Data protection in the personal data processing
DOI:
https://doi.org/10.18372/2410-7840.15.5714Keywords:
the personal data, priv, informative safety, informative system of processing of the personal data, protection of the personal data, threat to the personal dataAbstract
Processing of personal data, which is obligatory for any institution or organization, requires implementation of personal data processing information systems and definitely their security. The majority of existing information security methods and techniques is focused on the security of corporate information systems resources. Such techniques do not always take into account the special requirements for data processing. This fully applies to the processing of personal data protection, the security of which is provided by the current legislation. Approaches to the protection of personal data processed in automated information systems were discussed. The classification of threats to personal data that may occur when processing them in automated systems was brought. We considered the aims and methods of minimizing such threats including comprehensive measures to protect personal data. The ways and means of personal protection methods of personal data were considered. The priorities of forming the overall personal data protection system were defined.
References
Исследование текущих тенденций в области информационной безопасности бизнеса, 2012. Результаты исследования. Лаборатория Кас-перского, Москва, 2012. http://www.kaspersky.ru/ other/custom-html/brfwn/Bezopasnost_Screen.pdf
/2011 Computer Crime and Security Survey. Computer Security Institute, 2012. http://gatton. uky.edu/faculty/payne/ACC324/CSISurvey2010.pdf
Global Information Security Survey. Ernst&Young. http://engweb.info/courses/ens/extra/GISS%20re port_fmal.pdf.
Глобальное исследование утечек корпоративной информации и конфиденциальных данных 2012. Аналитический центр InfoWatch, 2012. http://www.slideshare.net/malvvv/info-watch- globaldataleakagereport2012
DLP-система InfoWatch Traffic Monitor Enterprise. InfoWatch, 2012. http://www.infowatch. ru/products/ traffic_monitor_enterprise.
Защита корпоративного контента на основе Information Rights Management. http://www. oraclepro.ru/download/archive/almaty-2011/almaty-04.pdf.
Закон України “Про захист персональних даних” від 01.06.2010 № 2297-VI (Редакція станом на 09.06.2013).
НД ТЗІ 1.1-002-99 “Загальні положення щодо захисту інформації в комп’ютерних системах від несанкціонованого доступу” від “28” квітня 1999р. № 22.
НД ТЗІ 1.1-002-99 “Класифікація автоматизованих систем і стандартні функціональні захищеності оброблюваної інформації від несанкціонованого доступу” від “28” квітня 1999 р. № 22.
Типовий порядок обробки персональних даних у базах персональних даних затв. наказом №3659/5 від 30.12.2011 Міністерства юстиції України.
Study of Current trends in security business newsletter, 2012. Results of the study. Kaspersky Labs, 2012. http://www.kaspersky.ru/other/ custom- html/brfwn/Bezopasnost_Screen.pdf.
/2011 Computer Crime and Security Survey. Computer Security Institute, 2012. http://gatton. uky.edu/faculty/payne/ACC324/CSISurvey2010.pdf
Global Information Security Survey. Ernst&Young. http://engweb.info/courses/ens/extra/GISS%20re port_fmal.pdf
Global Study of Leaks of Corporate Information and
Confidential Data, 2012. Research Center.
InfoWatch, 2012. http://www.slideshare.net
/malvvv/info-watch-globaldataleakagereport2012.
DLP-system InfoWatch Traffic Monitor Enterprise. InfoWatch, 2012. http://www.infowatch.ru/products/traffic_monitor_enterprise.
Protecting corporate content-based Information Rights Management. http://www.oraclepro.ru
/download/archive/almaty-2011/almaty-04.pdf.
Law of Ukraine " On Personal Data Protection " from 01.06.2010 № 2297 -VI (Edition on 09.06.2013).
TPI 1.1-002-99 "General Provisions Concerning the protection of Information from Unauthorized Access in Computer Systems" April, 28, 1999 number 22.
TPI 1.1-002-99 "Classification of Automated Systems and Standard Functional Security of Information Processed from Unauthorized Access" April, 28, 1999 № 22.
Typical Procedure for the Processing of Personal Data in the Personal Data Databases approved by Decree № 3659/5 dated 30.12.2011 Ministry of Justice of Ukraine.
Downloads
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).