Introduction to ethics and data law


Kamel Gadouche: The objective of the data security course is to provide students with a "culture of information security management" including the presentation of data security issues, responsibilities and application methods with concrete examples. This course will be based on current standards and reference systems (RGPD, ISO). It will present the principles of the method for establishing an information security policy in order to understand the stakes: objectives, governance, risks, measures, action plan, indicators, evaluation and continuous improvement. This part will also present recommendations, examples of security incidents and the main security measures generally implemented: anonymization, encryption, backups, access permissions, etc. 

Sonia Bressler: AI technologies are booming. For the general public today, this growth is accompanied by anxiety and often misunderstanding. This stress must not interfere with the ethical issues that must set the limits or framework for the development of digital uses. What about engineers? Beyond the playful side of the invention, are they aware of what they are putting in place? It is not a question here of summing up ethics to the dilemmas that, for example, an autonomous car could hypothetically face. Tool biases, environmental impacts, the ethics of solution designers, etc. are all points that deserve to be addressed from an ethical perspective".