A Report on Current Issues in Information Technology and Singapore Law
VerifiedAdded on 2023/05/28
|19
|5858
|82
Report
AI Summary
This report examines the current issues in information technology and Singapore law, focusing on the Uber data breach incident of nearly 380,000 people. The report discusses the technological issues such as privacy, safety, influence on industries, liability, and automation within the context of ride-sharing services. It analyzes the legal issues, including the role of the Personal Data Protection Act (PDPA), and the responsibilities of companies like Uber in ensuring data security and consumer safety. The report also explores the potential security measures that could be imposed by the government to protect customer data, addressing the need for transparency and cooperation with local authorities. The report highlights the technological risks associated with ride-sharing platforms, such as data privacy and safety concerns, and the influence of these platforms on established industries. It also touches upon the challenges of liability and automation in the context of ride-sharing services in Singapore.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: CURRENT ISSUES IN RELATION TO INFORMATION TECHNOLOGY AND SINGAPORE LAW
Current Issues in relation to Information Technology and Singapore Law
Name of the Student
Name of the University
Author’s note
Current Issues in relation to Information Technology and Singapore Law
Name of the Student
Name of the University
Author’s note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1CURRENT ISSUES IN RELATION TO INFORMATION TECHNOLOGY AND SINGAPORE
LAW
Table of Contents
1. Introduction..................................................................................................................................2
2. Discussion of Technological Issues.............................................................................................3
3. Discussion of Legal Issues...........................................................................................................8
References......................................................................................................................................15
LAW
Table of Contents
1. Introduction..................................................................................................................................2
2. Discussion of Technological Issues.............................................................................................3
3. Discussion of Legal Issues...........................................................................................................8
References......................................................................................................................................15

2CURRENT ISSUES IN RELATION TO INFORMATION TECHNOLOGY AND SINGAPORE
LAW
1. Introduction
This report is based on the data breach incident of nearly 380,000 people. The breach of
data was made when Uber was hacked by a group of users. This had included the names, e-mail
addresses and the mobile phone numbers. The hack in the data of Uber was considered to be the
largest breach of data in 2017. The company had decided to conceal the activity of hack (Larcker
and Tayan 2017). This had involved the information about 57 million Uber drivers. The law
agencies and the IT authorities related to the organisation had stated that they would investigate
the incident. They would also investigate whether the company were responsible for breaching
the IT security laws. The security authorities such as the Personal Data Protection Commission
(PDPC) had stated that the security breach had mostly affected a massive number of users in
Singapore (Agrafiotis et al. 2018). The PDPC authorities have taken a serious view in terms of
the data breaches and is thus investigating whether the company had been responsible for any of
the provisions of data breach based on the Personal Data Protection Act (PDPA).
Based on the number of incidents of loss of public data, different law agencies have
stated that as Uber is a massive transport service provider, they should be highly responsible for
holding high standards based on public accountability based on ensuring consumer safety and
also complying according to the laws set by PDPA. Though Uber had not disclosed about the
number of riders and drivers who were affected by the data breach but according to a major
report, it has been clearly estimated that over a million users have been using the application
(Krishnamurthy, Smith and Desouza 2017). According to different external forensic experts,
which were hired by Uber it was clearly reported that different vital information such as history
of trip location, credit card numbers, date of birth, bank account numbers were not exposed.
LAW
1. Introduction
This report is based on the data breach incident of nearly 380,000 people. The breach of
data was made when Uber was hacked by a group of users. This had included the names, e-mail
addresses and the mobile phone numbers. The hack in the data of Uber was considered to be the
largest breach of data in 2017. The company had decided to conceal the activity of hack (Larcker
and Tayan 2017). This had involved the information about 57 million Uber drivers. The law
agencies and the IT authorities related to the organisation had stated that they would investigate
the incident. They would also investigate whether the company were responsible for breaching
the IT security laws. The security authorities such as the Personal Data Protection Commission
(PDPC) had stated that the security breach had mostly affected a massive number of users in
Singapore (Agrafiotis et al. 2018). The PDPC authorities have taken a serious view in terms of
the data breaches and is thus investigating whether the company had been responsible for any of
the provisions of data breach based on the Personal Data Protection Act (PDPA).
