scholarly journals DATA BREACHES AND DIGITALISATION

2021 ◽  
Author(s):  
Hristo Alaminov ◽  

The report provides an overview of the importance and benefits of examining personal data breaches in the context of a global trend such as digitalisation. Regardless of the extremely negative consequences that security breaches have, both for the individuals whose data are affected and for the data controllers / processors, data breaches are valuable sources of information.

Curationis ◽  
2015 ◽  
Vol 38 (2) ◽  
Author(s):  
J.P.F. Masemola-Yende ◽  
Sanah M. Mataboge

Background: The increase in the number of teenage pregnancies and its negative consequences has encouraged various researchers to explore the possible causes of teenage pregnancy. Findings from previously-conducted research have indicated different preventable factors that predispose female teenagers to pregnancy, such as staff attitudes and the lack of information resulting from poor access to health facilities.Objective: To explore and describe access to information and decision making on teenage pregnancy prevention by females using a primary healthcare clinic in Tshwane, South Africa.Method: In this study, the researchers used a descriptive qualitative and exploratory research design to explore and describe the verbal reports regarding prevention of teenage pregnancy by females using a primary healthcare clinic in Tshwane, South Africa. Face-to-face semistructured interviews were conducted with 15 female participants aged between 15 and 26, who had been pregnant once or more during their teens.Results: Two themes emerged, namely, access to information and decision making by female teenagers. Five categories that emerged were: access to information on pregnancy prevention; ignoring of provided information; the use of alternative medicine with hormonal contraception; personal reasons for use and non-use of contraception; and decisions made by teenagers to not fall pregnant. Females in this study fell pregnant in their teens, even though they had access to information.Conclusion: Given the complexity of this problem, female teenagers should use their families as primary sources of information for reproductive health promotion and educational institutions should build on this to aid the prevention of teenage pregnancy.


Lex Russica ◽  
2019 ◽  
pp. 121-128 ◽  
Author(s):  
M. N. Maleina

The use of modern genomic technologies, along with the benefits to the man and society, can lead to negative consequences. Such risks exist both in the process and after the production, isolation, modification, storage of DNA. Prior to detailed legislative regulation of relations regarding the use of genomic technologies for medicinal purposes and not for medical reasons, legal principles become vital.The paper formulates the following basic legal principles of genomic technologies application: the principle of preventive actions of the state to protect citizens from the risks of using genomic technologies; the principle of preserving the human genome as a special species; the principle of guaranteeing the inviolability of the individual of every citizen when using genomic technologies; the principle of priority of life and health of citizens over the interests of science and society; the principle of equality of citizens regardless of genetic characteristics; the principle of protection of genetic information of every citizen as part of personal data; the principle of guaranteeing access to the citizen’s own genetic information. Legal principles can be used to resolve a dispute by analogy of law.


Author(s):  
Sergey E. Channov ◽  

Introduction. The article is devoted to the use of digital technologies in the field of public administration using the example of state and municipal information systems. Currently, two types of such systems can be distinguished in the Russian Federation: 1) allowing direct enforcement activities; 2) used to capture certain information. Theoretical analysis. Information systems of the first type acquire the properties of an object of complex legal relations, in which suppliers and consumers of information, government bodies, as well as other persons become participants. This entails the fact that in the implementation of public administration, the source of regulation of public relations to a certain extent becomes the program code of these information systems. Accordingly, any failures and errors in the public information system become facts of legal importance. Empirical analysis. The main risks of using information systems of the second type in public administration relate to the illegal access (or use) of information stored in their databases. The consolidation of databases containing different types of information is a serious threat. In this regard, the creation of the Unified Federal Information Register containing information about the population of the Russian Federation, provided for by the Federal Law No. 168-FZ of 08.06.2020, may lead to a large number of socially negative consequences and comes into obvious conflict with the legislation on personal data. Results. State and municipal information systems themselves can improve public administration, including reducing corruption in the country. At the same time, their reduced discretion in management decisions is not always appropriate. Accordingly, their implementation should be preceded by the analysis of the characteristics of a specific area of management, as well as the proposed use of digital technologies.


Author(s):  
David Anthony Pittaway

The Covid-19 pandemic accelerated the global trend towards spending increasing amounts of time online. I explore some of the potential negative consequences of lockdown-induced increases in time spent online, and I argue that the stressful context of the pandemic and lockdowns is exacerbated by being online beyond that which is required for essential purposes. Time spent online may increase stress levels by perpetuating the sympathetic nervous system's fight-or-flight response, draining a person’s energy and diminishing one’s ability to deal with illness. I frame the situation as one in which the pandemic context, combined with a mandatory need to be online more, forces many people into what Daniel Kahneman calls “System 1 thinking”, or “fast thinking”. I argue that digital hygiene requires the suspension of System 1 thinking, and that “philosophical perception” resonates with potential remedies in this regard.


Author(s):  
Ian J. Lloyd

Information Technology Law provides a thorough account of information technology (IT) law. The volume looks at the subject in a wide context, examining the legal response to the latest IT-related developments within society, bringing the law to life and examining how legal issues in IT can affect everyone. This title considers issues in IT law on European and international scales, providing a realistic overview of how the law in this area operates globally and encouraging further thought and investigation about the current issues within IT law. The eighth edition covers major new legislation in this field, including the Investigatory Powers Bill and its proposed impact and scope; the rise in online fraud in the context of the Computer Misuse Act; discussion of personal data in the light of recent high-profile security breaches and new EU directives; new legislation introduced in response to the issue of revenge pornography; updated coverage of patent law, copy protection, and digital rights management; discussion of the Consumer Rights Act 2015 with regards to digital products and content; and consideration of new cases in all areas of the law.


