Cyber Law Department

Table of Contents

FAQ ON SUBJECT

The course comprises lectures, practical training, and independent study. The weight of each component is as follows:

  • Lectures: 20%
  • Practical Training: 25%
  • Independent Study: 75%

Your final grade will be determined by the following:

  • Essay: 25%
  • Essay Presentation: 20%
  • Written Exam: 50%
  • Classroom Attendance: 5%

You will need to write a scientific essay on a pre-approved topic. The essay should demonstrate your research and analytical skills, critical thinking, and ability to present your ideas clearly and logically.

The presentation will be assessed based on the quality of the content, structure, clarity, and your ability to engage the audience.

The written exam will test your knowledge of the course material, including your ability to analyze and solve problems related to the subject.

Yes, you can earn extra credit by publishing your research in academic journals or presenting at conferences.

You will have access to a variety of resources, including regulatory documents, textbooks, manuals, articles, practical documentation (court decisions, case studies, etc.), and electronic resources (video tutorials, online courses, etc.).

The university may offer financial support for publishing in high-impact journals and provide access to research databases and other resources.

You can seek help from your professors, teaching assistants, or classmates. The university may also offer tutoring or other support services.

Syllabus

#

Topics

 

Total hoursAuditorium hourIndependent study hours
LectureSeminar
1Artificial intelligence, robotics, and access to the law12227,5
2Techniques and application of artificial intelligence in law12227,5
3Robotics in law12227,5
4Intellectual property rights and AI12227,5
5Privacy and data protection in AI12227,5
6Employment and Artificial Intelligence12227,5
7Artificial Intelligence, Robotics, and Criminal Law12227,5
8Artificial intelligence, robotics, and civil law12227,5
9Artificial intelligence, robotics, and human rights12227,5
10AI and robotics regulation12227,5
 Works presentation  5 
 total:120 (with 45 teachers, 75 independents) 202575
45 (total)

 

METHODOLOGY

IMRAD is an acronym that stands for Introduction, Methods, Results, and Discussion. It is the most common format used for scientific research papers. Here’s a detailed overview of each section:

  1. Introduction:
    • Provides background information on the research topic
    • States the research question or hypothesis
    • Explains the significance of the study
    • Reviews relevant literature to contextualize the research
    • Outlines the study’s objectives and potential impact
  2. Methods:
    • Describes the study design (e.g., experimental, observational, qualitative)
    • Details participant selection and characteristics
    • Explains materials and equipment used
    • Outlines procedures and protocols followed
    • Describes data collection methods
    • Explains statistical analyses or qualitative analysis approaches
    • Addresses ethical considerations and approvals
  3. Results:
    • Presents findings without interpretation
    • Uses clear, concise language to describe data
    • Includes relevant statistical analyses
    • Utilizes tables, graphs, or other visual aids to represent data
    • Highlights key findings and patterns in the data
    • Reports both expected and unexpected results
  4. Discussion:
    • Interprets the results in the context of the research question
    • Compares findings with previous research and theories
    • Explains the implications of the results
    • Addresses limitations of the study
    • Suggests areas for future research
    • Provides a conclusion that summarizes the main findings and their significance

Additional sections often included:

 

  1. Abstract: A brief summary of the entire paper, typically 150-300 words.
  2. References: A list of all sources cited in the paper.
  3. Appendices: Supplementary materials that are too detailed for the main text.

                  Introduction

A.   Second Headings if Required

The introduction of an article following the IMRAD (Introduction, Methods, Results, and Discussion) format serves as a crucial foundation for the reader. It begins by providing essential background information about the topic, situating the study within the existing body of knowledge. This context helps readers understand the relevance of the research and highlights why it matters in the broader field (Naeem, 2024). By establishing this groundwork, the introduction effectively primes the audience for the specific issues that the article will address.

B.   Second Headings if Required

Identifying the problem is the next key element in the introduction. Clearly articulating the issue at hand not only draws attention to the significance of the research but also allows the reader to grasp the urgency or necessity for a solution. This section should explain the implications of the problem, emphasizing how it affects the relevant field or community. By pinpointing the issue, the author sets the stage for the subsequent discussion of the research’s purpose and objectives.

1.     Third headings if required

A critical aspect of the introduction is the identification of a gap in existing knowledge that the study aims to fill. This gap signifies what is missing in current literature and underscores the originality and importance of the research. By addressing this gap, the author illustrates the contributions their work intends to make. Highlighting this lack of understanding not only justifies the study but also enhances its value to the academic community, signaling a need for further exploration.

