scholarly journals Recent trends in the development of legal regulation in the sphere of ensuring information security of the judicial system in the Russian Federation

Author(s):  
Andrei Kirillovich Duben'

This article explores the questions of information security in the conditions of digital transformation and improvement of state administration. The author analyzes the impact of these challenges upon the judicial system overall and legal support of information security. Considering the existing scientific research and foreign experience, the conclusion is made on modernization of digital interaction on the issues of notifying the parties about the court hearing. Special attention is given to the institution of identification. Vectors in the development of complex institution of identification in the conditions of digital transformation are outlined. The author analyzes the case law material of the courts of general jurisdiction pertaining to personal data protection of a particular category of citizens; as well as substantiates the importance of digital notification of the parties to court proceedings for preventing the abuse of procedural rights by unconscientious participants. The author believes that formalization of prohibition on posting court documents online, in cases involving military personnel or persons doing military service, would ensure personal data protection of a particular category of citizens. . The conclusion is made that the highlighted issues of ensuring information security in the context of administration of justice testify to poor legal regulation of the institutions of identification and personal data. The consolidation of the uniform principles of legal regulation of relations that arise in the process of consideration and resolution of court cases with the use of information and telecommunications technologies, would allow countering the new challenges and threats in the information sphere, as well as the impact of globalization upon determination of the national strategy for the development of information society.

Author(s):  
Yanis Arturovich Sekste ◽  
Anna Sergeevna Markevich

The subject of this research is the problems emerging in the process of establishment and development of the Institution of personal data protection in the Russian Federation. Special attention is turned to the comparison of Soviet and Western models of protection of private life and personal data. The authors used interdisciplinary approach, as comprehensive and coherent understanding of socio-legal institution of personal data protection in the Russian Federation is only possible in inseparable connection with examination of peculiarities of the key historical stages in legal regulation of private life of the citizen. After dissolution of the Soviet political and legal system, the primary task of Russian law consisted in development and legal formalization of the institution of protection of human and civil rights and freedoms, first and foremost by means of restricting invasion of privacy by the state and enjoyment of personal freedom. It is concluded that the peculiarities of development of the new Russian political and legal model significantly impacted the formation of the institution of personal data protection in the Russian Federation. The authors believe that the Russian legislator and competent government branches are not always capable to manage the entire information flow of personal data; therefore, one of the priority tasks in modern Russian society is the permanent analysis and constant monitoring of the development of information technologies.


2021 ◽  
pp. 17-28
Author(s):  
V. BRYZHKO ◽  
V. PYLYPCHUK

The article is a continuation of a number of scientific works on the state, trends and further ensuring security of personal data in the context of digital transformation and related problems of legal regulation of new social relations in this area. The key aspects of the EU documents approved in recent years, in particular, the GDPR Regulation, the NIS Directive and the draft legal act on e-Privacy, are considered and evaluated. The main criteria and topical issues that need to be addressed in the context of the implementation of EU law and the development of national legislation on personal data protection are highlighted.


Jurnal Hukum ◽  
2021 ◽  
Vol 37 (1) ◽  
pp. 1
Author(s):  
Giosita Kumalaratri ◽  
Yunanto Yunanto

The development of information technology in the era of globalization makes it easier for people to carry out their daily activities, apart from socializing, it can also be a channel for work. Behind the simplicity coveted by technological developments opens up loopholes related to personal data that is easily misused. Indonesia does not yet have specific laws governing the protection of personal data as a whole. So that the author will examine the urgency of the draft personal data law in Indonesia, personal data protection schemes, to the impact of the implementation of the personal data protection bill. This study uses a normative juridical research method. The results of the study point to a privacy rights protection scheme in which everyone has the right to publish personal data or the right not to publish personal data to the public. The weakness of personal data protection regulations in Indonesia that have not been specifically regulated increases the potential for crimes against the right to privacy, but the drafting of the Personal Data Protection Bill brings fresh air not only to the public but to the government sector to the international business environment.


2019 ◽  
Vol 2 (1) ◽  
pp. 515-522
Author(s):  
Justyna Żywiołek

Abstract The article highlights the importance of information and the need to manage its security. The importance of information requires a systemic approach, which is why the standards of conduct for managing information security have been approximated. The results of research on information security management in the field of personal data protection have been presented. The research was carried out on a sample of 110 enterprises. The survey was extended to include an analysis of one of the companies subject to the survey. In the following, the case study regarding the production enterprise was also presented.


2021 ◽  
Vol 105 (5) ◽  
pp. 45-55
Author(s):  
Mark Entin ◽  
◽  
Dmitriy Galushko ◽  

The article explores the legal consequences of the UK's withdrawal from the European Union. The scope of personal data protection was taken as an example. The purpose of the article is to study and analyze the legal aspects of the termination of the UK's membership in the European Union, its impact on the cross-border transfer of personal data between the parties, as well as the development of legal regulation in this area. The article shows that, despite the signing of the Withdrawal Agreement, as well as the Trade and Cooperation Agreement, there is a complication of legal regulation, as well as the emergence of potential contradictions and threats to the interests of interested parties. The sphere of personal data protection clearly demonstrates that despite the desire for the sovereignization of legal regulation on the part of the UK, its legal system remains dependent on the legal order of the European Union. The UK's national regulation on personal data will be under constant monitoring by the competent EU authorities, which indirectly confirms the failure to achieve the goals of the full return of the UK's delegated sovereign powers. It is concluded that the EU Court of Justice still retains its jurisdiction over the United Kingdom, in particular, in connection with possibility to challenge decisions on adequacy, as well as through the adoption of its own practice on issues related to personal data protection.


