On the issue of strengthening the criminal and legal protection of employee personal data

2021 ◽  
Author(s):  
E.B. Vered ◽  
I.A. Sementsova

The legislation on personal data has undergone significant changes in connection with the manifested trend of a large amount of their unauthorized placement on the Internet. In this regard, we believe, depending on the severity of the consequences of their “leakage”, to criminalize significant harm to the rights and legitimate interests of a person. Since the use of personal data from social networks by commercial organizations, including about their employee, has now become more frequent without their consent, a corresponding ban should be established in federal legislation. In addition, using modern artificial intelligence systems, attackers have almost unlimited capabilities to obtain all information about the employee. For this reason, the authors of the article propose to fix the corresponding feature as qualifying in Art. 137 of the Criminal Code.

Author(s):  
Александр Григорьевич Остапенко ◽  
Руслан Валентинович Сорокин ◽  
Сергей Викторович Лихобабин ◽  
Артём Олегович Ткаченко ◽  
Андрей Николаевич Бартенев ◽  
...  

В данной статье затрагивается тема мировой инфодемии в контексте информационного влияния и давления на общественность, во многом образованную пользователями Интернет-пространства. В работе ведется рассуждение об актуальности исследования социальных Интернет-сайтов и процессов распространения в них потенциально опасных контентов. Описаны общие характеристики целеполагания исследований в различных областях таких как: суверенизация информационного пространства, анонимности и ответственности интернет-пользователей, контроля трафика, инфодемии, применения систем искусственного интеллекта в Интернет-пространстве. This article touches upon the topic of the global epidemic in the context of informational influence and pressure on the public, who are directly users of the Internet space. The paper discusses the interest in researching social Internet sites and the processes of distributing potentially dangerous content therein. The general characteristics of the goal-setting of research in various fields are described, such as the sovereignization of the information space, the anonymity and responsibility of Internet users, traffic control, infodemics, the use of artificial intelligence systems in the Internet space.


2021 ◽  
Vol 109 ◽  
pp. 01019
Author(s):  
Natalia Kovaleva ◽  
Svetlana Kulikova ◽  
Natalia Zhirnova ◽  
Tatiana Rudchenko

The article focuses on the analysis of legal protection of personal, political, labor, educational and other rights, freedoms and legitimate interests of citizens on the Internet, as there are generally recognized problems related to their violation by individuals or various organizations.The authors analyze how citizens’ rights, such as the right of access to the Internet (the right to the internet connection, the right to IT neutrality, the right to availability of internet service, the right to comfortable usage of internet services, the right not to be disconnected) the right to digital identity (the possibility to manage internet data of private persons), the right to anonymity (the possibility of carrying out certain actions under a false name without revealing personal data that would allow the person to be identified), the right to discard unwanted information (to protect oneself against spam), the right to be forgotten, right to safe internet use, both in the technological as well in the contextual meaming, are declared and implemented on the Internet.


Author(s):  
Tarana Singh ◽  
Jyoti Mishra

Artificial intelligence (AI) is a part of our lives. Everything that we do on the internet is influenced to various extents by AI. It can automate various tasks in education as well as in other domains. Education domain is mainly benefited by AI, especially for the learning purpose. There may be the software to perform all activities which needs automation. This software can point out that course needs improvement. An AI software can give students and educators helpful feedback. Data, which is powered by AI, also helps schools, teachers, and supports students. There are lots of benefits of AI in education, which improves the learning experience of the students, for example personalization, teaching, grading, feedback on course quality, creating a global classroom, monitoring performance, and a lot more. When a new promising technology emerges and when the limitation of technology and the challenges of applying are often not perfectly understood, then the technology may seem to open radically new possibilities for solving old problems.


Author(s):  
Ana María Gil Antón

Este trabajo aborda, de manera sintética, uno de los problemas más relevantes con los que nos estamos encontrando en el Siglo XXI resultado del fenómeno de Internet, el de las redes sociales que constituyen vías consolidadas de relación e interacción cotidianas, no sólo de las nuevas generaciones de adolescentes y jóvenes, sino también de todo el conjunto de nuestra sociedad. Y pese a que la utilización de las nuevas Tecnologías de la Información y Comunicación ofrece grandes oportunidades y ventajas, no puede obviarse igualmente que éstas nos pueden situar en la sociedad del riesgo, por cuanto que pueden entrañar múltiples peligros, entre los que cobra una especial relevancia la posibilidad de conculcación de los derechos fundamentales a la intimidad, al honor, a la propia imagen y a la protección de datos personales, bien individualmente considerados o, bien de forma conjunta, acrecentándose los citados riesgos entre jóvenes y adolescentes, en cuanto usuarios indiscriminados. Pero, a éstos se añaden además otros riesgos por conductas delictivas, como el denominado Ciberacoso.This research recollects in a synthetic way, one of the most relevant problems the society is facing today, as a consequence of the Internet phenomenon. The routes of social Networks in the daily relations and interactions are consolidating in such a way that is not only affecting the young teenagers and the new generation, but also the whole of our society. In spite of the fact that, the utilization of new Technology of Information and Communication offer great opportunities and have many advantages, however, one should not ignore that this situation is putting the society at risk. This phenomenon contains many dangers, as well as the possibility of violating the fundamental laws to intimacy, to the honor, to one’s own image and to the personal data protection, being individually considered or as a whole form in conjunction of the mentioned risks between the youth and adults users. Moreover, there will be an increase of this risk, because of criminal behaviors as Ciber bullying.


