Assessing liability arising from information security breaches in data privacy

被引:3
|
作者
Mitrakas, Andreas [1 ]
机构
[1] European Network Secur Agcy ENISA, Adm Dept, Iraklion, Greece
关键词
D O I
10.1093/idpl/ipr001
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
To counter threats, information security measures need to be employed in a way that adequately protects personally-identifiable data, and a privacy framework must be implemented. Assessing liability in an information security context is a means to reduce exacerbated social costs that are likely to arise. Apportioning costs between the information owner and information security service providers is also desirable because it may lead to reduced transaction costs, rendering the provision of information security services more attractive for both service providers and users. This paper reviews certain drivers and shortcomings associated with data privacy as it relates to cyber attacks, with a special focus on the European legal framework. It then briefly presents a liability assessment model that is adapted for the purpose of data privacy breaches of information security. Finally, a sample assessment is carried out of the liability of actors with regard to data privacy.
引用
收藏
页码:129 / 136
页数:8
相关论文
共 50 条
  • [41] INTEGRATED INCIDENT MANAGEMENT MODEL FOR DATA PRIVACY AND INFORMATION SECURITY
    Dombora, Sandor
    XIV INTERNATIONAL MAY CONFERENCE ON STRATEGIC MANAGEMENT, VOL XIV, ISSUE (1) (2018), 2018, 14 (01): : 319 - 328
  • [42] The Study of Privacy Preserving Data Mining Technology for Information Security
    Li, Heng
    Wu, Xuefang
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 3532 - 3535
  • [43] The influence of human factors on vulnerability to information security breaches
    Luciano, Edimara M.
    Mahmood, M. Adam
    Macada, Antonio Carlos G.
    AMCIS 2010 PROCEEDINGS, 2010,
  • [44] Research on Information Security and Privacy of Libraries in Big Data Era
    Sun, Ningning
    Ma, Lihua
    MODERN TECHNOLOGIES IN MATERIALS, MECHANICS AND INTELLIGENT SYSTEMS, 2014, 1049 : 1934 - 1937
  • [45] Hierarchical approach to analyzing security breaches in information systems
    Pavlenko E.Y.
    Yarmak A.V.
    Moskvin D.A.
    Automatic Control and Computer Sciences, 2017, 51 (8) : 829 - 834
  • [46] Financial data breaches in the US retail economy: Restoring confidence in information technology security standards
    Hemphill, Thomas A.
    Longstreet, Phil
    TECHNOLOGY IN SOCIETY, 2016, 44 : 30 - 38
  • [47] Privacy and Data Security
    Gaff, Brian M.
    Smedinghoff, Thomas J.
    Sor, Socheth
    COMPUTER, 2012, 45 (03) : 8 - 10
  • [48] Do Information Security Policies Reduce the Incidence of Security Breaches: An Exploratory Analysis
    Doherty, Neil
    Fulford, Heather
    INFORMATION RESOURCES MANAGEMENT JOURNAL, 2005, 18 (04) : 21 - 39
  • [49] Adaptive Information Security and Privacy
    Nuseibeh, Bashar
    2017 11TH INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS), 2017, : 17 - 17
  • [50] Security and privacy in the information economy
    Feigenbaum, J
    Rudich, S
    Blaze, M
    McCurley, K
    PROCEEDINGS OF THE NATIONAL ACADEMY OF SCIENCES OF THE UNITED STATES OF AMERICA, 1997, 94 (07) : 2789 - 2792