Research Proposal: Comparing Data Protection Laws in UAE and UK

Verified

Added on  2023/01/19

|16
|4042
|70
Project
AI Summary
This research proposal undertakes a comparative analysis of data protection laws in the United Arab Emirates (UAE) and the United Kingdom (UK). The study aims to assess the effectiveness of these laws in addressing the security of personal data, given the increasing prevalence of cybercrime and the evolving landscape of data privacy concerns. The proposal outlines a comprehensive literature review, examining existing legal frameworks, strengths, and weaknesses of data protection in both nations. The methodology involves document analysis to gather data and a SWOT analysis to evaluate the effectiveness of data protection laws. The research also considers ethical considerations and anticipates the outcomes and implications of the study, including its contribution to understanding the best practices in data protection and informing policy recommendations. The proposal includes a detailed timeframe for completion and a list of references.
Document Page
Research Proposal 1
RESEARCH PROPOSAL
by
Student
Name
Course
Professor
Institution
Date
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Research Proposal 2
Research Proposal
Table of Contents
Proposed Title..................................................................................................................................3
Introduction/Overview.....................................................................................................................3
The Rationale of the Study...........................................................................................................4
Aim of the Study..........................................................................................................................5
Objectives of the Study................................................................................................................5
Literature Review............................................................................................................................5
SWOT Analysis of Data Protection Laws in UAE......................................................................8
Methodology..................................................................................................................................10
Research Design.........................................................................................................................10
Data Sources..............................................................................................................................11
Data Analysis.............................................................................................................................11
Ethical Considerations...............................................................................................................12
Assumed Outcomes and Implication of the Study........................................................................12
Time Frame....................................................................................................................................13
Document Page
Research Proposal 3
List of References..........................................................................................................................14
Proposed Title
Comparison of data protection law in United Arab Emirates (UAE) and United Kingdom
(UK)
Introduction/Overview
The advancement in technology and economic along with social globalization have led to
novel challenges in safeguarding data. The security of data that contain personal information by
institutions and organizations, which gather and process data, has become a grave concern
because of the increasing rate of constant mixed attack. With Advanced Persistent Threat (APT),
a well-resourced systematic attack carried out by hostile state and cyber criminals targeting state
secrets; company intelligence plus arbitrary thievery of sensitive information (De Hert &
Papakonstantinou, 2012, pp. 130). The latest breaches in multiple person’s health, as well as
financial data, it has become relatively crucial for organizations that gather and utilize personal
information to maintain an all-inclusive and tough security framework to secure against these
exceptional attacks. According to a report by the Symantec Internet Security Threat Report
(ISTR), information violations amplified by 24 percent in the year 2014, plus a substantial
measure of these violations led to the loss of a considerable quantity of data. Thus, the report
acknowledged that 2014 became a year with extensive zero-day attacks, prevalent vulnerability,
Document Page
Research Proposal 4
ransomware in addition to proliferation of a considerable number of wicked codes than formerly
reported (Baker, 2017, pp. 138).
The United Arab Emirates (UAE) was instrumental in designing data protection laws that
have been criticized at the federal level as they contain no specific provisions that express the
type of management or deepness of data security policies to be implemented not in favour of
unlawful exposure of individual information. The UAE has been criticized for its inefficiency in
development data protection laws to protect personal data from any kind of attack as cybercrime
has increased in the recent past in the region target institutions that collect and store personal
information like the financial institutions. On the contrary, the United Kingdom (UK) have
implemented data protection laws that ensure that personal data is protected and specifies the
type of security practices against unauthorized exposure to unauthorized persons. These laws in
the UK have cybercrime decline in recent years that point out the effective use of the data
protection laws that have been seen to be strengthened through reviewing them regularly (Busch,
2019, pp. 310).
The Rationale of the Study
The study is important in examining the data protection laws and determines their
effective in UAE and UK. The increasing challenge of safeguarding personal data has increased
the awareness in diverse countries around the world towards creating data protection laws that
will ensure that the cybercrimes are minimized. These laws will ensure that the growing trend of
cybercrimes is tackled and that adequate measures are put in place to safeguard data and provide
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Research Proposal 5
security measures to deal with these challenges. UAE and United Kingdom have advanced very
dissimilar legal customs: the United Arab Emirates being Shari ‘a law plus the United Kingdom
a common law (Spencer & Patel, 2019, pp. 35).
Aim of the Study
The purpose of the study is to compare the United Arab Emirates and the United
Kingdom data protection laws to determine their effectiveness in addressing the security of
personal data.
Objectives of the Study
1. To investigate the effectiveness of data protection laws in the UAE in addressing security
of personal data for the people.
2. To explore the efficiency of data protection laws in the UK in their efforts to manage
personal data.
3. To determine the country that has developed effective data protection laws and the need
to strengthen these laws to determine the growing concern of increasing cybercrimes in
the cyber world (Bu-Pasha, 2017, pp. 215).
