COMP 555 - Information Privacy

Offered by Martin Robillard in the McGill School of Computer Science in Winter 2024 (4 credits). Mondays and Wednesdays 10:00-11:30 in Adams 211.

Overview

The pervasive collection of personal information by end-user and infrastructure software creates important implications for most stakeholders of software systems, including users, administrators, developers, and vendors. Engineering privacy in software requires both technical know-how and knowledge of regulatory standards and practices. As evidenced by the daily reporting of software vulnerabilities and privacy breaches, much remains to be done to improve the standards or privacy protection in software. This course will provide students with the knowledge and experience necessary to make informed privacy-related decisions both as software users and developers.

Course Topics

Privacy threats, privacy requirements, regulatory frameworks, privacy-enhancing technologies.

Learning Outcomes

After this course, students should be able to...

Target Audience and Required Background

This advanced course targets senior undergraduate students majoring in computer science or software engineering, and graduate students focusing on applied computing topics.

The official prerequisite is to have completed COMP 303. However, the course is ideally suited for students who have completed at least two more software-related course at the 300-level or above, and have relevant practical development experience. For graduate students who come from other institutions, equivalent courses are fine. The course work requires the ability and willingness to independently experiment with a diverse set of software technologies and tools.

Reference Material

Jaap-Henk Hoepman. Privacy is Hard and Seven Other Myths: Achieving Privacy Through Careful Design. MIT Press, 2021. Available from the Paragraph Bookstore.

The course involves a heavy reading component and additional reading will be required during the term. References will be provided with the detailed course schedule.

Course Work and Evaluation

Most lectures will be dedicated to active learning and involve the completion of in-class activities such as: synthesizing data breach reports, comparing privacy policies, searching vulnerability databases.

© Martin P. Robillard 2024