Based on the number of incidents of loss of public data, different law agencies have
stated that as Uber is a massive transport service provider, they should be highly responsible for
holding high standards based on public accountability based on ensuring consumer safety and
also complying according to the laws set by PDPA. Though Uber had not disclosed about the
number of riders and drivers who were affected by the data breach but according to a major
report, it has been clearly estimated that over a million users have been using the application
(Krishnamurthy, Smith and Desouza 2017). According to different external forensic experts,
which were hired by Uber it was clearly reported that different vital information such as history
of trip location, credit card numbers, date of birth, bank account numbers were not exposed.

3CURRENT ISSUES IN RELATION TO INFORMATION TECHNOLOGY AND SINGAPORE
LAW
Though Uber had stated that no information was breached but several reports that had
emerged from last month have confirmed that some of the customers in Singapore have found
various changes in their Uber and credit card accounts. This also included the different kinds of
transactions that were made with foreign currencies. Uber had admitted that they would conceal
the incident of data breach for more than a year. They would pay an amount of US $100,000 in
order to delete the data and thus would close the incident. The law authorities in Singapore had
also stated in various media coverage that the primary responsibility would lie with the company
in order to defend themselves against any form of cyber-attacks within their systems. The higher
security authorities have also stated that the security incident at Uber was being investigated by
them (Manning 2015). This would help them in determining whether the US based company was
primarily responsible in breaching any data protection laws. These authorities also stated the
need of Uber to be transparent and thus be helpful in cooperating with the local authorities.
Based on the research on the issue of the current issue of data breach, a question could be
framed based on the current issue. What are the current IT related laws set by the government at
Singapore in relation to the data breach of Uber and what would be the proposed security
measures that are imposed by the government in order to protect the data of the customers?
2. Discussion of Technological Issues
In the year 2013, Uber started its trails in Singapore and officially comes up with car-
sharing services in the month of Feb. In March 2014, Uber comes up with two more option like
UberX and Uber Taxi in Singapore (Li, Taeihagh and Jong 2018). Uber considered itself as
technology organization instead of transport providers. Uber can be considered as a method of
checking problems along with access to taxies mainly during the peak hours. After this, Uber
considered themselves as technological organization which can provide riders and drivers with
LAW
Though Uber had stated that no information was breached but several reports that had
emerged from last month have confirmed that some of the customers in Singapore have found
various changes in their Uber and credit card accounts. This also included the different kinds of
transactions that were made with foreign currencies. Uber had admitted that they would conceal
the incident of data breach for more than a year. They would pay an amount of US $100,000 in
order to delete the data and thus would close the incident. The law authorities in Singapore had
also stated in various media coverage that the primary responsibility would lie with the company
in order to defend themselves against any form of cyber-attacks within their systems. The higher
security authorities have also stated that the security incident at Uber was being investigated by
them (Manning 2015). This would help them in determining whether the US based company was
primarily responsible in breaching any data protection laws. These authorities also stated the
need of Uber to be transparent and thus be helpful in cooperating with the local authorities.
Based on the research on the issue of the current issue of data breach, a question could be
framed based on the current issue. What are the current IT related laws set by the government at
Singapore in relation to the data breach of Uber and what would be the proposed security
measures that are imposed by the government in order to protect the data of the customers?
2. Discussion of Technological Issues
In the year 2013, Uber started its trails in Singapore and officially comes up with car-
sharing services in the month of Feb. In March 2014, Uber comes up with two more option like
UberX and Uber Taxi in Singapore (Li, Taeihagh and Jong 2018). Uber considered itself as
technology organization instead of transport providers. Uber can be considered as a method of
checking problems along with access to taxies mainly during the peak hours. After this, Uber
considered themselves as technological organization which can provide riders and drivers with
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4CURRENT ISSUES IN RELATION TO INFORMATION TECHNOLOGY AND SINGAPORE
LAW
matching service in Singapore. As the popularity of ridesharing gained in recent times, various
taxi drivers considered Uber ridesharing as competition.
In the past, there were many worldwide adaptations for various kind of technologies
which focus on delivering efficient and effective public based services. Uber Ride Sharing
economy can be considered to be as one of the well-known example (Chesterman 2018). It can
be easily defined as collaborative economy which focuses on peer-production of economy. It can
be easily stated like a marketplace that aims to bring various individual on same platform for
utilizing various assets. Sharing technology mainly allows various customers for interaction with
different services with the help of innovative technologies (Tian 2016). A number of
organization like Uber have well established in different domains like consumer goods,
transportation.
Adaptation of technological innovation like big data, waste plant, crowdsourcing, and
autonomous vehicle, IOT and blockchain technology can easily cause various kind of issues
(Engin and Treleaven 2018). It can easily cause unintended consequences. So as a result social
acceptance of innovative project can be low. Both risk and uncertainty are two new concepts in
this industry. The first one is applied to the probability and only outcomes are considered. There
is large number of risk present in adapting large number of technologies like organizational risk,
social risk and lastly turbulence.
Ride-sharing of Uber has resulted in five kinds of technological risk like
Privacy: Uber ridesharing platform aims to collect various kind of sensitive information
related to customers like mobile number, data of geolocation and lastly information of credit
cards (Detsky and Garber 2016). Various ridesharing organization has complained regarding the
LAW
matching service in Singapore. As the popularity of ridesharing gained in recent times, various
taxi drivers considered Uber ridesharing as competition.
In the past, there were many worldwide adaptations for various kind of technologies
which focus on delivering efficient and effective public based services. Uber Ride Sharing
economy can be considered to be as one of the well-known example (Chesterman 2018). It can
be easily defined as collaborative economy which focuses on peer-production of economy. It can
be easily stated like a marketplace that aims to bring various individual on same platform for
utilizing various assets. Sharing technology mainly allows various customers for interaction with
different services with the help of innovative technologies (Tian 2016). A number of
organization like Uber have well established in different domains like consumer goods,
transportation.
Adaptation of technological innovation like big data, waste plant, crowdsourcing, and
autonomous vehicle, IOT and blockchain technology can easily cause various kind of issues
(Engin and Treleaven 2018). It can easily cause unintended consequences. So as a result social
acceptance of innovative project can be low. Both risk and uncertainty are two new concepts in
this industry. The first one is applied to the probability and only outcomes are considered. There
is large number of risk present in adapting large number of technologies like organizational risk,
social risk and lastly turbulence.
Ride-sharing of Uber has resulted in five kinds of technological risk like
Privacy: Uber ridesharing platform aims to collect various kind of sensitive information
related to customers like mobile number, data of geolocation and lastly information of credit
cards (Detsky and Garber 2016). Various ridesharing organization has complained regarding the

5CURRENT ISSUES IN RELATION TO INFORMATION TECHNOLOGY AND SINGAPORE
LAW
inappropriate use and gathering of data. Different critics have also stated that Uber-like big data
organization that is changing its business and gaining wealth related information. It mainly
focuses on gathering new kind of services and generating huge amount of revenue by selling data
(Engin and Treleaven 2018). If Uber collects information related to journalists, venture
capitalists and lastly elected officials in improve way then it can easily huge amount of disaster.
In the last few years, Uber has been working hard to improve its privacy policy, the organization
is not sure of the fact that whether its policy will be effective in near future. In 2017 November,
Uber confirmed about the fact that privacy is not that much serious concern for its Singapore
citizen. It has been mainly done because PDPA has already provided privacy of citizen in the
year 2012 (Cohen 2018). There are some challenges and additional requirements which are
introduced to PDPA in the year 2017. Apart from this, there are some additional cybersecurity
based measured against which the organization will be fined if the citizen makes use of private
information in any illegal way.
Safety: The safety of customers comes into picture for various users in ridesharing in
various parts of Singapore (Ann and Iqbal 2017). Many times customers can easily feel unsafe
when they are driven by strangers in cars. In comparison to taxi drivers, ridesharing drivers are
not that much professionally trained and properly licensed. There are many kinds of background
checks which is used by ridesharing which is not as much strict as taxi driver’s parts (Engin and
Treleaven 2018). Drivers of ridesharing do not need to conduct any kind of fingerprint scans
while the taxi drivers need to do. There are many cases of molestation, driving force which has
been influenced in the court. Apart from this, there is large number of vehicles which are used
for ridesharing that are not reported. Uber does not need inspection of vehicle on regular interval.
And same level of vehicle inspect comes into picture for conventional taxis which is not applied
LAW
inappropriate use and gathering of data. Different critics have also stated that Uber-like big data
organization that is changing its business and gaining wealth related information. It mainly
focuses on gathering new kind of services and generating huge amount of revenue by selling data
(Engin and Treleaven 2018). If Uber collects information related to journalists, venture
capitalists and lastly elected officials in improve way then it can easily huge amount of disaster.