2.     Third headings if required

Finally, the introduction should argue that the identified problem requires a solution, encapsulating the essence of the research. A concise summary of the proposed solution prepares readers for the methodologies that will be elaborated upon later. This section serves as a bridge to the subsequent parts of the article, creating a logical flow from problem identification to proposed interventions. Ultimately, an effective introduction establishes a compelling case for why the research is necessary and outlines the pathway toward addressing the challenges identified.

A.   Second Headings if Required

The methodology section begins by clearly defining the type of research conducted, which can range from qualitative to quantitative, or a mixed-methods approach. This foundational description is essential for readers to understand the framework within which the study operates. It outlines how the research methods were developed, emphasizing their appropriateness for addressing the research questions. For instance, if the study focuses on exploring attitudes towards gender equality in public administration, qualitative methods such as interviews or focus groups might be employed to gather in-depth insights. Conversely, quantitative methods, such as surveys, may be utilized to collect numerical data for statistical analysis. The choice of method directly impacts the validity and reliability of the research findings.

B.   Second Headings if Required

Data collection is a critical component of the methodology. This section explains the specific techniques used to gather data, such as experimental tests, surveys, or secondary data analysis. Detailing the data collection process allows readers to assess the comprehensiveness and rigor of the study. For example, if surveys are conducted, the methodology should describe how participants are selected, the nature of the questions, and the administration process. Additionally, if existing data is utilized, the sources and relevance of this data must be clearly stated. By providing this information, the methodology not only establishes transparency but also strengthens the credibility of the research.

1.     Third headings if required

Data analysis techniques are equally important and should be meticulously described in the methodology. This portion elucidates the strategies employed to organize, categorize, and interpret the data gathered through research processes. Various analytical tools and frameworks may be used, such as thematic analysis for qualitative data or statistical software for quantitative analysis. It is crucial to clarify how the data will be analyzed, including any coding procedures, statistical tests, or algorithms employed. By outlining the data analysis methods, researchers can demonstrate how they will derive meaningful conclusions from their findings, contributing to the overall integrity of the research.

Lastly, the rationale for the chosen methodology is imperative in establishing the validity and relevance of the research. This section explains why specific methods and approaches were selected, highlighting their alignment with the research objectives. It also addresses potential limitations and how they will be mitigated. By articulating the reasoning behind the methodology, researchers can provide justification for their choices, thereby reinforcing the significance of the study. Ultimately, a well-structured methodology section not only guides the research process but also assures readers of the study’s robustness and applicability in advancing knowledge in the field.

A.   Second Headings if Required

The methodology section begins by clearly defining the type of research conducted, which can range from qualitative to quantitative, or a mixed-methods approach. This foundational description is essential for readers to understand the framework within which the study operates. It outlines how the research methods were developed, emphasizing their appropriateness for addressing the research questions. For instance, if the study focuses on exploring attitudes towards gender equality in public administration, qualitative methods such as interviews or focus groups might be employed to gather in-depth insights. Conversely, quantitative methods, such as surveys, may be utilized to collect numerical data for statistical analysis. The choice of method directly impacts the validity and reliability of the research findings.


B.   Second Headings if Required

Data collection is a critical component of the methodology. This section explains the specific techniques used to gather data, such as experimental tests, surveys, or secondary data analysis. Detailing the data collection process allows readers to assess the comprehensiveness and rigor of the study. For example, if surveys are conducted, the methodology should describe how participants are selected, the nature of the questions, and the administration process. Additionally, if existing data is utilized, the sources and relevance of this data must be clearly stated. By providing this information, the methodology not only establishes transparency but also strengthens the credibility of the research.

1.     Third headings if required

Data analysis techniques are equally important and should be meticulously described in the methodology. This portion elucidates the strategies employed to organize, categorize, and interpret the data gathered through research processes. Various analytical tools and frameworks may be used, such as thematic analysis for qualitative data or statistical software for quantitative analysis. It is crucial to clarify how the data will be analyzed, including any coding procedures, statistical tests, or algorithms employed. By outlining the data analysis methods, researchers can demonstrate how they will derive meaningful conclusions from their findings, contributing to the overall integrity of the research.

