TITLE

Cyber Security and Habeas Data: The Latin American Response to Information Security and Data Protection

AUTHOR(S)
Kobek, Luisa Parraguez; Caldera, Erick
PUB. DATE
July 2016
SOURCE
OASIS - Observatorio de Análisis de los Sistemas Internacionale;jul-dec2016, Issue 24, p109
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Habeas Data is not a commonly known concept, yet it is widely acknowledged in certain circles that deal with information security and data protection. Though it has been around for decades, it has recently gained momentum in Latin America. It is the legal notion that protects any and all information pertaining to the individual, from personal to financial, giving them the power to decide how and where such data can be used. At the same time, most Latin American countries have created laws that protect individuals if their information is misused. This article examines the concept of Habeas Data from its inception to its current applications, and explains the different approaches and legislations passed in Latin American countries on data protection due to the rise of global cybercrime.
ACCESSION #
119264311

 

Related Articles

  • INFORMATION SECURITY: HOW TECHNOLOGY IS CHANGING THE FACE OF INFORMATION SECURITY.  // Law Update;5/20/2015, p1 

    This article provides an overview of laws which impact the information security in United Arab Emirates (UAE). Topics discussed include the Federal Law Number Five of 2012 termed as Cyber Crimes Law to handle hacking and data theft, the Dubai International Financial Centre's Data Protection Law...

  • INFORMATION SECURITY: HOW TECHNOLOGY IS CHANGING THE FACE OF INFORMATION SECURITY.  // Law Update;5/21/2015, p210 

    The article presents an overview of the laws impacting information security in the United Arab Emirates (UAE) and offers tips based on industry standards when assessing an entity's information security regime. Topics discussed include information security obligations under UAE law, the...

  • Promising career in Cyber Security. Kumar, Amit // Digital Learning;Nov2013, Vol. 9 Issue 11, p60 

    The article discusses the need for India to have cyber security professionals to secure and preserve the prosperity of the country. It is stated that the country needs five lakh cybersecurity experts by 2015 to support its fast growing Internet economy as per an estimate by the union ministry of...

  • SKILLS CRUNCH. Hale, James // SC Magazine: For IT Security Professionals (15476693);Jun2014, Vol. 25 Issue 6, p28 

    The article discusses the efforts of educational institutions, nonprofit organizations, and staffing companies in the U.S. to address the skills shortage of cyber security professionals. Topics covered include the growing demand for trained professionals, the security education and training...

  • Last week's poll: cyber-security.  // Engineer (Online Edition);11/3/2015, p4 

    The article presents a poll of readers after the November 2015 cyber attack on the Talk Talk phone company and the U.S. National Security Agency's warnings on information security. The poll posits a question on the level of cyber security that companies should be responsible for the liability of...

  • Privacy by Design. Farmer, Liz // Governing;May2014, Vol. 27 Issue 8, p38 

    The article discusses the initiative taken by Ann Cavoukian, information and privacy Commissioner in Ontario, to protect country's personal privacy and data security. It mentions the role of Cavoukian for the development of Privacy by Design, an organization which develops approaches to promote...

  • Singapore security threat landscape still plagued by known issues.  // eGov Innovation;9/2/2015, p1 

    The article reports on the information security threat in Singapore in terms of combating cybercrime through strategy, mitigation and legislation.

  • Managing Cyber Risks. Murgai, Charu // Dataquest;11/15/2014, Vol. 32 Issue 21/22, p77 

    Several charts and diagrams are presented depicting the global state of information security in 2015, including security incidents, security spending, and security practices.

  • Under the Microscope. LANZ, JOEL // Trusted Professional;Mar2015, Vol. 18 Issue 3, p6 

    The article offers suggestions on testing the cybersecurity risk management program of an organization and discusses the significance of information security assessment.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics