Cyber Security Law: Protecting Privacy and Security in Universities

Verified

Added on  2022/11/29

|10
|2745
|233
AI Summary
This article discusses the importance of cyber security law in protecting privacy and security in universities. It explores various laws and regulations that can be implemented, obligations of the policies, significance of the rules, and initiatives that can be taken. The article provides insights into the challenges and solutions for maintaining a safe and secure environment in educational institutions.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: CYBER SECURITY LAW
CYBER SECURITY LAW
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1CYBER SECURITY LAW
Table of Contents
Introduction......................................................................................................................................2
Discussion........................................................................................................................................3
Various laws and Regulations that can be implemented by the University A.............................3
Obligations of the policies which have been implemented.........................................................4
Significance of the rules..............................................................................................................5
Demonstration of the compliant terms in the workforce.............................................................6
Any other initiative that can be implemented..............................................................................7
Conclusion.......................................................................................................................................8
References........................................................................................................................................9
Document Page
2CYBER SECURITY LAW
Introduction
The right to privacy and security is considered to be one of the significant factors which
needs to be determined as these are essential attributes which are required by individuals in order
to live in a society. The privacy and the security policies are complied with the provisions which
are contained in statutory laws which govern the society. In today’s day and age privacy and
security concerns are growing since there have been various platforms which have been
discovered where the right to privacy and security of an individual are considered to be
hampered with. Therefore, there has been a growing concern in order to protect the rights
relating to the privacy and security of the individuals. The protection of the individuals are
considered to be a necessary factor. The individuals need to be protected and ensured certain
amount of safety but there needs to be protection given to different information or any kind of
confidential information should be secured. Thus, there needs to be security and privacy which
needs to be provided. In today’s day and age the availability of information has become easy and
due to this reason there are increased number of crimes as the offenders have more scope to
commit crimes and misuse the privacy of an individual or any institution or organization. Thus,
the protection of these are an essential feature this paper aims to discuss that (Caron, et al.,
2016).
This paper discusses the various regulations or the provisions that can be used by the
University A in accordance with the privacy and security factors which are taken into
consideration and they are to be complied with. It also discusses the obligations related to those
policies and regulations and any other initiatives which can be taken. Furthermore, this paper
discusses the importance of those obligations and the consequences regarding the breach of
Document Page
3CYBER SECURITY LAW
those. It also discusses the demonstration of those policies. In conclusion, it summarizes the
points which have been made in the paper.
Discussion
Various laws and Regulations that can be implemented by the University A
Laws and regulations are considered to govern and regulate the behavior of the
individuals or any company or corporations or any institutions to maintain peace and harmony
among those institutions or corporations.
The University A in order to enhance and improve better security and privacy can take
certain measures where the privacy of the institution does not get hampered or meddled with
which would mean that the confidentiality of the information acquired by the university is
maintained and any kind of personal information should not be shared or circulated within the
institution which would secure the privacy and safety of the information obtained (Bennett and
Raab 2017). An institution or a university has certain levels of security, regulation measures that
needs to be agreed upon or agreed with since there are a lot of information, or data that are
available to a university and it needs to be protected. The security of the students who are also
considered to be an important factor which needs to be taken into consideration. Thus, the
protection and safety of those students are to be ensured. Furthermore, the regulations or the
policies that can be maintained by the university needs to be in compliance with since it needs to
ensure safety and security to the information or the data that has been acquired by the university
and the safety and security of the students are considered to be ensured. Therefore, the laws and
regulations need to be in compliance to the safety and security. There needs to be some kind of
importance given to the security of private and confidential data or information (Cole, et al.,
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4CYBER SECURITY LAW
2015). There needs to be preparation for risk assessment and proper procedures need to be
followed with in order to manage the risks. There needs to be certain information processes and
evaluation techniques implemented which needs to assess the usage of the information and the
data. It should try to implement and supervise certain security processes which would supervise
the enforcement of these particular techniques. The progress of the security and privacy should
be reviewed and assessed (Hunt 2011).