Lastly, the rationale for the chosen methodology is imperative in establishing the validity and relevance of the research. This section explains why specific methods and approaches were selected, highlighting their alignment with the research objectives. It also addresses potential limitations and how they will be mitigated. By articulating the reasoning behind the methodology, researchers can provide justification for their choices, thereby reinforcing the significance of the study. Ultimately, a well-structured methodology section not only guides the research process but also assures readers of the study’s robustness and applicability in advancing knowledge in the field.

A.   Second Headings if Required

The Discussion section begins with a summary of your key findings, encapsulating the most significant results of your research. This is crucial as it allows readers to grasp the main contributions of your work quickly. Highlight the most relevant data that directly supports your research questions and hypotheses. By succinctly restating your findings, you set the stage for deeper analysis and interpretation, emphasizing their relevance to the field. It’s essential to be clear and concise, ensuring that even readers who may not delve into the full paper can understand the core insights.

Following the summary, you should provide your interpretations of the findings. This is your opportunity to explain what the results mean in the context of existing literature and theories. Discuss any unexpected results and how they may challenge or confirm previous studies. Here, you can offer your perspective on the significance of the findings, connecting them to broader themes in your field. This critical analysis encourages readers to think critically about the implications of your research.

B.   Second Headings if Required

Next, you need to discuss the implications of your findings. Consider how your results can influence future research, policy-making, or practice within your field. Discuss potential applications of your work and how it contributes to advancing knowledge or solving real-world problems. This section should address both practical and theoretical implications, prompting readers to consider how your findings may impact various stakeholders. Highlighting the significance of your work encourages further exploration and dialogue in your area of study.

A.   Second Headings if Required

 

Lastly, it is essential to acknowledge the limitations of your research. This not only demonstrates scholarly rigor but also provides context for interpreting your findings. Discuss any constraints related to your methodology, sample size, or external factors that may have influenced your results. This transparency allows readers to critically assess the validity of your conclusions. Following this, share your recommendations for future research based on these limitations and your findings. Suggest specific areas for further exploration, offering pathways for others to build upon your work and enhance understanding in the field.

Start by creating a clear outline that follows the IMRAD structure. Use simple and concise language, and avoid jargon or technical terms that may confuse readers. Seek feedback from colleagues, professors, or writing center tutors, and revise your work based on their suggestions.

Some common mistakes include:

  • Failing to clearly state the research problem and objectives
  • Providing insufficient detail in the methods section
  • Making claims that are not supported by data
  • Ignoring contradictory findings or limitations of the study
  • Using excessive jargon or complex language
  • Not following the target journal’s formatting and submission guidelines

In concluding your article, it is crucial to restate the topic, emphasizing its significance within the broader context of your research. Highlight why this topic matters, whether due to its implications for future research, its relevance to current events, or its potential impact on policy or practice. This restatement serves to remind readers of the key issues at stake and reinforces the value of the work presented. By revisiting the importance of the topic, you create a foundation for the subsequent claims and arguments, inviting readers to reflect on their initial reactions to the subject matter.

Next, reiterate your central claim and thesis statement. This serves to clarify the primary argument of your article, ensuring that readers leave with a clear understanding of your position. Emphasizing these elements helps to solidify your message, reinforcing the conclusions drawn from your research. By restating your claim and thesis, you create a cohesive narrative that encapsulates the essence of your article, allowing readers to see how your findings support these foundational ideas.

In this section, briefly reiterate the key supporting points that underpin your thesis, summarizing the main findings or arguments presented in the article. This recap not only reinforces the validity of your claims but also helps readers remember the critical evidence that led to your conclusions. Additionally, create a connection between your opening and closing statements, weaving a coherent narrative that reflects the journey taken throughout the article. This symmetry enhances the overall structure and provides a satisfying conclusion for the reader.

Finally, provide insight into the implications of your findings and suggest areas for future research. Address any opposing viewpoints and explain why your position holds merit, inviting readers to consider the strengths of your argument. This section can serve as a call to action, urging readers to engage with the topic further or to explore its ramifications in different contexts. By outlining future research possibilities, you not only highlight the ongoing relevance of your work but also inspire continued inquiry into the subject.

References

  1. Law of the Republic of Uzbekistan “On Personal Data” (2019): Establishes the legal framework for the protection of personal data in Uzbekistan, defining rights, obligations, principles of processing, security measures, and cross-border transfers.

  2. Law of the Republic of Uzbekistan “On Information and Informatization” (2003): Regulates the dissemination and protection of information, covering access to information, freedom of expression, data security, electronic documents, and electronic signatures.

  3. Law of the Republic of Uzbekistan “On Electronic Commerce” (2004): Governs the legal aspects of e-commerce, including validity of electronic contracts, electronic signatures, and consumer protection in online transactions.

  4. Law of the Republic of Uzbekistan “On Copyright and Related Rights” (1996): Protects intellectual property rights, encompassing literary, artistic, and scientific works, software copyright, and database protection.

  5. Law of the Republic of Uzbekistan “On Informatization of State Bodies and Organizations” (2013): Aims to enhance efficiency and transparency of state entities through ICTs, addressing cybersecurity and data protection in the public sector.

  6. Criminal Code of the Republic of Uzbekistan: Includes provisions related to cybercrimes such as hacking, unauthorized access to computer systems, data theft, and dissemination of harmful information.

  7. Code of Administrative Responsibility of the Republic of Uzbekistan: Outlines administrative penalties for offenses related to information and communication technologies, such as violation of personal data protection rules or unauthorized access to information systems.

  8. Regulations of the Ministry for Development of Information Technologies and Communications: Covers various aspects of ICTs and cyber law, such as licensing of telecom operators, domain name registration, and cybersecurity standards.

    1. Duggal, P. (2023). Textbook on cyber law. Universal Law Publishing.
    2. Rosenoer, J. (1997). Cyber law: The law of the internet. Springer Science & Business Media.
    3. Kesan, J., & Hayes, C.M. (2016). Cybersecurity and privacy law in a nutshell. West Academic.
    4. Sharma, V. (2023). Information technology law. LexisNexis.
    5. Lloyd, I. (2014). Information technology law. Oxford University Press.
    6. Kerr, O. S. (2012). A theory of law in the internet age. Oxford University Press.
    7. Goldsmith, J., & Wu, T. (2006). Who controls the internet? Illusions of a borderless world. Oxford University Press.
    8. Johnson, D. R., & Post, D. G. (1996). Law and borders: The rise of law in cyberspace. Stanford Law Review.
    9. Solove, D. J. (2004). The digital person: Technology and privacy in the information age. NYU Press.
    10. Lessig, L. (1999). Code and other laws of cyberspace. Basic Books.
    11. Zittrain, J. (2008). The future of the internet and how to stop it. Yale University Press.
    12. Bambauer, J. (2012). The cyberlaw clinic. Journal of Legal Education.
    13. Halbert, D. (2017). Cybersecurity for business. Routledge.
    14. Brenner, S. W., & Clarke, R. A. (2013). The law of information privacy. Oxford University Press.
    15. Spinello, R. A. (2015). Cyberethics: Morality and law in cyberspace. Jones & Bartlett Learning.
    16. Tavani, H. T. (2016). Ethics and technology: Controversies, questions, and strategies for ethical computing. Wiley.
    17. Nissenbaum, H. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press.
    18. Regan, P. M. (1995). Legislating privacy: Technology, social values, and public policy. University of North Carolina Press.
    19. Cate, F. H., & Mayer-Schönberger, V. (2013). Information privacy law. Oxford University Press.
    20. Swire, P. P. (2003). None of your business: World data flows, electronic commerce, and the European privacy directive. Brookings Institution Press.
    21. Gellman, R. (2013). Fair information practices: A basic history. Government Information Quarterly.
    22. Citron, D. K. (2007). Hate crimes in cyberspace. Harvard University Press.
    23. Richards, N. M. (2015). Intellectual privacy: Rethinking civil liberties in the digital age. Oxford University Press.
    24. MacKinnon, R. (2012). Consent of the networked: The worldwide struggle for internet freedom. Basic Books.
    25. Wu, T. (2010). The master switch: The rise and fall of information empires. Knopf.
    26. Benkler, Y. (2006). The wealth of networks: How social production transforms markets and freedom. Yale University Press.
    27. Vaidhyanathan, S. (2011). The googled reader: How google is changing everything (the way we think, work, and live). Penguin Books.
    28. Gillespie, T. (2014). The relevance of algorithms. Media Technologies.
    29. Pasquale, F. (2015). The black box society: The secret algorithms that control money and information. Harvard University Press.
    30. Crawford, K., & Joler, V. (2018). Anatomy of an AI system. AI Now Institute.
    31. O’Neil, C. (2016). Weapons of math destruction: How big data increases inequality and threatens democracy. Crown.
    32. Eubanks, V. (2018). Automating inequality: How high-tech tools profile, police, and punish the poor. St. Martin’s Press.
    33. Noble, S. U. (2018). Algorithms of oppression: How search engines reinforce racism. NYU Press.
    34. West, S. M. (2017). Coding freedom: The ethics and aesthetics of hacking. MIT Press.
    35. Coleman, G. (2014). Hacker, hoaxer, whistleblower, spy: The story of Anonymous. Verso Books.
    36. Schneier, B. (2015). Data and Goliath: The hidden battles to collect your data and control your world. W. W. Norton & Company.
    37. Zetter, K. (2014). Countdown to zero day: Stuxnet and the launch of the world’s first digital weapon. Crown.
    38. Sanger, D. E. (2012). The perfect weapon: War, sabotage, and fear in the cyber age. Crown.
    39. Rid, T. (2013). Cyber war will not take place. Oxford University Press.
    40. Gartzke, E. (2012). The myth of cyberwar: Bringing war in cyberspace back down to earth. International Security.
    41. Mueller, M. L. (2010). Will the internet fragment? Sovereignty, globalization, and cyberspace. Polity.
    42. Deibert, R. J., Rohozinski, R., & Crete-Nishihata, M. (2008). Access denied: The practice and policy of global internet filtering. MIT Press.
    43. MacKinnon, R. (2012). Consent of the networked: The worldwide struggle for internet freedom. Basic Books.
    44. Deibert, R. J. (2013). Black code: Surveillance, privacy, and the dark side of the internet. Signal.
    45. Greenwald, G. (2014). No place to hide: Edward Snowden, the NSA, and the U.S. surveillance state. Metropolitan Books.
    46. Poitras, L. (2014). Citizenfour. HBO Documentary Films.
    47. Assange, J. (2012). Cypherpunks: Freedom and the future of the internet. OR Books.
    48. Schneier, B. (2012). Liars and outliers: Enabling the trust that society needs to thrive. Wiley.
    49. Gleick, J. (2011). The information: A history, a theory, a flood. Pantheon Books.
    50. Carr, N. (2010). The shallows: What the internet is doing to our brains. W. W. Norton & Company.

