Addressing Cybersecurity and Data Breach Regulations: A Global Perspective

Authors

  • Avinash Gaur Assistant Professor of Law Gurugram University, Gurugram Haryana

Keywords:

Comparative Analysis, Contract Law, Common Law Jurisdictions, Civil Law

Abstract

The complex relationship between technology and data in today's increasingly digital environment has altered the trajectory of contemporary society. However, this transition to digital has spawned serious problems, the most pressing of which is cybersecurity and the persistent risk of data breaches. the worldwide framework of laws and policies concerning cybercrime and data breaches. provides insight into the myriad methods used by different nations and regions to protect confidential data, lessen vulnerability, and promote a safe online atmosphere. the ever-changing character of cyber threats and data breaches, with all the havoc they can wreak on individuals, businesses, and economies. the intricacies of the international regulatory environment, which lay bare a sophisticated web of rules and regulations designed to cope with these issues on a worldwide scale.

References

 Anderson, R., & Moore, T. (2006). The economics of information security. Science, 314(5799), 610-613.

 Clarke, R. (2019). Privacy and data protection by design - from policy to engineering. Computer Law & Security Review, 35, 18-35.

 Council of the European Union. (2016). General Data Protection Regulation (GDPR). Regulation (EU) 2016/679.

 Gartner. (2020). Magic Quadrant for Security Information and Event Management. Retrieved from https://www.gartner.com/en/documents/3987668

 Kshetri, N. (2017). The role of global and domestic institutional actors in the development of advanced encryption standard (AES) standards. Regulation & Governance, 11(1), 30-49.

 Mell, P., & Grance, T. (2011). The NIST definition of cloud computing. National Institute of Standards and Technology, 53(6), 50.

 NIST. (2014). Framework for Improving Critical Infrastructure Cybersecurity. National Institute of Standards and Technology.

 Rosenzweig, P., & Nessen, D. H. (2013). Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford University Press.

 Schneier, B. (2015). Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. WW Norton & Company.

 Stoddart, E. (2017). Evasive Hacking: How States Manipulate the Internet to Attack Their Targets. Oxford University Press.

 United Nations General Assembly. (2015). The UN Guidelines for the Regulation of Computerized Personal Data Files. Resolution 45/95.

 United Nations Office on Drugs and Crime (UNODC). (2015). The Use of Artificial Intelligence in the Fight Against Cybercrime. Vienna.

 World Economic Forum. (2019). The Global Risks Report 2019. Retrieved from https://www.weforum.org/reports/the-global-risks-report-2019

 World Intellectual Property Organization (WIPO). (2018). Artificial Intelligence: Intellectual Property Policy Considerations. Geneva.

 Zhang, J., Walder, R., & Lyu, M. R. (2017). Security threat analysis and modeling. Proceedings of the IEEE, 105(4), 620-637.

Downloads

Published

2023-06-30

How to Cite

Avinash Gaur. (2023). Addressing Cybersecurity and Data Breach Regulations: A Global Perspective. Innovative Research Thoughts, 9(3), 157–163. Retrieved from https://irt.shodhsagar.com/index.php/j/article/view/743