Obligations of the policies which have been implemented
There are certain obligations which can be found in compliance with these policies as
those obligations are considered to be definitive in nature. The obligations are to protect and
ensure safety by implementing those techniques for the university. There needs to be proper
training given to the people who are considered to be in the working and protection of the
privacy and security of that particular institution which means that the training needs to be given
in relation to the risk management or to assess the quantity of the risk which can occur in the
university. During the time of emergency procedures the risks needs to be managed and in order
to provide safety or ensure safety to the individuals the individuals who have been appointed in
order to ensure safety and security needs to tackle the situation in a positive way which means
that the individuals need to know proper methods and procedures during the time of emergency
and can overcome the situation. There needs to be a proper cyber security safety arranged for the
institution since now-a-days there have been an increased rate of cyber-crimes which are taking
place due to the connectivity and availability of information which has become easily available
and accessible by all. There needs to be proper review and analysis of the data or the information
in order to provide safety. The individuals who are a part of the institution should also feel secure
when being a part of that institution and the protection of their rights are to be ensured. The
Document Page
5CYBER SECURITY LAW
individuals who are appointed to ensure the safety of the individuals are considered to be able to
take care of the individuals and not try to violate the rights and privacy of the individuals. If
there are any kind of problems or difficulties arising to the individuals who are a part of that
institution in order to ensure safety of those individuals necessary steps are to be taken which
would help in protecting the individuals (Edwards 2016).
In order to maintain safety and security in a university there needs to be certain rules and
regulations which need to be adopted that would help or assist in the protection of the individuals
and trying to ensure safety of those individuals by regulating the behaviors of those who do not
comply with those regulations. Therefore, proper procedures are to be taken which would make
them ensure safety towards the individuals specific rights and duties. The individuals who are a
part of the institution needs to follow certain regulations relating to the ethical behavior and they
need to follow certain code of conduct which would help in maintaining the ethical behavior that
needs to be followed and maintained.
Significance of the rules
The regulations that are followed in order to maintain the safety of the individuals and
ensure safety and the rights related to security and privacy of the individuals are to be taken into
consideration. Therefore, there is a significance of these rules since it helps in determining the
protection which needs to be given to the individuals in order to ensure safety. The rules and
regulations are laid down in a company or an organization or in this particular case the institution
which are in order to regulate and govern the business of the institution or try to regulate the
manner of the individuals. Therefore, significance is there as it determines the implementation of
the regulations. If these rules and regulations are considered to be violated or breached then there
are consequences that are to be taken because of such breach or violation of those regulations.
Document Page
6CYBER SECURITY LAW
The rules and regulations are made in order to regulate and govern the activities of the
individuals to a certain extent which means that any wrongdoing would not be considered to be
tolerated. The rules and regulations are considered to be the driving force since these regulate
and govern the functioning of an institution and it helps in the management of the institution.
The privacy and the security is considered to be an important factor since these are basic rights
which are to be provided to an individual therefore if there is any kind of violation on this
specific part then there are certain consequences that would be faced by the individuals who have
violated it. In an institution or a university there are rights of privacy separately for the
individuals who are a part of that organization or institution and there are privacy related to the
documents or information which have been acquired or obtained which needs to be protected.
Therefore, these are considered to be important concerns for an institution as both of these points
constitute to be significant factors. If the rules and regulations are not followed or not abided by
then the consequences for such would be faced. If there is any kind of breach or violations of the
duties then there can be certain consequences laid down which would depend on the
grievousness of such violations which can indicate a monetary penalty or it can also indicate any
other form of punishment.