2019 ◽  
Vol 6 (1) ◽  
pp. 54
Author(s):  
Azharuddin Azharuddin

The presence of the Internet Banking service has offered a number of convenience and flexibility in conducting transactions, both between the bank and its customers, the bank and merchant, bank with the bank and the customer with the customer. However, this simplicity does not mean no risk. In addition to the Internet Banking service provides convenience, also in fact have some risks. The risk of a new character and is a challenge for practitioners and experts in the field of Internet Banking service to handle it, so it becomes important to discuss the legal efforts to protect customers' personal data in the operation of Internet Banking service after changes in legislation and elektronic information transaction. Forms of protection against customer data in Internet Banking in Indonesia are from several types of regulations that have regulated internet banking, namely Bank Indonesia Regulation Number 9/15 / PBI / 2007 concerning Application of Risk Management in the Use of Information Technology by Commercial Banks and Act No. 19 of 2016 concerning Amendments to Act No. 8 of 2011 concerning Electronic Information and Transactions along with the Financial Services Authority Act in the section on consumer protection


Author(s):  
Olga Shulga

The purpose of the work is to consider the theoretical and practical aspects of fraud in the Internet sphere and on this basis to identify ways to ensure the confidentiality and cybersecurity of private users and commercial organizations. The methodological basis of the work is the use of general and special methods of scientific knowledge. Methods of combining analysis and synthesis, induction and deduction have been used to identify different types of fraud in the Internet. Generalization methods, logical and empirical, were used in determining the directions of development of the national cyber defense system and ensuring confidentiality. The main results of the work: The most common methods of fraud with the use of bank payment cards are identified, among which: a fake poll on social networks with a prize draw; a phone call to obtain classified information; SIM card replacement for access to online banking; online payments on unsecured sites; phishing; copying card data when handed over; unsecured WI-Fi networks; computers in public places; skimming for card data theft; unauthorized micropayments; ATM fraud; use of malicious programs (viruses), fake sites in order to compromise the details of electronic payment instruments and/or logins/passwords for access to Internet/mobile banking systems; dissemination (sale, dissemination) of information on compromised data; terminal network fraud; fraud in remote service systems; social engineering. Basic security rules are defined to prevent fraud. The experience of European countries in the field of cybersecurity is analyzed. The directions of adaptation of the current legislation on cybersecurity to the EU standards are outlined and the directions of development of the national system of cybersecurity are defined. The practical significance of the results is to deepen the understanding of the nature and mechanism of various types of fraud in the Internet. The recommendations proposed in the paper can form a methodological and theoretical basis for the development of economic policy of the state to ensure the confidentiality and cybersecurity of private users and commercial organizations. Conclusions. The state should establish an effective oversight body in the field of personal data protection, but security measures and online restrictions should comply with international standards. The use of encryption should not be prohibited at the legislative level, as such restrictions reduce the ability of citizens to protect themselves from illegal intrusions into privacy. In addition, the state policy in the Internet should be aimed at promoting the development and operation of secure Internet technologies and the formation of mechanisms to protect against services and protocols that threaten the technical functioning of the Internet from viruses, phishing and more.


2020 ◽  
Vol 10 (86) ◽  
Author(s):  
Valentyna Babiichuk ◽  

The research has been done on the international legal protection of rights and freedoms of Internet users in the context of the rapid grow and development of information and telecommunication technologies, global spread of Internet coverage and extraordinary availability of IT resources. The article demonstrates and analyses precedents of human rights abuses and violations in cyberspace, covers international and national legal instruments countering them, highlights potential methods of human rights and security, examines Internet safety concerning privacy and phenomenon of the overall transformation of private international law in accordance with challenges of the day. Numerous possible measures to protect personal data in cyberspace are listed as well as shortcomings of modern legal regulation in the area of human rights, violations on the Internet, which allow certain private actors to dodge the law. The author reviewed and summarized the main international and national legal acts in the field of human cybersecurity and the general content of it, documents of international organizations, regulating some aspects of cybersecurity were examined as well as some aspects of privacy in social settings and Internet platforms. The article also emphasizes that the comprehensive study of Internet challenges will always be a topical issue, for reasons that innovation and progress are on the rise, and the world faces more and more new and emerging challenges every day. Scientists and lawyers do not have the time and physical ability to analyze and research a great deal of information. They are failing to propose solutions to existing problems and to adapt legal systems to daily changes. The article also has taken note that the accessibility of the Internet could possibly jeopardize democracy. The main idea of research and the key thesis of the article is international and public methods to protect human rights on the cyberspace and also themself protection of users. The author has demonstrated how essential in our on-line work and Internet using safety is. In addition, the author showed how easy our private information could be about to the risk of identity theft and described well-known precedent of such cases.


Yuridika ◽  
2020 ◽  
Vol 35 (3) ◽  
pp. 657
Author(s):  
Yusuf Arif Utomo

In the era of digital economic development, the community continues to innovate in terms of providing lending and borrowing services. One form of development of Financial Technology (fintech) is the distribution of funds through the Peer to Peer (P2P) Lending system. Where this system has more or less the same role as banks, namely as an organizer; from parties who have funds (investors) to those who need funds (debtors) whose methods are carried out online. The distribution of funds through the P2P Lending system has developed rapidly in Indonesia. In carrying out its business, the loan and loan service provider uses an electronic system that is a series of electronic devices and procedures that function to disseminate information in the field of financial services. The electronic system can also be referred to as Artificial Intelligence (AI). By using AI, loan and loan service providers can find out all the debtor's personal data, where in the end the debtor becomes disadvantaged because his personal rights are violated. On the other hand there are no legal provisions in Indonesia that can protect debtors in this regard. So that in this study later will discuss about the extent of legal arrangements related to the protection of debtors in the P2P Lending system using AI. This research uses the statute approach method; namely the approach through legislation and conceptual approach, namely the legal approach through the concepts and opinions of legal experts.


Sign in / Sign up

Export Citation Format

Share Document