13 research outputs found

    Data Security Breaches and Privacy in Europe

    Full text link

    Sales through blogs in Malaysia: should we regulate them?

    Get PDF
    Selling goods through blogs is becoming a trend in Malaysia particularly for consumer goods. Goods like homemade chocolate, cup cakes, designed and personal accessories are among the many types of businesses which are commonly carried up via blogs. The popularity of blog sales give rise to legal concerns such as should these the blogsโ€™ businesses be regulated as it is possible these blogs maybe mere bogus or scams or simply temporary in nature. What about the consumer rights arising from these transactions? This article will examine this issue from the Malaysian law perspective with some comparison with a heavily regulated jurisdiction like Singapore. (103 words

    Patching the patchwork: appraising the EU regulatory framework on cyber security breaches

    Get PDF
    Breaches of security, a.k.a. security and data breaches, are on the rise, one of the reasons being the well-known lack of incentives to secure services and their underlying technologies, such as cloud computing. In this article, I question whether the patchwork of six EU instruments addressing breaches is helping to prevent or mitigate breaches as intended. At a lower level of abstraction, the question concerns appraising the success of each instrument separately. At a higher level of abstraction, since all laws converge on the objective of network and information security โ€“ one of the three pillars of the EU cyber security policy โ€“ the question is whether the legal โ€˜patchworkโ€™ is helping to โ€˜patchโ€™ the underlying insecurity of network and information systems thus contributing to cyber security. To answer the research question, I look at the regulatory framework as a whole, from the perspective of network and information security and consequently I use the expression cyber security breaches. I appraise the regulatory patchwork by using the three goals of notification identified by the European Commission as a benchmark, enriched by policy documents, legal analysis, and academic literature on breaches legislation, and I elaborate my analysis by reasoning on the case of cloud computing. The analysis, which is frustrated by the lack of adequate data, shows that the regulatory framework on cyber security breaches may be failing to provide the necessary level of mutual learning on the functioning of security measures, awareness of both regulatory authorities and the public on how entities fare in protecting data (and the related network and information systems), and enforcing self-improvement of entities dealing with information and services. I conclude with some recommendations addressing the causes, rather than the symptoms, of network and information systems insecurity

