ITC568 Cloud Privacy and Security (8)

This subject focuses on issues surrounding cloud computing privacy and security and their application to business. It discusses the governance framework that must underpin and define the processes for determining risk, privacy and security issues for an enterprise which uses a cloud model. It will examine the legal and business requirements for privacy, the need for a risk management assessment of all data used in cloud operations, and the use of security controls to manage the assessed risk. It further examines the major cloud deployment and delivery models to determine how these affect the risk management assessment and subsequent security controls when applied to business.


Session 2 (60)
On Campus
CSU Study Centre Brisbane
CSU Study Centre Melbourne
Bathurst Campus

Continuing students should consult the SAL for current offering details: ITC568. Where differences exist between the Handbook and the SAL, the SAL should be taken as containing the correct subject offering details.

Subject Information

Grading System



One session


School of Computing and Mathematics

Enrolment Restrictions

Only available to postgraduate students.

Assumed Knowledge

ITC561 Cloud Computing

Learning Outcomes

Upon successful completion of this subject, students should:
  • be able to examine the legal, business and privacy requirements for a cloud deployment model;
  • be able to evaluate the risk management requirements for a cloud deployment model;
  • be able to critically analyse the legal, ethical and business concerns for the security and privacy of data to be deployed to the cloud;
  • be able to develop and present a series of proposed security controls to manage the security and privacy of data deployed to the cloud;
  • be able to develop and present a cloud governance framework to underpin the cloud operations for an enterprise.


This subject will cover the following topics:
  • Governance and auditing for cloud operations.
  • Threats, risk and requirements landscape.
  • Privacy, data and digital identity.
  • Data sensitivity, location and legal jurisdiction.
  • Cloud security approaches and challenges.

Indicative Assessment

The following table summarises the assessment tasks for the online offering of ITC568 in Session 2 2019. Please note this is a guide only. Assessment tasks are regularly updated and can also differ to suit the mode of study (online or on campus).

Item Number
Value %
Initial privacy and security assessment
Case study risk assessment
Privacy and data protection assessment
Privacy & data strategy
Pii strategy

The information contained in the CSU Handbook was accurate at the date of publication: October 2020. The University reserves the right to vary the information at any time without notice.