International legal protection standards personal information

نویسندگان

چکیده

The article examines the specificities of personal data protection at international level, clarifying meaning concepts such as “personal information”, data”, “person” and “identity”. analysis synthesis existing norms standards have been carried out, allowing to identify range issues requiring elimination contradictions legislative in order increase efficiency their application, given rapid processes globalisation, development high technologies a consequence – appearance new terrorism form cyber terrorism, society requires approaches definition for modern system, resolution arising law, legal control over electronic environment computer systems. To address these issues, dynamics specifics regulation this area studied.
 A significant number monographs periodicals are devoted issue protection. Among them, we can highlight scientific achieve-ments M. Bem. K. Bennett, V. Bryzhko, S. Vorren, T. Kostetska, Obukhovska, A. Paziuk, Polinkevych, I. Sopilko, Shvets. Given large statutory regulations differences defining conceptual categorical apparatus, mechanisms application information standards, relations unresolved today, connection with which consideration systematization relevant.
 Definition content scope essential features "personality", "natural person" "personal data" terms. European system regulating related investigated most important provisions highlighted. New accordance Regulation 2016/679 identified.
 It should be noted that documents field similar purpose, but same time, they do not single basic concepts, natural person, information, about identified processing, etc. complicates effective understanding by all participants relations.
 is worth noting adoption 2016/67 was breakthrough simplification regulation. After all, framework Directive 95/46/EC, force before its adoption, interpreted differently each country, caused many misunderstandings created obstacles ensure human right privacy. That why unification always relevant continuous improvement timely response changes technology space.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information Security Standards in Critical Infrastructure Protection

The standards applicable to Information Security are legion, from the purely technical, low-level specification of crypto protocols to the high-level organisational management frameworks. Industrial Control Systems among them the Information Systems in Critical Infrastructure still present their own set of challenges and quirks, despite the convergence trend towards mainstream information techn...

متن کامل

Personal Information Privacy Protection in E-Commerce

Today, the world are moving towards e-commerce application in completing their daily jobs. An ecommerce application becomes the preferred medium to complete the day’s tasks. Electronic commerce or ecommerce is a potentially growing business for today’s market. Basically, online shopping eliminates conventional purchase approach which is labor-intensive and time-consuming. Through cyber space, o...

متن کامل

Information Security Policy - What do International Information Security Standards say?

One of the most information security controls is the information security policy. This vital direction-giving document is, however, not always easy to develop and the authors thereof battle with questions such as what constitutes a policy. This results in the policy authors turning to existing sources for guidance. One of these sources is the various international information security standards...

متن کامل

Designing a logical data model of athletes' hospital information management system based on international standards

Background and purpose: Today, hospital care, relying on the health record system, has received more attention than before. Considering the diversity of data in these systems, the design of standard conceptual and logical models by service providers will play an important role in their success. Therefore, this research was conducted with the aim of designing a logical data model of the hospital...

متن کامل

Data mining of Personal Information: Perspectives and Legal Barriers

This In recent years nearly all companies, agents and organisations use data warehousing systems in order to imprint their clients transactions. Consequently central repositories are build for all significant parts of data that the various business systems collect. Data from a wide range of online transaction processing applications and other sources are selectively extracted and organized on t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Naukovij vìsnik Užgorods?kogo nacìonal?nogo unìversitetu

سال: 2023

ISSN: ['2664-6153', '2307-3322']

DOI: https://doi.org/10.24144/2307-3322.2022.74.58