Beyond Data Protection


Book Description

The book deals with data protection issues from practical viewpoints. 40% of the content focus on the Malaysian Personal Data Protection Act (PDPA) 2010 progress, whilst 60% of the content focus on leading comparative practical guidance from Europe. Part of the PDPA provisions is mirrored from European approaches and practices. The approach of this book is straightforward, handy and readable and is supplemented by practical applications, illustrations, tables and diagrams. Practical examples highlighted in this book range from cloud computing, radio frequency identification technology, social media networks and information security to basic related aspects of data protection issues covering strategic leadership, management, governance and audit in businesses, organisations and local authorities. Recommended best practices have been outlined for practical guidance accompanied with future challenges and opportunities for Malaysia and ASEAN. The book is equally suitable for academics, practitioners, governmental officials and regulators dealing with data protection within their sector-specific legislation.




Data Protection Beyond Borders


Book Description

This timely book examines crucial developments in the field of privacy law, efforts by legal systems to impose their data protection standards beyond their borders and claims by states to assert sovereignty over data. By bringing together renowned international privacy experts from the EU and the US, the book provides an accurate analysis of key trends and prospects in the transatlantic context, including spaces of tensions and cooperation between the EU and the US in the field of data protection law. The chapters explore recent legal and policy developments both in the private and law enforcement sectors, including recent rulings by the Court of Justice of the EU dealing with Google and Facebook, recent legislative initiatives in the EU and the US such as the CLOUD Act and the e-evidence proposal, as well as ongoing efforts to strike a transatlantic deal in the field of data sharing. All of the topics are thoroughly examined and presented in an accessible way that will appeal to scholars in the fields of law, political science and international relations, as well as to a wider and non-specialist audience. The book is an essential guide to understanding contemporary challenges to data protection across the Atlantic.




Beyond Data


Book Description

This open access book focuses on the impact of Artificial Intelligence (AI) on individuals and society from a legal perspective, providing a comprehensive risk-based methodological framework to address it. Building on the limitations of data protection in dealing with the challenges of AI, the author proposes an integrated approach to risk assessment that focuses on human rights and encompasses contextual social and ethical values. The core of the analysis concerns the assessment methodology and the role of experts in steering the design of AI products and services by business and public bodies in the direction of human rights and societal values. Taking into account the ongoing debate on AI regulation, the proposed assessment model also bridges the gap between risk-based provisions and their real-world implementation. The central focus of the book on human rights and societal values in AI and the proposed solutions will make it of interest to legal scholars, AI developers and providers, policy makers and regulators. Alessandro Mantelero is Associate Professor of Private Law and Law & Technology in the Department of Management and Production Engineering at the Politecnico di Torino in Turin, Italy.







Research Anthology on Privatizing and Securing Data


Book Description

With the immense amount of data that is now available online, security concerns have been an issue from the start, and have grown as new technologies are increasingly integrated in data collection, storage, and transmission. Online cyber threats, cyber terrorism, hacking, and other cybercrimes have begun to take advantage of this information that can be easily accessed if not properly handled. New privacy and security measures have been developed to address this cause for concern and have become an essential area of research within the past few years and into the foreseeable future. The ways in which data is secured and privatized should be discussed in terms of the technologies being used, the methods and models for security that have been developed, and the ways in which risks can be detected, analyzed, and mitigated. The Research Anthology on Privatizing and Securing Data reveals the latest tools and technologies for privatizing and securing data across different technologies and industries. It takes a deeper dive into both risk detection and mitigation, including an analysis of cybercrimes and cyber threats, along with a sharper focus on the technologies and methods being actively implemented and utilized to secure data online. Highlighted topics include information governance and privacy, cybersecurity, data protection, challenges in big data, security threats, and more. This book is essential for data analysts, cybersecurity professionals, data scientists, security analysts, IT specialists, practitioners, researchers, academicians, and students interested in the latest trends and technologies for privatizing and securing data.




Beyond Data


Book Description

Why laws focused on data cannot effectively protect people—and how an approach centered on human rights offers the best hope for preserving human dignity and autonomy in a cyberphysical world. Ever-pervasive technology poses a clear and present danger to human dignity and autonomy, as many have pointed out. And yet, for the past fifty years, we have been so busy protecting data that we have failed to protect people. In Beyond Data, Elizabeth Renieris argues that laws focused on data protection, data privacy, data security and data ownership have unintentionally failed to protect core human values, including privacy. And, as our collective obsession with data has grown, we have, to our peril, lost sight of what’s truly at stake in relation to technological development—our dignity and autonomy as people. Far from being inevitable, our fixation on data has been codified through decades of flawed policy. Renieris provides a comprehensive history of how both laws and corporate policies enacted in the name of data privacy have been fundamentally incapable of protecting humans. Her research identifies the inherent deficiency of making data a rallying point in itself—data is not an objective truth, and what’s more, its “entirely contextual and dynamic” status makes it an unstable foundation for organizing. In proposing a human rights–based framework that would center human dignity and autonomy rather than technological abstractions, Renieris delivers a clear-eyed and radically imaginative vision of the future. At once a thorough application of legal theory to technology and a rousing call to action, Beyond Data boldly reaffirms the value of human dignity and autonomy amid widespread disregard by private enterprise at the dawn of the metaverse.