Lecture 1

International Laws

  • Convention on Cybercrime (Budapest Convention)
  • General Data Protection Regulation (GDPR)
  • Council of Europe Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data
  • EU Network and Information Security (NIS) Directive
  • EU Regulation on Electronic Identification and Trust Services (eIDAS)
  • African Union Convention on Cyber Security and Personal Data Protection
  • ASEAN Agreement on Electronic Commerce
  • Shanghai Cooperation Organisation Convention on Combating Terrorism, Separatism and Extremism
  • UN Resolution 57/239 on Creation of a Global Culture of Cybersecurity
  • International Covenant on Civil and Political Rights (ICCPR)


Laws of the Republic of Uzbekistan

  • Law “On Personal Data” (2019): Regulates the collection, processing, and protection of personal data in digital formats.
  • Law “On Copyright and Related Rights” (2006): Extends copyright protection to digital works.
  • Resolution No. 185 (2018): Established the Center for Cybersecurity, a key institution in implementing cyber laws.
  • Decree No. UP-5349 (2018): Outlines strategic measures for cybersecurity and combating cybercrime.
  • Law “On Electronic Government” (2015): Provides legal basis for digital government services and related security measures.
  • Law “On Countering the Use of the Internet for Extremist Purposes” (2018): Addresses issues of online extremism and related cyber activities.
  • Civil Code provisions: Cover aspects of electronic contracts and digital transactions.

Lecture 2

International Laws:

UN Convention on the Use of Electronic Communications in International Contracts
EU Regulation on Electronic Identification and Trust Services for Electronic Transactions in the Internal Market (eIDAS)
EU Web Accessibility Directive
Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data (Council of Europe Convention 108)
G8 Open Data Charter

Laws of Uzbekistan:

Law “On E-Government” (2015)
Law “On Electronic Digital Signature” (2003)
Law “On Electronic Document Management” (2004)
Law “On Personal Data” (2019)
Law “On Openness of Activities of Public Authorities and Administration” (2014)

Lecture 3

International Laws:

UNCITRAL Model Law on Electronic Commerce
OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data
EU Digital Single Market Strategy
WIPO Copyright Treaty
Basel Committee on Banking Supervision’s Guidance on Crypto-Assets

Laws of Uzbekistan:

Law “On Electronic Commerce” (2015)
Law “On Payment Systems and Payment Services” (2019)
Law “On Banks and Banking Activities” (new edition 2019)
Law “On the Securities Market” (2015, with amendments for digital assets)
Law “On Competition” (2012, with amendments for digital markets)

Lecture 4

International Laws:

Budapest Convention on Cybercrime
ITU Global Cybersecurity Agenda
EU Network and Information Security (NIS) Directive
WIPO Patent Cooperation Treaty
UN Guiding Principles on Business and Human Rights (in the context of AI)

Laws of Uzbekistan:

Law “On Cybersecurity” (2021)
Law “On Innovation Activity” (2020)
Law “On Science and Scientific Activity” (2019)
Law “On Industrial Property” (2002, with amendments for IT inventions)
Law “On Technical Regulation” (2009, with amendments for IT standards)

Lecture 5

International Laws:

EU General Data Protection Regulation (GDPR)
APEC Privacy Framework
Council of Europe Convention 108+
OECD Privacy Guidelines
UN Guidelines for the Regulation of Computerized Personal Data Files

Laws of Uzbekistan:

Law “On Personal Data” (2019)
Law “On Principles and Guarantees of Freedom of Information” (2002)
Law “On Protection of State Secrets” (1993, with amendments)
Law “On Informatization” (2003)
Law “On Electronic Document Management” (2004)

Lecture 6

International Laws:

Budapest Convention on Cybercrime
UN Convention against Transnational Organized Crime
International Convention for the Suppression of the Financing of Terrorism
EU Directive on Attacks against Information Systems
Council of Europe Convention on the Prevention of Terrorism

Laws of Uzbekistan:

Criminal Code of the Republic of Uzbekistan (with cybercrime provisions)
Law “On Combating Terrorism” (2000)
Law “On Operative-Search Activity” (2012)
Law “On Counteracting the Legalization of Proceeds from Crime and Financing of Terrorism” (2019)
Law “On Electronic Document Management” (2004)

Lecture 7

International Laws:

UN Basic Principles on the Role of Lawyers
Council of Europe Recommendation on the Freedom of Exercise of the Profession of Lawyer
IBA International Principles on Conduct for the Legal Profession
UN Guidelines on the Role of Prosecutors
EU Directive on the Right of Access to a Lawyer in Criminal Proceedings

Laws of Uzbekistan:

  1. Law “On Advocacy” (2018)
  2. Law “On the Prosecutor’s Office” (2001)
  3. Law “On the Bodies of Internal Affairs” (2016)
  4. Law “On Operational-Search Activity” (2012)
  5. Law “On Courts” (2000)

Lecture 8

International Laws:

UN Basic Principles on the Independence of the Judiciary
European Convention on Human Rights (Article 6 – Right to a fair trial)
EU Regulation on the Service of Documents and the Taking of Evidence in Civil or Commercial Matters
Hague Convention on the Taking of Evidence Abroad in Civil or Commercial Matters
Council of Europe Guidelines on Electronic Evidence in Civil and Administrative Proceedings

Laws of Uzbekistan:

Law “On Courts” (2000)
Civil Procedure Code of the Republic of Uzbekistan
Criminal Procedure Code of the Republic of Uzbekistan
Economic Procedure Code of the Republic of Uzbekistan
Law “On Electronic Document Management” (2004)

Lecture 9

International Laws:

Budapest Convention on Cybercrime
EU Network and Information Security (NIS) Directive
ISO/IEC 27001 Information Security Management
NIST Cybersecurity Framework
ITU Global Cybersecurity Agenda

Laws of Uzbekistan:

Law “On Cybersecurity” (2021)
Law “On Critical Information Infrastructure” (proposed)
Law “On Personal Data” (2019)
Law “On Informatization” (2003)
Law “On Electronic Document Management” (2004)

Lecture 10

International Laws:

Universal Declaration of Human Rights
International Covenant on Civil and Political Rights
EU Charter of Fundamental Rights
UN Human Rights Council Resolution on “The promotion, protection and enjoyment of human rights on the Internet”
Council of Europe Convention on Access to Official Documents

Laws of Uzbekistan:

Constitution of the Republic of Uzbekistan
Law “On Guarantees and Freedom of Access to Information” (1997)
Law “On Principles and Guarantees of Freedom of Information” (2002)
Law “On Mass Media” (2007)
Law “On Openness of Activities of Public Authorities and Administration” (2014)