(Draft) Paper on Information Technology Act, 2000 and the Data Protection Rules

2017 ◽  
Author(s):  
Smitha Krishna Prasad
Author(s):  
Kirils Dubinins ◽  
Kristīne Mārtinsone

Provision of remote services became relevant all over the world, during the 2020 COVID-19 pandemic. Latvian supervisors were also forced to transfer their practice to the digital space as well. COVID-19 pandemic challenges opened a wider range of opportunities for improvement remote practice. Pandemic also highlighted the risks associated with lack of relevant competences. At the global level over the last decade, risks associated with remote counselling summarized in guidelines, providing professionals with examples of best practice. In Latvia, on other hand, such guidelines have not adopted yet.This study developed with the aim to find out the awareness of Latvian supervisors about the risks (cyber security) of using information technology and the protection of personal data in the conditions created by the COVID-19 pandemic.To find out how Latvian supervisors are aware about the risks of using information technology (cyber security) and personal data protection, a survey conducted among Latvian supervisors and organizing an expert panel discussion, scientific strength of the study ensured by data triangulation.The obtained results allowed to conclude that the COVID-19 pandemic highlighted the need for supervision remote practice, at the same time the research data show that the awareness of Latvian supervisors about the risks of information technology use (cyber security) and personal data protection is medium to low.The results of the research show that in the education of Latvian supervisors it is necessary to allocate place for the acquisition of information technology (cyber security) risk and personal data protection regulation.This research emphasizes the importance of several supervisors’ competences such as digital knowledge and personal data protection, however further research is needed to find the most effective methods how to improve these competences.  


10.28945/2330 ◽  
2016 ◽  
Vol 15 ◽  
pp. 001-017
Author(s):  
Svetlana Peltsverger ◽  
Guangzhi Zheng

The paper describes the development of four learning modules that focus on technical details of how a person’s privacy might be compromised in real-world scenarios. The paper shows how students benefited from the addition of hands-on learning experiences of privacy and data protection to the existing information technology courses. These learning modules raised students’ awareness of potential breaches of privacy as a user as well as a developer. The demonstration of a privacy breach in action helped students to design, configure, and implement technical solutions to prevent privacy violations. The assessment results demonstrate the strength of the technical approach.


2019 ◽  
Vol 21 (5) ◽  
pp. 510-524 ◽  
Author(s):  
Nazar Poritskiy ◽  
Flávio Oliveira ◽  
Fernando Almeida

PurposeThe implementation of European data protection is a challenge for businesses and has imposed legal, technical and organizational changes for companies. This study aims to explore the benefits and challenges that companies operating in the information technology (IT) sector have experienced in applying the European data protection. Additionally, this study aims to explore whether the benefits and challenges faced by these companies were different considering their dimension and the state of implementation of the regulation.Design/methodology/approachThis study adopts a quantitative methodology, based on a survey conducted with Portuguese IT companies. The survey is composed of 30 questions divided into three sections, namely, control data; assessment; and benefits and challenges. The survey was created on Google Drive and distributed among Portuguese IT companies between March and April of 2019. The data were analyzed using the Stata software using descriptive and inferential analysis techniques using the ANOVA one-way test.FindingsA total of 286 responses were received. The main benefits identified by the application of European data protection include increased confidence and legal clarification. On the other hand, the main challenges include the execution of audits to systems and processes and the application of the right to erasure. The findings allow us to conclude that the state of implementation of the general data protection regulation (GDPR), and the type of company are discriminating factors in the perception of benefits and challenges.Research limitations/implicationsThis study has essentially practical implications. Based on the synthesis of the benefits and challenges posed by the adoption of European data protection, it is possible to assess the relative importance and impact of the benefits and challenges faced by companies in the IT sector. However, this study does not explore the type of challenges that are placed at each stage of the adoption of European data protection and does not take into account the specificities of the activities carried out by each of these companies.Originality/valueThe implementation of the GDPR is still in an initial phase. This study is pioneering in synthesizing the main benefits and challenges of its adoption considering the companies operating in the IT sector. Furthermore, this study explores the impact of the size of the company and the status of implementation of the GDPR on the perception of the established benefits and challenges.


Author(s):  
Ermawelis Ermawelis

Information technology is the application of a knowledge systematically upon practical assignments within an industry. The application of information technology covering in a range of information system both for libraries and documentation and information centers generally is classified in to four main aspects, which are: library housekeeping, information retrieval, general purpose software and library networking. The impact of information technology in general are: if there is no expansion of working vacancies, an employment will occur, if there is no data protection due to transborder data flow, including sensitive information negative impact will occur in economy and culture sectors, copyright will not be backed up, it will be difficult to control the housekeeping of information


Author(s):  
Iwan Kurniawan Widjaya

The article purposes are to analyze, identify, and measure the risks found in the use of information technology. The research method used are literature study and field study upon observations, interviews, documentation, and FRAP (facilitated Risk Analysis Process) approach to measure the risk of information technology. The results found are positive and negative findings in the use of information technology. The exixting weaknesses allow the potential risks that may occur. The conclusion is there are vulnerabilities found in the use of information technology that need several recommendations on those risks to improve performance andguarantee data protection and information from any risk arise.


Author(s):  
Rajinder Kaur ◽  
Prabal Mehrotra

The right to privacy, characterised by Justice Brandeis in Olmestead v. United States (1928)277 US 438 as the “right to be let alone: the most comprehensive of rights and the right most valued by civilised men,” is recognized under India’s constitution by the Supreme Court in four rulings: Kharak Singh v. State of Uttar Pradesh and Ors. AIR 1963 SC 1295; Govind v. State of Madhya Pradesh and Anr. (1975)2 SCC 148; R. Rajagopal alias R.R. Gopal and Anr. v. State of Tamil Nadu and Ors. (1994)6 SCC 632; and District Registrar and Collector, Hyderabad and Anr. v. Canara Bank (2005)1 SCC 496.1 This aim of this chapter is to analyze the legislative provisions prevalent in India, especially those afforded by the Information Technology (Amendment) Act, 2008, and the Ministry of Communication and Information Technology, Government of India, and also the legislative provisions accorded to data protection in the United Kingdom and the United States of America, so as to be able to reach a conclusion that will address the need for data protection law(s).


Author(s):  
Ian J. Lloyd

This chapter considers various issues concerning privacy, information technology, and surveillance. These include the emergence of a surveillance of society, the legal aspects of surveillance, rights to privacy, surveillance-based legislation, and data protection.


Sign in / Sign up

Export Citation Format

Share Document