Online Banking Security Measures and Data Protection

Author(s):  
Fabio Diniz Rossi ◽  
Rumenigue Hohemberger ◽  
Marcos Paulo Konzen ◽  
Daniel Chaves Temp

The online banking industry has overgrown in recent years and will continue to grow as economic organizations remain to encourage customers to handle online banking transactions such as money transfers, access to account information, or payment of monthly bills. During this period, internet criminals and fraudsters attempting to steal personal customer information hijacked online banking. This article proposes reviewing the ways by which fraudulent activities are performed and what banks are doing to prevent such activities, as well as the new security measures that banks are using to increase customer confidence. Therefore, the authors present the threats, challenges to address such threats, some trends, and future landscapes regarding online banking security.


Author(s):  
Fabio Diniz Rossi ◽  
Rumenigue Hohemberger ◽  
Marcos Paulo Konzen ◽  
Daniel Chaves Temp

The online banking industry has overgrown in recent years and will continue to grow as economic organizations remain to encourage customers to handle online banking transactions such as money transfers, access to account information, or payment of monthly bills. During this period, internet criminals and fraudsters attempting to steal personal customer information hijacked online banking. This article proposes reviewing the ways by which fraudulent activities are performed and what banks are doing to prevent such activities, as well as the new security measures that banks are using to increase customer confidence. Therefore, the authors present the threats, challenges to address such threats, some trends, and future landscapes regarding online banking security.


1998 ◽  
Vol 4 (1) ◽  
pp. 18-24 ◽  
Author(s):  
Ben Stanberry

The electronic record may be subject to abuses that can be carried out on a large scale and cause great damage. A wide range of data protection and information security measures will need to be taken to ensure the quality and integrity of such records. A European Union directive was formally adopted in 1995 which sets the obligations of those responsible for data processing as well as a number of important rights for individuals. The responsible teleconsultant or medical officer, as the data controller, must make sure these measures are enforced. In the case of the transmission of medical records to another location, the original data controller may remain liable for abuses. But as different elements of the records are spread throughout the different departments of a hospital or across different geographical locations, it may become difficult to ascertain who is responsible for protecting and controlling what. To this end, the designation of liability by contractual means, between the hospitals and remote users of a telemedicine network, would be the clearest and most straightforward way of achieving uniformity and predictability in terms of the distribution of responsibility for data protection and security.


Author(s):  
Ian J. Lloyd

This chapter focuses on the data protection principles under the Data Protection Act 1998. It considers to what extent and under what conditions a data controller may lawfully process personal data. Use may take a variety of forms and will include disclosure of data to a third party. It also looks at the operation of the principle requiring users to adopt appropriate security measures.


2020 ◽  
Author(s):  
Bart Sloot

The General Data Protection Regulation in Plain Language is a guide for anyone interested in the much-discussed rules of the GDPR. In this legislation, which came into force in 2018, the European Union meticulously describes what you can and cannot do with data about other people. Violating these rules can lead to a fine of up to 20 million euros. This book sets out the most important obligations of individuals and organisations that process data about others. These include taking technical security measures, carrying out an impact assessment and registering all data-processing procedures within an organisation. It also discusses the rights of citizens whose data are processed, such as the right to be forgotten, the right to information and the right to data portability.


2021 ◽  
Vol 4 (2) ◽  
Author(s):  
Carolina Goberna Caride

Since March 2020 the Corona virus has limited personal encounters due to social distancing measures. Thus, many data collection techniques relying on face-to-face interaction, like interviews or Focus Groups (FG), are now being practised in online environments. Such change requires the implementation of innovative measures to comply with Regulation EU 2016/679 (GDPR) and obey national data protection laws. Processing personal data of voluntary participants has to have a lawful ground and a clear purpose behind it. Moreover, the researcher has to respect legal requirements and principles for processing personal data, provide the participants with information about the research procedure and apply security measures to avoid risks to the rights and freedoms of individuals. This process has to apply to any interaction mediated by Web-Conferencing Systems (WCS). The purpose of this paper is to describe the legal requirements for conducting online interviews or FG under social distancing conditions. The project of reference for the application of these requirements is the EU Horizon2020 HELIOS project consisting of the development of a decentralised social media platform. Lay summary At universities or in industry researchers can interview people personally to test, for instance, the use of a specific technology. The objective is to collect data for future improvements. In 2020 people all over the world found themselves in a pandemic. The Covid-19 limited social meetings with beloved ones and also restricted the work of scientific researchers. Individual or group interviews could not take place in presence. Thus, a solution was seen in online conferencing platforms such as Zoom. Modifying the space and the way in which an interview takes place poses some legal challenges regarding data protection. Such conversations with individuals always have to apply European and national data protection laws. Among other things, this means that there needs to be a specific legal reason to process personal data and a specific purpose behind the interview. Additionally, the researcher has to inform participants about all the legal terms, legal guarantees and research procedure. All this applies as well if online conferencing platforms are used. In this article, you can find a description of the necessary legal steps to develop online interviews with individuals or focus groups and fulfil European data protection requirements.


Author(s):  
Yassene Mohammed ◽  
Fred Viezens ◽  
Frank Dickmann ◽  
Juergen Falkner ◽  
Thomas Lingner

This chapter describes security and privacy issues within the scope of biomedical Grid Computing. Grid Computing is of rising interest for life sciences (Konagaya, 2006) and has been used since many years in sciences like high energy physics. Anyhow, medical applications on the grid require a special focus on data security and data protection issues. Based on general security and privacy rules, the authors describe the current state of the art of grid security. Then they describe which additional security measures have to be established in different biomedical grid scenarios. Legal aspects have to be taken into account as well as the current possibilities and flaws of grid security technology. Describing the enhanced security concept in MediGRID (MediGRID, 2005) they outline how medical Grid Computing could fulfill privacy regulations used in more demanding environments.


Author(s):  
Ian J. Lloyd

The notion that data controllers should comply with a set of general data protection principles has been a feature of data protection statutes from the earliest days. As well as imposing obligations on controllers, the principles also confer rights – most notably relating to subject access on data subjects. This chapter will consider the scope and extent of the principles paying particular attention to the requirement that personal data be processed fairly and lawfully. A topic of more recent interest relates to the length of time for which data may be held and made available to third parties. Often referred to as involving the “right to be forgotten”, this is especially relevant to the operation of search engines which make it easy for users to find news stories what would have passed into obscurity in previous eras. The chapter considers also at the operation of the principle requiring users to adopt appropriate security measures against unauthorized access, a topic which is of particular relevance given recent and well publicised large-scale cyber-attacks.


Sign in / Sign up

Export Citation Format

Share Document