Protecting organisations from personal data breaches

2009 ◽  
Vol 2009 (1) ◽  
pp. 13-18 ◽  
Author(s):  
Clifton Phua
Keyword(s):  
2021 ◽  
Vol 6 (10) ◽  
pp. 488-495
Author(s):  
Nurkhairina Binti Noor Sureani ◽  
Atikah Shahira Binti Awis Qurni ◽  
Ayman Haziqah Binti Azman ◽  
Mohd Bahrin Bin Othman ◽  
Hariz Sufi Bin Zahari

With the burgeoning technology, Malaysia has seen a staggering number of data breaches and data leaks within this past decade alone, with no signs of the trend decreasing. This has raised questions on whether the Personal Data Protection Act 2010 (PDPA) adequately protects the personal data of Malaysians. With the recent COVID-19 pandemic, data has been collected on a larger scale than before, with more frequent data leaks occurring. Hence, this study aims to analyse the adequacy of the PDPA by benchmarking it to the United Kingdom’s (UK) Data Protection Act 2018, which have seen a decrease in data breaches since the implementation of the new legislation. In this context, personal data refers to information processed or recorded that relates directly or indirectly to a data subject, who may be identified from the information and may include sensitive personal data. The study uses a doctrinal analysis methodology to best explore the ideas and concepts within the literature available regarding the protection of personal data. The study also employs a comparative analysis methodology by comparing the scope and application of Malaysian and UK legislation for benchmarking. The findings suggest that there are improvements to be made for the PDPA to be adequate.


2016 ◽  
Vol 89 (1) ◽  
Author(s):  
Spencer Wheatley ◽  
Thomas Maillart ◽  
Didier Sornette

2017 ◽  
Vol 33 (4) ◽  
pp. 458-469 ◽  
Author(s):  
Apostolos Malatras ◽  
Ignacio Sanchez ◽  
Laurent Beslay ◽  
Iwen Coisel ◽  
Ioannis Vakalis ◽  
...  

10.28945/2261 ◽  
2015 ◽  
Author(s):  
S. Srinivasan

Data breach is the act of accessing a central data repository without the consent of the data owner. Data breaches are occurring frequently and involve millions of records. Major breaches have been reported since 2005. Often data breaches occur due to someone with malicious intent accessing the stored data. In this paper we look at the types of data breaches and how they impact people’s privacy, we introduce a data protection model with the goal of protecting people’s privacy. Given today’s mobile information needs it is essential to have access to personal data. Social networks are making it difficult to keep personal information private. We provide several different summaries to show the effect of data breaches and data losses on people. We conclude this paper with a set of recommendations to protect people’s privacy.


Author(s):  
Egils Ginters ◽  
Dirk Burkhardt ◽  
Kawa Nazemi ◽  
Yuri Merkuryev

"Virtual and augmented reality (VR / AR) applications have successfully overcome the critical part of the Gartner curve. Investments are made and new products entering the economy. However, a very small percentage of society have also heard about AR glasses, mainly linking these with potential identity threats and personal data breaches. The authors dealt with the design of application of AR to improve golf skills by improving the putting technique. The above solution is complicated by requiring complex object recognition, tracking and advanced AR software designing."


2021 ◽  
Author(s):  
Hristo Alaminov ◽  

The report provides an overview of the importance and benefits of examining personal data breaches in the context of a global trend such as digitalisation. Regardless of the extremely negative consequences that security breaches have, both for the individuals whose data are affected and for the data controllers / processors, data breaches are valuable sources of information.


Author(s):  
Tony Liao ◽  
Haley Fite

Data breaches and data misuse are frequent occurrences in today’s digital society and often spark debate over who should hold responsibility. While many hold the platforms responsible when confronted with violations of data privacy, some users shift the blame inward for trusting the platforms and posting on them. While a large body of research has dedicated itself to issues of data privacy, discourses of individual responsibility and the internalization of user self-blame have received less attention. This study explores how users respond to unknown use of their personal data through the case of CrystalKnows, a personality detection algorithm that generated profiles about individuals using unknown data sources, often without the user’s knowledge. Founded in 2015, CrystalKnows claims to have the world’s largest personality database, providing and selling algorithmically generated user profiles, often without the express consent of these individuals. Interviews were conducted with individuals whose profiles appeared on the platform (N=37) to reveal users’ reactions and rationalizations of the data collected about them. Rationales of self-blame vary but commonly center issues of ambiguity concerning digital consent and the algorithm itself. Ultimately, these contribute to feelings of resignation often paired with the unrealistic alternative of total platform non-use. We argue that these complex discourses of self-blame, independence/choice, and resignation/non-use as the only options are intertwined with data privacy reform efforts. Understanding the sources of self-blame and how deep it runs is an important step to interrogating and refuting some of these assumptions, if broader reforms hope to garner support and implementation.


Author(s):  
Andriyanto Adhi Nugroho ◽  
Atik Winanti ◽  
Surahmad Surahmad

The arrangement of personal data protection in national law is stipulated explicitly in the regulation of the Minister of the Ministry of communication and  Informasi  No. 20 of 2016 on the protection of personal data. In Indonesia, there are no rules that accommodate the protection of personal data on financial technology. That can be hazardous when the economic response of technology is not limited to its use. The case of personal data is not contained in the case of a Such hazard that may arise. The case from the theft of personal data, damage to the system that may allow the occurrence of data breaches, misuse of personal data that has been the business ruled itself, or other parties who may access personal consumer data (such as government). The need to set this up is important because private data is a person's privacy right. Still, it can fundamentally be economically valuable for a third party who is about to take advantage of it.


Sign in / Sign up

Export Citation Format

Share Document