Literature Review
The protection of personal data along with the privacy considerations are more vital than
before due to technological and globalization advancement. Through there are no definite laws or
authorities, which particularly handle privacy and data protection in UAE, there are laws that are
pertinent. The primary UAE laws that are pertinent to privacy and data protection include UAE
Document Page
Research Proposal 6
constitution, the Civil Code, the Penal Code, cyber crime law, the Electronic Transactions and
Commercial Law and GDPR. The UAE federal data protection laws have no specific provisions
defining the type or control or depth of information security measures established against
unauthorized exposure of personal information (In Gijrath et al., 2018, pp. 65). Instead, Articles
2 plus 3 of the Cyber Crime law are anchored on breaches connected to accessing unlawfully
and/or lacking authorization; data linked to insightful private and financial data, like credit care
or bank account. Sarabdeen, Rodrigues and Balasubramanian (2014) argue that the UAE data
protection laws, commonly, are not exceedingly developed as those of the UK that have become
effective in addressing cybercrimes and ensuring that personal data is protected. According to
Greenleaf (2017), United Arab Emirates has no comprehensive or definite confidentiality plus
data protection law and it is ranked the least with a percent score of 0.0 per cent in the “Data
Protection Index Maturity Rank” highlighted in a report released by EMC Global Data
Protection Index 2014. Accordingly, data protection along with the issues concerning privacy is
not managed in UAE through a distinctive decree; however, it is administered via some penal
code stipulations. The United Arab Emirates (UAE) Penal Code offers some fundamental laws
that apply to the regulation, as well as protection of data in addition to sensitive data (Greenleaf,
2017, pp. 26).
The primary data protection regulations in the Dubai International Financial Centre
(DIFC) are DIFC Law Number 1 of 2007 and DIFC Data Protection Regulations. The main data
protection laws under the Abu Dhabi Global Market (ADGM) include the Data Protection
Regulations 2018 and Data Protection Regulations 2015. The only law that addresses directly
data protection in the United Arab Emirates is the Dubai Law Number 26 of 2015 that regulate
Document Page
Research Proposal 7
Data Dissemination and Exchange in the Emirate of Dubai. Young (2014) asserts that the most
recent advancement concerning the ratification of laws that apply to such distinct fields of data
or confidentiality concerns comprise the ratification of United Arab Emirates Federal Law 3 of
2013 that establishes National Electronic Security Authority (NESA); the Cabinet Resolution 21
of 2013 on IT Security Regulations at the federal government parastatals; the United Arab
Emirates Federal Law 5 of 2011 Combating Cyber Crime; as well as UAW Federal 6 2010 that
relates to Credit Information. The most applicable privacy law in UAE is Article 379 of the UAE
Penal Code (Young, 2014, pp. 101). The law prohibits an individual who by reason of their
profession, skill and situation are entrusted with “secret” from using or disclosing that “secret”
with no consent of the individual whom the secret pertains (Parsons & Oja, 2013, pp. 345).
There exist other provisions that are appropriate to data protection, for instance, the United Arab
Emirates Civil Code plus the United Arab Emirates Labour Law. Nevertheless, in line with
UAE, the only precise data protection decree that governs the processing of individual data is the
DIFC that is applicable to persons and companies running in the DIFC (Graef, 2016, pp. 82).
In the UK, there are laws that have been created to safeguard the privacy of personal data
by providing stipulations that guide the disclosure of information and handling of financial
information by different organizations and institutions (Maurushat, 2011, pp. 432). The Data
Protection Act 1998 has been instrumental law in data protection against exposure because it
provides measures that are designed to discourage individuals from accessing private
information without permission. Petersen (2018) says that the Data Protection Act 1998 was
modified by the Freedom of Information Act 200 to award a right of access to all personal
information (manual or computerized) stored by public authorities, subject to exceptions
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Research Proposal 8
(Petersen, 2018, pp. 12). Additionally, the Data Protection Act 2018 (DPA 2018) ensures that the
data protection laws fir for the digital era because of the growing quantity of information is being
processed. Thus, the act encourages individuals to take charge of their personal data and support
United Kingdom organizations through this transformation. The act offers an all-inclusive and
contemporary framework for data guard in the United Kingdom, with well-built sanctions for
mismanagement (Fazlioglu, 2019, pp. 272).
The UK’s third generation of data protection law recently received the Royal Assent
where it primary provisions came into effect on May, 25, 2018. The novel act is designed to
modernise data protection laws in the country to make sure that they are effective in the future.
DAP 2018 is effective in handling with processing that does not fall in European Union (EU)
jurisdiction. The act further transposes the European Union Data Protection Directive 2016/680)
in the domestic UK law in which the Law Enforcement Directive complements the General Data
Protection Regulation (GDPR). Also, part 3 of the DAP establishes the needs for processing of
personal information for criminal’ law enforcement goals.
SWOT Analysis of Data Protection Laws in UAE
Strengths Weaknesses
The country has established strong
institutions that oversee the
implementation of data protection laws.