    Rules and Legal Framework in Digital Trade

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (์„์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ๊ตญ์ œ๋Œ€ํ•™์› ๊ตญ์ œํ•™๊ณผ(๊ตญ์ œํ†ต์ƒ์ „๊ณต), 2021. 2. ์•ˆ๋•๊ทผ.Digital Transformation is imperative for any businesses today to remain active and connected in the evolving world. The digital surge has widely occurred in various areas, especially in troubled times of the pandemic, lockdown and social withdrawal. The digital transformation has been particularly recommended to textile and apparel industry by many experts in order to improve efficiency on every level in the business, and its necessity was emphasized even more with the recent severe downturn of the industry. The prevailing attention to digital transformation is now apparent across all countries and businesses, yet its consequences have not been thoroughly perceived and prepared, causing serious issues and concerns. With the importance of digital transformation in the textile and apparel industry being highlighted, those problems are bound to serve as obstacles to the industry. Since digital trade happens in an intangible and transmissive form, its scope and pace of world trade are beyond control and expectation. Therefore, it is highly crucial to have an organized legal framework that prevents and regulates any potential troubles from transnational digital activities. The international regulatory system on digital trade is currently in a state of confusion that requires cooperation and efforts. This paper examines the current status of international digital trade regulations and accentuates the necessity to develop them from the status quo. Since the digital transformation will become more pervasive over time, countries will need to find a way to narrow down discrepancies in the understandingโ€”collision between the idea of free data transfer and data sovereigntyโ€”to reach a consensus and build a robust international regulatory framework that encompasses every important aspect of digital trade.๋””์ง€ํ„ธ ์ „ํ™˜์€ ๊ธ‰๋ณ€ํ•˜๋Š” ์‚ฌํšŒ์—์„œ ์‚ด์•„๋‚จ๊ธฐ ์œ„ํ•œ ๊ธฐ์—…์˜ ํ•„์ˆ˜ ์ „๋žต์ด ๋˜์—ˆ๋‹ค. ์ด๋Š” ๋‹ค์–‘ํ•œ ๋ถ„์•ผ์—์„œ ๊ด‘๋ฒ”์œ„ํ•˜๊ฒŒ ์ผ์–ด๋‚˜๊ณ  ์žˆ์œผ๋ฉฐ, ํŠนํžˆ ์ฝ”๋กœ๋‚˜๋ฐ”์ด๋Ÿฌ์Šค ๋Œ€์œ ํ–‰์œผ๋กœ ์ธํ•ด ๊ธ‰์†๋„๋กœ ํ™•์‚ฐ๋˜๊ณ  ์žˆ๋‹ค. ๊ทธ์ค‘์—์„œ๋„ ์„ฌ์œ  ใƒป ์˜๋ฅ˜ ์‚ฐ์—…์˜ ๋””์ง€ํ„ธ ์ „ํ™˜์€ ๋น„์ฆˆ๋‹ˆ์Šค ํšจ์œจ์„ฑ ํ–ฅ์ƒ์„ ์œ„ํ•ด ๊ทธ ํ•„์š”์„ฑ์ด ๊พธ์ค€ํžˆ ์–ธ๊ธ‰๋˜์–ด ์™”๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ๋””์ž์ธ, ์ƒ์‚ฐ, ํŒ๋งค ๋“ฑ ์ „ํ†ต์ ์ธ ๋ฐฉ์‹์„ ๊ณ ์ˆ˜ํ•  ์ˆ˜๋ฐ–์— ์—†๋Š” ์‚ฐ์—…์˜ ํŠน์„ฑ์ƒ ๋ชจ๋“  ๊ธฐ์—…์—์„œ ์‰ฝ๊ฒŒ ์ง„ํ–‰๋˜๊ธฐ๋Š” ์–ด๋ ค์› ๋‹ค. ํ•˜์ง€๋งŒ ๊ณ„์†๋˜๋Š” ์‚ฐ์—… ์นจ์ฒด์™€ ์ฝ”๋กœ๋‚˜๋ฐ”์ด๋Ÿฌ์Šค์˜ ์—ฌํŒŒ๋กœ ์ธํ•˜์—ฌ ๋””์ง€ํ„ธ ์ „ํ™˜์˜ ์ค‘์š”์„ฑ์ด ๋”์šฑ ๊ฐ•์กฐ๋˜๊ณ  ์žˆ๋‹ค. ์ตœ๊ทผ ์—ฌ๋Ÿฌ ๊ตญ๊ฐ€์™€ ๊ธฐ์—…์—์„œ ๋””์ง€ํ„ธ ์ „ํ™˜๊ณผ ์ •๋ณดํ†ต์‹ ๊ธฐ์ˆ ์— ๋Œ€ํ•œ ๊ด€์‹ฌ๊ณผ ์ง‘์ค‘์ด ๋”์šฑ ๊ธ‰์ฆํ•˜๊ณ  ์žˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์ฆ๊ฐ€ํ•˜๋Š” ๋””์ง€ํ„ธ ๊ธฐ์ˆ ์˜ ํ™œ์šฉ๊ณผ๋Š” ๋‹ฌ๋ฆฌ ๊ทธ์— ๋”ฐ๋ฅธ ๋ฒ•์  ์Ÿ์  ๋“ฑ ๊ฒฐ๊ณผ์— ๋Œ€ํ•œ ํ•ด๊ฒฐ์ฑ…์ด ๋งˆ๋ จ๋˜์ง€ ์•Š์•„ ์‹ฌ๊ฐํ•œ ๋ฌธ์ œ์™€ ์šฐ๋ ค๋ฅผ ๋‚ณ๊ณ  ์žˆ๋‹ค. ์„ฌ์œ  ใƒป ์˜๋ฅ˜ ์‚ฐ์—…์˜ ๋””์ง€ํ„ธ ์ „ํ™˜์ด ๊ถŒ์žฅ๋˜๊ณ  ๊ทธ ์ค‘์š”์„ฑ์ด ๊ฐ•์กฐ๋˜๊ณ  ์žˆ๋Š” ๊ฐ€์šด๋ฐ ์ด๋Ÿฌํ•œ ๋ฌธ์ œ์ ๋“ค์€ ๊ธ€๋กœ๋ฒŒ ๋””์ง€ํ„ธ ๊ฒฝ์Ÿ๋ ฅ์„ ํ‚ค์›Œ๊ฐ€๊ณ  ์žˆ๋Š” ๊ธฐ์—…์—๊ฒŒ ํฐ ์žฅ์• ๋ฌผ๋กœ ์ž‘์šฉํ•  ์ˆ˜๋ฐ–์— ์—†๋‹ค. ๋˜ํ•œ ๋””์ง€ํ„ธ ๋ฌด์—ญ์€ ์ง€๊ธˆ ์ด ์ˆœ๊ฐ„์—๋„ ๊พธ์ค€ํžˆ ์ผ์–ด๋‚˜๊ณ  ์žˆ๊ธฐ ๋•Œ๋ฌธ์— ๊ทธ ๋ฒ”์œ„์™€ ์†๋„๋ฅผ ๊ฐ€๋Š ํ•˜๊ธฐ๊ฐ€ ๋งค์šฐ ์–ด๋ ต๋‹ค. ๋”ฐ๋ผ์„œ, ๊ตญ๊ฒฝ ๊ฐ„ ๋””์ง€ํ„ธ ๊ต์—ญ์—์„œ ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ๋Š” ๋ฌธ์ œ๋ฅผ ๋ฐฉ์ง€ํ•˜๊ณ  ๊ทœ์ œํ•˜๋Š” ์ฒด๊ณ„์ ์ธ ๋ฒ•์  ํ‹€์€ ๊ฐ–๋Š” ๊ฒƒ์ด ๋งค์šฐ ์ค‘์š”ํ•˜๋‹ค. ๋””์ง€ํ„ธ ํ†ต์ƒ์— ๋Œ€ํ•œ ๊ตญ์ œ ๊ทœ๋ฒ”์€ ์—ฌ์ „ํžˆ ํ˜‘๋ ฅ๊ณผ ๊ฐœ์„ ์ด ํ•„์š”ํ•œ ํ˜ผ๋ž€ ์ƒํƒœ์— ์žˆ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์€ ํ˜„ ๊ตญ์ œ ๋””์ง€ํ„ธ ๋ฌด์—ญ ๊ทœ์ œ๋ฅผ ์กฐ์‚ฌํ•˜๊ณ  ๋”์šฑ ๋ฐœ์ „์‹œ์ผœ ์‚ฐ์—…์— ์‹ค์งˆ์ ์œผ๋กœ ์ ์šฉ ๊ฐ€๋Šฅํ•œ ์„ธ๋ถ€์ ์ด๊ณ  ์‹ค์šฉ์ ์ธ ๊ตญ์ œ๋ฒ•์„ ๊ฐ€์ ธ์•ผ ํ•œ๋‹ค๋Š” ๋‚ด์šฉ์„ ๊ฐ•์กฐํ•˜๊ณ  ์žˆ๋‹ค. ๋‹ค์ž๋ฌด์—ญํ˜‘์ƒ์—์„œ ๋‹ค๋ฃจ์–ด์ ธ์•ผ ํ•  ๊ตญ์ œ ๊ทœ์ œ๋ฅผ ํ˜„์žฌ ์ง€์—ญ๋ฌด์—ญํ˜‘์ •์œผ๋กœ ๋Œ€์‹ ํ•˜๊ณ  ์žˆ์ง€๋งŒ, ์‹œ๊ฐ„์ด ์ง€๋‚จ์— ๋”ฐ๋ผ ๋”์šฑ ๊ด‘๋ฒ”์œ„ํ•œ ๋””์ง€ํ„ธ ์ „ํ™˜์ด ์ด๋ฃจ์–ด์งˆ ๊ฒƒ์ด๋ฏ€๋กœ ๊ฐ๊ตญ์€ ๊ตญ๋‚ด์‚ฐ์—…์„ ๋ณดํ˜ธํ•˜๋ ค๋Š” ๊ฒฌํ•ด์™€ ๋””์ง€ํ„ธ ๋ฌด์—ญ์žฅ๋ฒฝ์„ ๋ฌด๋„ˆ๋œจ๋ฆฌ๋ ค๋Š” ๊ฒฌํ•ด ์ฐจ์ด๋ฅผ ์กฐ์ •ํ•˜์—ฌ ๋ณด๋‹ค ๊ตฌ์ฒด์ ์ด๊ณ  ํ™•์‹คํ•œ ๋‹ค์ž์  ์ฐจ์›์˜ ๊ตญ์ œ ๊ทœ๋ฒ”์„ ์„ธ์šฐ๋ ค๋Š” ์ž์„ธ๋ฅผ ๊ฐ€์ ธ์•ผ ํ•  ๊ฒƒ์ด๋‹ค.I. Introduction 1 1. Background of Digital Transformation 1 2. Scope of Digital Transformation 2 II. Overview of Textile and Apparel Industry 4 1. Structure of Textile and Apparel Industry 4 1-1. Types of Retailers 4 1-2. Business Process 6 2. Current Status and Future Direction of Textile and Apparel Industry 8 2-1. Industry Downturn 8 2-2. Impact of the COVID-19 Pandemic 10 III. Digital Transformation in Textile and Apparel Industry 15 1. E-Commerce and Digital Platforms 15 2. Digital Wearable Devices and Mobile App Services 19 3. Smart Textiles and Smart Garments 23 4. Virtual Fitting and 3D Technologies 25 IV. Digital Trade Regulations at the Multilateral Level 29 1. Digital Trade Regulations in the WTO 31 2. EU General Data Protection Regulation (GDPR) 33 3. APEC Cross-border Privacy Rules (CBPR) and Privacy Framework 36 V. Development of Digital Trade Regulations in the RTAs 40 1. Chapter 14 of CPTPP: Electronic Commerce 40 2. Chapter 19 of USMCA: Digital Trade 42 3. US-Japan Digital Trade Agreement 43 4. Singapore-Australia Digital Economy Agreement 46 VI. Assessment on Digital Trade Regulations in Korea 48 1. Global Digital Competitiveness of Korean Textile and Apparel Industry 48 2. Digital Trade Regulations at the International Level 50 VII. Conclusion 53Maste