In the last few years, Uber has been working hard to improve its privacy policy, the organization
is not sure of the fact that whether its policy will be effective in near future. In 2017 November,
Uber confirmed about the fact that privacy is not that much serious concern for its Singapore
citizen. It has been mainly done because PDPA has already provided privacy of citizen in the
year 2012 (Cohen 2018). There are some challenges and additional requirements which are
introduced to PDPA in the year 2017. Apart from this, there are some additional cybersecurity
based measured against which the organization will be fined if the citizen makes use of private
information in any illegal way.
Safety: The safety of customers comes into picture for various users in ridesharing in
various parts of Singapore (Ann and Iqbal 2017). Many times customers can easily feel unsafe
when they are driven by strangers in cars. In comparison to taxi drivers, ridesharing drivers are
not that much professionally trained and properly licensed. There are many kinds of background
checks which is used by ridesharing which is not as much strict as taxi driver’s parts (Engin and
Treleaven 2018). Drivers of ridesharing do not need to conduct any kind of fingerprint scans
while the taxi drivers need to do. There are many cases of molestation, driving force which has
been influenced in the court. Apart from this, there is large number of vehicles which are used
for ridesharing that are not reported. Uber does not need inspection of vehicle on regular interval.
And same level of vehicle inspect comes into picture for conventional taxis which is not applied

6CURRENT ISSUES IN RELATION TO INFORMATION TECHNOLOGY AND SINGAPORE
LAW
to cars. Various researchers have also argued about the fact that car drivers tend to earn much
more money. There are many drivers in Singapore who are intended to buy second-hand car for
working in Uber. They mainly do this as there is high cost involved in buying new kind of cars
(Kamal and Chen, 2016). The concern is mainly raised as the drivers want more amount of
money and not focus on involved risk. The acknowledgment is mainly done by the issues which
are not limited to drivers only.
Influence on industries: Ridesharing is very disruptive in nature which implies that the
output or result can easily anticipate effect of the given industries. Taxi drivers can easily view
ridesharing organization as a competition (Kitchin, 2016). Taxi drivers can easily make claim
regarding the use of various ridesharing platform like Uber. It can easily create negative
influence on their overall business. Taxi riders have also argued regarding the fact that
ridesharing does not need to comply with the overall price of customer’s protection. It can easily
result in unfair kind of advantage. Uber focus on employing an overall surge in the price at the
time of high demand. In the year 2015, Uber has increased its fare at the time of high demand
(Laudon and Traver, 2017). It has ultimately resulted in various kind of disruption. It has
ultimately lead to huge kind of disruption in train lines.
Liability: Ridesharing is considered to be an innovative technology which has ultimately
resulted in both non-professional and non –regulated workers (Scassa 2017). There is large
number of ride-sharing drivers that make use of rental cars so as a result the car may not be
insured in proper way. At the time of accident, it may ultimately result in various kind of losses
for both passengers and drivers. With the help of insurance, there is large number of unsolved
legal question which is taken into consideration for various kind of question at the time of
involvement of ridesharing. Uber has ultimately denied any kind of liability for any kind of
LAW
to cars. Various researchers have also argued about the fact that car drivers tend to earn much
more money. There are many drivers in Singapore who are intended to buy second-hand car for
working in Uber. They mainly do this as there is high cost involved in buying new kind of cars
(Kamal and Chen, 2016). The concern is mainly raised as the drivers want more amount of
money and not focus on involved risk. The acknowledgment is mainly done by the issues which
are not limited to drivers only.
Influence on industries: Ridesharing is very disruptive in nature which implies that the
output or result can easily anticipate effect of the given industries. Taxi drivers can easily view
ridesharing organization as a competition (Kitchin, 2016). Taxi drivers can easily make claim
regarding the use of various ridesharing platform like Uber. It can easily create negative
influence on their overall business. Taxi riders have also argued regarding the fact that
ridesharing does not need to comply with the overall price of customer’s protection. It can easily
result in unfair kind of advantage. Uber focus on employing an overall surge in the price at the
time of high demand. In the year 2015, Uber has increased its fare at the time of high demand
(Laudon and Traver, 2017). It has ultimately resulted in various kind of disruption. It has
ultimately lead to huge kind of disruption in train lines.