2010 ◽  
Vol 11 (2) ◽  
Author(s):  
Lukas Feiler

AbstractThe ePrivacyDirective and the FrameworkDirective as amended by the EU Telecoms Package introduce, for the first time, obligations for providers of public communications networks and for providers of publicly available electronic communications services to notify certain personal data security breaches and certain network security breaches to subscribers, individuals concerned, and/or the competent national (regulatory) authority. This paper analyzes the conditions under which different types of security breaches will have to be notified and to whom this notification will have to be addressed. The paper will conclude with a riskbased assessment of these new security breach notification requirements, examining to what extent they not only allow users to take corrective security measures and regulators to make informed policy choices, but also to what extent the new policies address the fundamental problem of the misalignment of risk and risk mitigation capability.


2017 ◽  
Vol 12 (01) ◽  
Author(s):  
Nupur Gupta

Security has always been a primary concern whether be it home or office. With the advent of information technology security over the information acquired takes a prime concern. Security breaches are prevailing from technical to business field. Information technology has inundated the business sector and education world and every possible area one can think of. Consider the case of CERT-I n where, Hours ahead of its planned protest against certain incidents of internet censorship in India , hacker collective Anonymous attacked and brought down the website run by Computer Emergency Response Team India (CERT-I n). Amongst the most disastrous information leakage breach was the hacking of data for 1.5 million Master and VISA card users. VISA and MASTER card alerts banks about the security breach at Global Payments. The alert clearly stated that full Track 1 and Track 2 information was taken and could have been abused for counterfeit new cards. This information had been compromised from a period of January 21,2012 to February 25,2012. Yet it was not the company who disclosed the security breach, the security blogger Brian Krebs in security reported the event on 30,March,2012, This pattern is common for all security breaches as the conclusion who are impacted are the last ones to know about it. These threats to business need a stronger mechanism of security to counter them. Biometrics has offered new venues to resolve these issues. Biometrics refers to the physiological or behavioural characteristics of a person to authenticate his/her identity. This Biometrics is the most prominent and promising technique used for authenticating a person’s identity. Voice Biometrics, Finger printing, facial Recognition area few biometrics that are used for security purposes. This paper majorly cover Voice Biometrics. voice biometrics uses the pitch, tone, and rhythm of speech. Background noise, illness, age, and differences in telephones and microphones can cause problems with voice identification and authorization.[Paper: exploration - voice - biometrics_1436] This is mostly used by Banks and Call Centres to authenticate there users. A telephone or microphone is required to proved your identity. Voice Biometrics is mostly adopted by the customers as they find it as a normal telephonic conversation. Remotely any customer from any location can login or use his/her ID. Each person has a unique voice and that can be easily stored in form of bits. So, this provide a better option for the developer or programmers to authenticate their software, databases etc using Voice Biometrics. Number of methods are used to apply these Biometrics. As a first step the new user has to record his/her speech by calling a telephone collection script. Once there is an existent recording the user is allowed to invoke an enrolment form and specify personal data, such as passwords and answers to questions on various topics, as suggested by the server. The answers can be selections from predetermined value lists, e.g. selected cities or colours, or user’s own new keywords. It is also possible to add new questions within the existent topics or dynamically generate these based on contexts or history of previous transactions or other events.


2021 ◽  
Vol 6 (10) ◽  
pp. 488-495
Author(s):  
Nurkhairina Binti Noor Sureani ◽  
Atikah Shahira Binti Awis Qurni ◽  
Ayman Haziqah Binti Azman ◽  
Mohd Bahrin Bin Othman ◽  
Hariz Sufi Bin Zahari

With the burgeoning technology, Malaysia has seen a staggering number of data breaches and data leaks within this past decade alone, with no signs of the trend decreasing. This has raised questions on whether the Personal Data Protection Act 2010 (PDPA) adequately protects the personal data of Malaysians. With the recent COVID-19 pandemic, data has been collected on a larger scale than before, with more frequent data leaks occurring. Hence, this study aims to analyse the adequacy of the PDPA by benchmarking it to the United Kingdom’s (UK) Data Protection Act 2018, which have seen a decrease in data breaches since the implementation of the new legislation. In this context, personal data refers to information processed or recorded that relates directly or indirectly to a data subject, who may be identified from the information and may include sensitive personal data. The study uses a doctrinal analysis methodology to best explore the ideas and concepts within the literature available regarding the protection of personal data. The study also employs a comparative analysis methodology by comparing the scope and application of Malaysian and UK legislation for benchmarking. The findings suggest that there are improvements to be made for the PDPA to be adequate.


the security of users are questioned when security breaches occur in data when third parties are incorporated for collecting and controlling huge amount of personal data. A decentralized network of peers are accompanied by a public ledger and it has demonstrated bitcoin in the financial space that trusted and auditable computing. This paper describes a decentralized personal data management system for ensuring users control over their data. A protocol is implemented that is capable of turning a blockchain into an automated access-control manager that is not requiring trust in a third party. There are no strict financial transactions in our system. They are used for carrying instructions like querying, storing and sharing data. Finally, some possible blockchain extensions are discussed that are able to harness them into a well-rounded solution for faithful computing problems in society.


Sign in / Sign up

Export Citation Format

Share Document