    Protection of Personal Data and its status as a Fundamental Right - In the scope of International Law and EU Law

    Get PDF
    Personal data protection has raised discussion during the recent years both in international and national level. With the development of technology, internationalism and the economy it is more and more important to protect the personal data. The adequate way to protect the personal data needs to be considered thoroughly; should it be protected with secondary legislation or with fundamental legislation? During the recent years, the personal data protection legislation in both international and national level has increased. Despite this, the protection of personal data faces threads and challenges every day. These threads and challenges emerge from the inconsistency of international and national data protection legislations, from terrorism and crime, and from the economic and technological development. Also the collisions between different fundamental rights are challenging. For instance, it is not always easy to assess the order of importance between the personal data protection and the right to free flow of data. In this thesis I shall research the status of personal data protection in international level and in international jurisdiction. I will start my research by assessing the threads and challenges personal data protection faces every day. I shall then take a closer look into the relevant European Union law and then to international law. I shall also make a slight comparison between the EU law and the international law. My goal is to figure out the actual challenges and threads to personal data protection and, also, the legal protection that personal data needs and already has. I believe I have reached this goal. I believe that the personal data should be protected as a fundamental right, but it hasnโ€™t reached this status in international level yet. For the data protection to reach this status as a fundamental right, international legislations and regulations needs to be revised. My research methods have mostly been legal dogmatic. My research is mainly based on the relevant legal literature, sources of laws and other written legal sources. The empiric parts in this thesis are mainly from the author herself

    Crisis communication in organizational data breach situations: Facebook data breach 2018

    Get PDF
    Objectives The main objective of this study was to explore how effective crisis communication can help an organization facing a data breach to minimize the organizational damage caused by the data breach crisis. In an optimal situation, this research explains why certain crisis response guidelines and communication characteristics are useful in data breaches and how they affect the relationship between the organization and the crisis stakeholders. In addition to this, this research should be helpful for all organizations facing a data breach in the future, as it shows from the perspective of a giant global social network company, which forms of crisis communication are useful and which are not. Summary This research studies the existing literature on traditional organizational crises and on crisis management and crisis communication and compares the information to modern data breach crises. To use the information from the literature effectively, information from the literature review will be compared to a big data company Facebookโ€™s recent data breach in September 2018, affecting initially over 50 million people. The research aim is to find out, how crisis communication is the most effective when an organization is facing a data breach. This bachelorโ€™s thesis is a qualitative study and it uses a combination of common effective crisis communication characteristics and a traditional crisis communication theory, SCCT by Timothy Coombs, as guidelines for a recent major data breach case. Conclusions The common characteristics of effective crisis communication are still expected from a company facing a data breach by the media and the crisis stakeholders, especially when individualsโ€™ personal data is affected. However, a common crisis communication theory SCCT is proven to be mostly incompatible with modern data breach crisis, which means that there is a need for a guiding theory for data breach crisis communication including the characteristics required by the crisis stakeholders and the media. In addition to this, this research concludes that regardless of effective or ineffective crisis communication, the companyโ€™s prior crisis history and reputation have a significant effect on how crisis communication is responded to

    Strengthening e-crime legislation in the UAE: learning lessons from the UK and the EU

    Get PDF
    The electronic revolution brought with it technological innovations that are now integral to communication, business, commerce and the workings of governments all over the world. It also significantly changed the criminal landscape. Globally it has been estimated that crime conducted via the internet (e-crime) costs more than โ‚ฌ290 billion annually. Formulating a robust response to cybercrime in law is a top priority for many countries that presents ongoing challenges. New cybercrime trends and behaviours are constantly emerging, and debates surrounding legal provisions to deal with them by increasing online tracking and surveillance are frequently accompanied by concerns of the rights of citizens to freedom, privacy and confidentiality. This research compares the ways that three different legislative frameworks have been navigating these challenges. Specifically, it examines the legal strategies of the United Arab Emirates (UAE), the United Kingdom (UK) and the European Union (EU). The UAE is comparatively inexperienced in this area, its first law to address e-crime was adopted in 2006, sixteen years after the UK, and so the express purpose of this study is to investigate how e-crime legislation in the UAE can be strengthened. Drawing on a range of theoretical resources supplemented with empirical data, this research seeks to provide a comprehensive account of how key e-crime legislation has evolved in the UAE, the UK and the EU, and to evaluate how effective it has been in tackling cybercrime. Integral to this project is an analysis of some of the past and present controversies related to surveillance, data retention, data protection, privacy, non-disclosure and the public interest. An important corollary of this research is how e-crime legislation is not only aligned with political and economic aims, but when looking at the UAE, the discrete ways that legislation can be circumscribed by cultural, social and religious norms comes into focus

    Analyses of selected legal issues related to personal data security and the inter-relationship between personal data protection law in Africa and Europe

    Get PDF
    It has been well documented that the unprecedented use of computerized technology to process personal information in the 1960s in Europe and the US led to concerns about individual privacy, which resulted in the introduction of a branch of law regulating the processing of personal data, known today as personal data protection law. Over the years, this relatively new domain of law has introduced rights and obligations which appear to have the capacity to regulate a vast variety of domains of activity as long as they involve processing information about humans. This publication-based thesis regroups five published/accepted articles which generally seek to appreciate the significance of rights and obligations of this branch of law within the EU and Africa. The Chapters in this thesis focus on a limited variety of selected themes in data protection law. The first Chapter addresses the lack of clarification of the meaning of a breach of security in EU data protection law, and the second Chapter examines the level of personal data security protection guaranteed by African regional data protection instruments. The third and fourth Chapters both explore the potential effect of the transposition of EU data protection legal standards into African soil, respectively focusing on the processing of public examination results and on curtailing the prevalence of teacher-student abuses on university campuses. The fifth and final Chapter presents a comparative analysis between the EU GDPR, the Ghanaian Data Protection Act 2012 and Kenyan Data Protection Act 2019 in their approaches to consolidate the OECD data protection principles. The thesis conclusively finds that transposing EU data protection standards into Africa could help regulate some under-regulated domains of activity. But the continent's institutions still need to do a lot in terms of harmonising and promoting personal data protection law among its countries
    corecore