/72792403/Module+Catalog
How do I find a module description?
ttps://collab.dvb.bayern/spaces/TUMdocs/pages/72792403/Module+Catalog