The government has put in place
The data protection laws in UAE do not
clearly provide provisions on cyber
crimes regarding terms of
imprisonment and fines imposed to
Document Page
Research Proposal 9
measures to ensure that the data
protection laws are well guarded to
promote the interests of the citizens.
The cybercrime laws have recognized
the need to strengthen the data
protection laws to ensure the private
data is not attacked.
persons violating data protection laws.
Data protection laws in the UAE have
not been effective in preventing
criminals from accessing personal data.
The UAE federal data protection laws
have no specific provisions defining the
type or control or depth of information
security measures established against
unauthorized exposure of personal
information (Gosh, 2010, pp. 18)
Opportunities Threats
The UAE enjoys great economic
position amongst other nations in the
Middle East region that needs her to
take stronger, as well as quicker steps
to use all accessible prospects to
enhance its present Cyber Law status to
increase the intensity of security in a
productive environment replete with e-
businesses.
The primary threat for data protection
laws is the increasing cases of
cybercrime in the UAE that undermines
the efforts towards data protection laws.
The information revolution age makes
it even easier for hackers to share
hacking particulars plus methods. This
generates a more accomplished breed
of Cyber Criminals that continuously
introduce novel types of crimes that
Document Page
Research Proposal 10
There is growing awareness for the
need to put in place strong measures by
the government to promote the
implementation of data protection laws.
leave governments behind in coping
with technology data protection laws
Methodology
The study will use document analysis to collect the needed data to examine the
effectiveness of data protection laws in the UAE and the UK. The study will be designed in a
way to investigate the present landscape of the UAE and the UK in regard to data protection
laws. This research will endeavour to sufficiently examine the level of data protection laws in
these nations in the light of the recent cases of growing cyber crimes due to economic reforms
along withy the rapid technological developments in the ICT segment (Purtova, 2018, pp. 40).
Research Design
The document analysis will be used to search sources that have vast data on the data
protection laws in the United Aran Emirates plus the United Kingdom. Document analysis will
be an appropriate design method to collect the data that is needed to attain the objectives of the
study. The method is an important instrument utilized expansively in qualitative study and
researchers to analyze practically anything that will support the research questions (Seidel &
Urquhart, 2013, pp. 237). In addition, contrasted to other techniques like interviews,
observations, plus questionnaires, the method of document analysis is crucial in the reality that it
analyses printed documents plus this evades researcher manipulation that other methods have on
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Research Proposal 11
data. Additionally, documents are resources that will be simply revisited whilst confirming
information. In addition, document analysis is effective in that the comparative analysis will be
costly with other methods, but with document analysis the cost will decrease significantly.
Data Sources
Further to carrying out searches all through proper USQ library databases in addition to
government data accessible online, resources held at or reachable via the university will be used
together with materials used as part of teaching in the MSc in Information technology
Specialization in Cyber Security. Requests will be made to access documents from different
government institutions and organizations in the UAE and the UK. The federal laws plus statutes
are usually published by authorized state sources. Online sources will be important sources in
collecting the data needed to answer the research questions of the study. This information will be
valuable in collecting data regarding data protection laws in the United Kingdom and UAE. The
qualitative procedures that will be used in this study will start with primary sources that will be
collected with their pertinent segments and entered into the Endnote. Thus, this will be done not
only as a reference executive to better advance the writing of the concluding report, but as well a
vital step in the study workflow to prepare the resource for porting to NVIVO™ (Hoecke, 2011,
pp. 24).
Data Analysis
The analysis of the data collected from the different sources will be analyzed in order to
interpret the results of the study. This study will provide a methodological contribution via
workflow along with the analysis schema will be utilized as the basis for comparison in
NVIVO™. Once the data is gathered in addition to be prepared in NVIVO™, the procedure of
Document Page
Research Proposal 12
coding will be performed. Coding will entail the process of selecting a primary group,
methodically relating it to other categories, confirming the associations, as well as filling in the
groups, which need further modification plus development. It should be remembered that the
study will be non-linear and of a hermeneutic design, which will inform the examination along
with process all through the coding process comprising literature review and the analysis
(Bazeley, 2013, pp. 328).
Ethical Considerations
The ethical issue in the study is requesting the person from libraries in UAE and UK to
access the documents. This is important because this will evade the legal issues that may arise
when permission is not sought from the relevant authorities with the documents needed in the
study. Permission should be also sought from government authorities since they store records
that have information on data protection laws important for the study (Seidel & Urquhart, 2013,
pp. 240).
Assumed Outcomes and Implication of the Study
The study will be important in informing the development of data protection laws to help
promote the privacy of private data. This will help legislators and other stakeholders to craft data
protection laws that will go along way in preventing exposure of personal data to third parties
and unauthorized individuals from accessing the data. The results of the study will offer much
understanding on the areas of the data protection laws that need to be amended to ensure that
they are effective in tackling cyber crimes that entail attack on personal data (Kirkpatrick, 2018,
pp. 19). This understanding will be crucial to institutions and organizations in developing
chevron_up_icon
1 out of 16
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]