Author(s):  
Владимир Павлович Гулов ◽  
Виктор Анатольевич Хвостов ◽  
Айжана Михайловна Каднова ◽  
Галина Владимировна Сыч

На основе анализа практических аспектов защиты персональных данных при автоматизированной обработке в организациях здравоохранения определен круг проблем, касающихся потребительского качества систем защиты информации. Одной из главных проблем защиты персональных данных в медицинских информационных системах является обеспечение своевременной настройки систем защиты информации администратором в соответствии с установленной политикой в организации. При этом ключевой проблемой является формирование условий работы администратора обеспечивающих стопроцентную гарантию реакции администратора на поступление заявок по настройке систем защиты информации, управлению пользователями, правами доступа, парированию угроз различной природы. В условиях отсутствия в настоящее время методических подходов к оценке временных (вероятностных) параметров деятельности администратора безопасности медицинских информационных систем, известных как операционные характеристики систем защиты информации, обеспечить стопроцентное соответствие настроек систем защиты информации текущей политике проблематично. В статье предложен вероятностный показатель для оценки операционных характеристик систем защиты информации. Разработана методика его оценки на основе эксперимента по фиксации движения курсора мыши при выполнении основных действий администратором и распределения его внимания (тепловой карты) по элементам интерфейса системы защиты информации. Представлены результаты оценок операционных характеристик системы защиты информации «Страж NT 3.0», выполненные с использованием предложенной экспериментальной методики Based on the analysis of the practical aspects of personal data protection (PD) during automated processing in healthcare organizations, a range of problems related to the consumer quality of information protection systems (ISS) has been identified. One of the main problems of PD protection in medical information systems (MIS) is to ensure the timely configuration of the information security system by the administrator in accordance with the established policy in the organization. At the same time, the key problem is the formation of the administrator's working conditions that provide one hundred percent guarantee of the administrator's reaction to the receipt of requests for setting up the information security system, managing users, access rights, and countering threats of various nature. In the absence of methodological approaches to assessing the temporal (probabilistic) parameters of the MIS security administrator's activities, known as the operational characteristics of the ISS, it is problematic to ensure that the ISS settings are 100% consistent with the current policy. The article proposes a probabilistic indicator for assessing the operational characteristics of the information security system. A methodology for its assessment was developed on the basis of an experiment on fixing the movement of the mouse cursor when performing basic actions by the administrator and distributing his attention (heat map) among the elements of the information security interface. The results of evaluations of the operational characteristics of the SZI "Ctrazh NT 3.0" carried out using the proposed experimental method are presented


Author(s):  
A. G. Barabashev ◽  
D. V. Ponomareva

Legal regulation of the use of personal data is essential in ensuring the quality of scientific research. Regulation of the European Parliament and of the Council of the European Union No. 2016/679 of April 27, 2016 «On the protection of natural persons with regard to the processing of personal data and on the free movement of such data», repealing Directive 95/46/EC, aims to unify the standards governing the protection of human rights to privacy, certain conditions beyond. This novel, introduced by the Regulation in the EU legal framework, complements and updates the acquis communautaire achieved within the framework of Directive 95/46/EC on personal data protection. The Regulation establishes both general rules applicable to any type of personal data processing and special rules applicable to the analysis of certain categories of personal data, such as information obtained during clinical trials. This paper provides an overview of new standards (in force since May 2018) that regulate aspects of personal data processing in the context of research activities (personal health data, genetic, biometric information, etc.)


2010 ◽  
Vol 4 (3) ◽  
pp. 1-21
Author(s):  
Munir Majdalawieh

This paper discusses the challenges that faced in the “DigNet” age in terms of privacy and proposes a framework for privacy protection. This framework is integral in ensuring that personal data protection is impeded part of business processes of any systems that are involved in collecting, disseminating, and accessing an individual’s data. The cooperation and partnership between nations in passing privacy laws is essential and requires some building blocks. In this paper, the author argues that the building blocks should be integrated into the business processes and take into consideration three main domains: governments’ legislation, entity’s policies and procedures, and data protection controls. The proposed conceptual framework helps organizations develop data protection in their business processes, assess the privacy issues in their organization, protect the interests of their customers, increase their value proposition to customers, and make it easier to identify the impact of privacy on their business.


Author(s):  
Gianfranco Muncinelli ◽  
Edson Pinheiro de Lima ◽  
Fernando Deschamps ◽  
Sergio E. Gouvea da Costa ◽  
José Marcelo A.P. Cestari

A capability model describes the complete set of features that an organization requires to execute its business model or fulfill its mission; the user’s environment must be increasingly included in the design and development of necessary and desired solutions. For this, the development of the model and its application are central issues. An account should be taken of legislation involving the protection of individuals’ personal data in any relationship involving the processing of information classified as personal data; as well as its impact on public and private companies across the country, considering any size and market segment, and taking into account the need to comply with legal requirements efficiently and sustainably, mitigating risk factors. Transdisciplinarity characterizes this research, as the digital transformation process integrates legal, technological aspects, risks, business analysis, good practices and standards of information technology management and digital compliance. This paper addresses this problem by analyzing the main areas of contribution to the assessment of process capability for digital transformation concerning cybersecurity in the context of personal data protection legislation. Finally, the main components of the future capability model are presented.


Sign in / Sign up

Export Citation Format

Share Document