Demonstration of the compliant terms in the workforce
In order to implement the techniques which has been established above there needs to be
an agreement about these techniques and it needs to be favored which would bring the
demonstration process into picture as the enforcement of those techniques are necessary factors
and therefore, after the enforcement of those strategies the execution of those strategies need to
be followed. There needs to be an organized structure where the implementation of those
strategies will be done in place as they determine the privacy and the security of the institution.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7CYBER SECURITY LAW
The privacy and security of the individuals are of importance since they have the rights to have
privacy and security. These are given to individuals and with the increased rate of crimes related
to different factors the privacy of the individuals are tampered with. Therefore, in an institution
or a university the protection of the privacy of the individuals who are a part of that institution
are considered to be significant (Corbridge 2018). In order to demonstrate the techniques or the
policies that have been laid down it needs to be complied with or agreed upon by the majority of
the individuals who are a part of that institution and the execution of those policies need to be
carried out which would determine whether the policies are compatible and in par with the
[protection of the individuals or securing the important documents or information which has
been present in the institution or obtained through others. Therefore, the demonstration of the
work force needs to be complied with or agreed upon.
Any other initiative that can be implemented
To maintain a safe and secure work force in an institution or any university there needs to
be new strategies which are to be developed by the people or the employees who work in that
specific university or institution and they need to be open to new changes and development
which can benefit them as well as the university. The best interests of the university needs to be
adhered to. In order to improve the privacy and security of an institution or university the digital
arena or purview of the university needs to be improved which means that there should be
minimization of personal information on the digital arena as there have been an increasing
amount of crimes which are taking place due to increase in the hype of digitalization. The
personal information which are shared on the digital platform are misused by the perpetrators
and therefore, the right to privacy gets affected and there is a breach or violation caused due to
this reason. There needs to be better online security structure which needs to be implemented and
Document Page
8CYBER SECURITY LAW
worked on which would help the people who are a part of the university or the institution. Better
risk assessing and management needs to be implemented which would help and assist in trying to
deal with the situations in times of emergency. Monitoring of the functions which are carried out
by the management needs to be done which would help in establishing a transparency and
accountability in the institution or the university. These are some of the initiatives that can be
taken into consideration for improving the security and the privacy of the university or the
institution (Ng 2016).
Conclusion
Therefore from the above discussion, it can be comprehended, that the privacy or the
safety of an individual is considered to be a significant factor as these are the basic rights which
the individuals have which should not be tampered with. Due to the increased amount of crime
rate and the growing crimes it has been an important factor in protecting an individual and trying
to protect every information that can be easily accessible. Therefore, in order to provides safety
and security certain measures need to be adopted. This paper had discussed the various rules and
regulations which can be implemented by a specific university in order to improve the privacy
and security of that university and the obligations regarding those regulations. It discussed
further the consequences that can be faced if the conditions are not met with and how can it be
demonstrated. Lastly, it talked about some other initiatives that can be adopted or implemented
which might help or assist in the safety or security of the company.
Document Page
9CYBER SECURITY LAW
References
Bennett, C.J. and Raab, C.D., 2017. The governance of privacy: Policy instruments in global
perspective. Routledge.
Caron, X., Bosua, R., Maynard, S.B. and Ahmad, A., 2016. The Internet of Things (IoT) and its
impact on individual privacy: An Australian perspective. Computer Law & Security Review,
32(1), pp.4-15.
Cole, K.A., Gupta, S., Gurugubelli, D. and Rogers, M.K., 2015. A review of recent case law
related to digital forensics: The current issues.
Corbridge, Å., 2018. Responding to Doxing in Australia: Towards a Right to Informational Self-
Determination. UniSA Student Law Review, 3.
Edwards, L., 2016. Privacy, security and data protection in smart cities: A critical EU law
perspective. Eur. Data Prot. L. Rev., 2, p.28.
Hunt, C.D., 2011. Conceptualizing Privacy and Elucidating its Importance: Foundational
Considerations for the Development of Canada's Fledgling Privacy Tort. Queen's LJ, 37, p.167.
Ng, J., 2016. International cybercrime, transnational evidence gathering and the challenges in
Australia: finding the delicate balance. International Journal of Information and Communication
Technology, 9(2), pp.177-198.
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]