scholarly journals Data Misuse, Data Theft and Data Protection in Nigeria: A Call for a More Robust and More Effective Legislation

2021 ◽  
Vol 12 (04) ◽  
pp. 1284-1298
Author(s):  
Abiodun Odusote
Keyword(s):  
JURISDICTIE ◽  
2021 ◽  
Vol 11 (2) ◽  
pp. 163-181
Author(s):  
Dwi Nugrahayu Devianti ◽  
Prija Djatmika ◽  
Sukarmi Sukarmi

The online loan via financial technology (fintech) is currently a new buzz in Indonesian society. Its facilities and ease in proposing the loan are very much attracting. However, this online loan practice often raises legal issues; one of them is personal data misuse. This article analyzes the usage of other people’s personal data in fintech services. This is a doctrinal legal research with statute approach. The results reveal that personal data protection has yet firmly ruled in legislation. This proves that privacy is not an urgent matter to safeguard. It then implies to the many cases on personal data theft in online loan. The operators of fintech services are responsible to protect customers’ personal data. Those found guilty to misuse the personal data will be subject to criminal sanction.Pinjaman online melalui teknologi finansial menjadi trend baru masyarakat Indonesia. Berbagai fasilitas dan kemudahan dalam pengajuan pinjaman menjadi daya tarik tersendiri. Namun, praktik pinjaman online sering menimbulkan persoalan hukum, salah satunya adalah penyalahgunaan data pribadi. Artikel ini bertujuan menganalisis penggunaan data pribadi orang lain dalam layanan finansial teknologi. Artikel ini berasal dari penelitian hukum doctrinal dengan pendekatan peraturan perundang-undangan. Hasil penelitian ini menunjukkan bahwa perlindungan data pribadi belum diatur secara tegas dalam peraturan perundang-undangan. Kondisi ini menunjukkan bahwa privasi bukan persoalan yang urgen untuk dilindungi. Hal ini berimplikasi terhadap maraknya pencurian data pribadi dalam pinjaman online. Penyelenggara jasa layanan finansial teknologi memiliki tanggung jawab untuk melindungi data pribadi nasabah. Penyelenggara yang terbukti menyalahgunakan data pribadi dapat dikenai sanksi pidana.


2018 ◽  
Vol 7 (2.31) ◽  
pp. 101
Author(s):  
K Vamsi Krishna ◽  
V Srikanth

Cloud Computing has been intrinsically changing the way we utilize computers to keep and retrieve our personal & business data. With the advent of this emerging paradigm of computing, it arises the new security challenges. Existent cryptographic data security techniques i.e., encryption deteriorated in preventing data theft attacks once the key is compromised, especially those perpetrated by insiders. Cloud Security Alliance reckoned this threat as a significant danger of Cloud Computing. Although the majority of Cloud users are very much known of this risk, they are leftover with the only choice of trusting the cloud service provider, regards to their data protection. In this paper, we propose an alternate way to secure data on the cloud which is more efficient and secure by the concoction of user profile mapping using Hadoop framework and offensive decoy technology. 


2007 ◽  
Vol 4 (5) ◽  
pp. 36-37
Author(s):  
N. Cater
Keyword(s):  

2017 ◽  
Vol 2017 (1) ◽  
pp. 35-44
Author(s):  
Dawid Zadura

Abstract In the review below the author presents a general overview of the selected contemporary legal issues related to the present growth of the aviation industry and the development of aviation technologies. The review is focused on the questions at the intersection of aviation law and personal data protection law. Massive processing of passenger data (Passenger Name Record, PNR) in IT systems is a daily activity for the contemporary aviation industry. Simultaneously, since the mid- 1990s we can observe the rapid growth of personal data protection law as a very new branch of the law. The importance of this new branch of the law for the aviation industry is however still questionable and unclear. This article includes the summary of the author’s own research conducted between 2011 and 2017, in particular his audits in LOT Polish Airlines (June 2011-April 2013) and Lublin Airport (July - September 2013) and the author’s analyses of public information shared by International Civil Aviation Organization (ICAO), International Air Transport Association (IATA), Association of European Airlines (AEA), Civil Aviation Authority (ULC) and (GIODO). The purpose of the author’s research was to determine the applicability of the implementation of technical and organizational measures established by personal data protection law in aviation industry entities.


Author(s):  
Yanis Arturovich Sekste ◽  
Anna Sergeevna Markevich

The subject of this research is the problems emerging in the process of establishment and development of the Institution of personal data protection in the Russian Federation. Special attention is turned to the comparison of Soviet and Western models of protection of private life and personal data. The authors used interdisciplinary approach, as comprehensive and coherent understanding of socio-legal institution of personal data protection in the Russian Federation is only possible in inseparable connection with examination of peculiarities of the key historical stages in legal regulation of private life of the citizen. After dissolution of the Soviet political and legal system, the primary task of Russian law consisted in development and legal formalization of the institution of protection of human and civil rights and freedoms, first and foremost by means of restricting invasion of privacy by the state and enjoyment of personal freedom. It is concluded that the peculiarities of development of the new Russian political and legal model significantly impacted the formation of the institution of personal data protection in the Russian Federation. The authors believe that the Russian legislator and competent government branches are not always capable to manage the entire information flow of personal data; therefore, one of the priority tasks in modern Russian society is the permanent analysis and constant monitoring of the development of information technologies.


Sign in / Sign up

Export Citation Format

Share Document