Data Protection and Compliance in Context


Book Description

Large-scale data loss continues to make headline news, highlighting the need for stringent data protection policies, especially when personal or commercially sensitive information is at stake. This book provides detailed analysis of current data protection laws and discusses compliance issues, enabling the reader to construct a platform on which to build internal compliance strategies. The author is chair of the National Association of Data Protection Officers (NADPO).




Beyond Fear


Book Description

Many of us, especially since 9/11, have become personally concerned about issues of security, and this is no surprise. Security is near the top of government and corporate agendas around the globe. Security-related stories appear on the front page everyday. How well though, do any of us truly understand what achieving real security involves? In Beyond Fear, Bruce Schneier invites us to take a critical look at not just the threats to our security, but the ways in which we're encouraged to think about security by law enforcement agencies, businesses of all shapes and sizes, and our national governments and militaries. Schneier believes we all can and should be better security consumers, and that the trade-offs we make in the name of security - in terms of cash outlays, taxes, inconvenience, and diminished freedoms - should be part of an ongoing negotiation in our personal, professional, and civic lives, and the subject of an open and informed national discussion. With a well-deserved reputation for original and sometimes iconoclastic thought, Schneier has a lot to say that is provocative, counter-intuitive, and just plain good sense. He explains in detail, for example, why we need to design security systems that don't just work well, but fail well, and why secrecy on the part of government often undermines security. He also believes, for instance, that national ID cards are an exceptionally bad idea: technically unsound, and even destructive of security. And, contrary to a lot of current nay-sayers, he thinks online shopping is fundamentally safe, and that many of the new airline security measure (though by no means all) are actually quite effective. A skeptic of much that's promised by highly touted technologies like biometrics, Schneier is also a refreshingly positive, problem-solving force in the often self-dramatizing and fear-mongering world of security pundits. Schneier helps the reader to understand the issues at stake, and how to best come to one's own conclusions, including the vast infrastructure we already have in place, and the vaster systems--some useful, others useless or worse--that we're being asked to submit to and pay for. Bruce Schneier is the author of seven books, including Applied Cryptography (which Wired called "the one book the National Security Agency wanted never to be published") and Secrets and Lies (described in Fortune as "startlingly lively...¦[a] jewel box of little surprises you can actually use."). He is also Founder and Chief Technology Officer of Counterpane Internet Security, Inc., and publishes Crypto-Gram, one of the most widely read newsletters in the field of online security.




Beyond Cybersecurity


Book Description

Move beyond cybersecurity to take protection of your digital business to the next level Beyond Cybersecurity: Protecting Your Digital Business arms your company against devastating online security breaches by providing you with the information and guidance you need to avoid catastrophic data compromise. Based upon highly-regarded risk assessment analysis, this critical text is founded upon proprietary research, client experience, and interviews with over 200 executives, regulators, and security experts, offering you a well-rounded, thoroughly researched resource that presents its findings in an organized, approachable style. Members of the global economy have spent years and tens of billions of dollars fighting cyber threats—but attacks remain an immense concern in the world of online business. The threat of data compromise that can lead to the leak of important financial and personal details can make consumers suspicious of the digital economy, and cause a nosedive in their trust and confidence in online business models. Understand the critical issue of cyber-attacks, and how they are both a social and a business issue that could slow the pace of innovation while wreaking financial havoc Consider how step-change capability improvements can create more resilient organizations Discuss how increased collaboration within the cybersecurity industry could improve alignment on a broad range of policy issues Explore how the active engagement of top-level business and public leaders can achieve progress toward cyber-resiliency Beyond Cybersecurity: Protecting Your Digital Business is an essential resource for business leaders who want to protect their organizations against cyber-attacks.




Beyond 9/11


Book Description

Drawing on two decades of government efforts to "secure the homeland," experts offer crucial strategic lessons and detailed recommendations for homeland security. For Americans, the terrorist attacks of September 11, 2001, crystallized the notion of homeland security. But what does it mean to "secure the homeland" in the twenty-first century? What lessons can be drawn from the first two decades of U.S. government efforts to do so? In Beyond 9/11, leading academic experts and former senior government officials address the most salient challenges of homeland security today.