Liability: Ridesharing is considered to be an innovative technology which has ultimately
resulted in both non-professional and non –regulated workers (Scassa 2017). There is large
number of ride-sharing drivers that make use of rental cars so as a result the car may not be
insured in proper way. At the time of accident, it may ultimately result in various kind of losses
for both passengers and drivers. With the help of insurance, there is large number of unsolved
legal question which is taken into consideration for various kind of question at the time of
involvement of ridesharing. Uber has ultimately denied any kind of liability for any kind of
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7CURRENT ISSUES IN RELATION TO INFORMATION TECHNOLOGY AND SINGAPORE
LAW
accidents that occurs at the time of making use of services (Tian 2016). The argument of Uber
does not only provide platform which facilities both machine divers with passengers. It does not
bear any kind of legal responsibilities for damage of property and injuries to passengers caused
by drivers. There has been argument with respect to responsibilities for various organization
which is needed for enjoying profits but can easily result in some other kind of risk (Noto La
Diego 2016). In Sep 2016, an accident took place in Singapore in which 19-years old died. There
are many additional deaths which have taken place due to negligence of Uber. At present, there
is no solution to deal with accidents and court which have been addressed due to issue caused by
case study. PDVL ordered to mandatory insurance from private hired drivers along with
compulsory seat for children that focus on overcoming liability issues.
Automation: As there has developed in ridesharing in Singapore, automation has come
into picture (Engin and Treleaven 2018). It was mentioned in the year 2016 Sep, two driverless
cars have been developed and set in partnership with Uber which allow the users to try them for
free. Later on, In the year 2016, Uber made an announcement regarding the Japanese automaker
that is Honda which is in collaboration with motorbike based services. Both Uber and Honda will
make a partnership for autonomous ridesharing that will come in action in near future.
Automation in the field of ridesharing can easily bring huge amount of changes in the given
transport system. It will ultimately reduce any kind of facility related to crashes along with
increase in mobility of the elder based services (Detsky and Garber 2016). It will ultimately
result in increase in overload, lower value of emissions and lastly increase in saving for fuel. It
might bring new kind of challenges for decision makers. It can easily result in unemployment in
various taxi and private car drivers. It has ultimately resulted in decrease in demand on cars for
various drivers. Apart from this, it can easily result in decrease in demand for cars along drivers.
LAW
accidents that occurs at the time of making use of services (Tian 2016). The argument of Uber
does not only provide platform which facilities both machine divers with passengers. It does not
bear any kind of legal responsibilities for damage of property and injuries to passengers caused
by drivers. There has been argument with respect to responsibilities for various organization
which is needed for enjoying profits but can easily result in some other kind of risk (Noto La
Diego 2016). In Sep 2016, an accident took place in Singapore in which 19-years old died. There
are many additional deaths which have taken place due to negligence of Uber. At present, there
is no solution to deal with accidents and court which have been addressed due to issue caused by
case study. PDVL ordered to mandatory insurance from private hired drivers along with
compulsory seat for children that focus on overcoming liability issues.
Automation: As there has developed in ridesharing in Singapore, automation has come
into picture (Engin and Treleaven 2018). It was mentioned in the year 2016 Sep, two driverless
cars have been developed and set in partnership with Uber which allow the users to try them for
free. Later on, In the year 2016, Uber made an announcement regarding the Japanese automaker
that is Honda which is in collaboration with motorbike based services. Both Uber and Honda will
make a partnership for autonomous ridesharing that will come in action in near future.
Automation in the field of ridesharing can easily bring huge amount of changes in the given
transport system. It will ultimately reduce any kind of facility related to crashes along with
increase in mobility of the elder based services (Detsky and Garber 2016). It will ultimately
result in increase in overload, lower value of emissions and lastly increase in saving for fuel. It
might bring new kind of challenges for decision makers. It can easily result in unemployment in
various taxi and private car drivers. It has ultimately resulted in decrease in demand on cars for
various drivers. Apart from this, it can easily result in decrease in demand for cars along drivers.

8CURRENT ISSUES IN RELATION TO INFORMATION TECHNOLOGY AND SINGAPORE
LAW
It can easily result in decrease in demand number of deaths as driver encounters errors in various
motor-vehicle. General Insurance organization is very engaged in LTA along with implication of
AV which is needed for insurance (Cohen 2018). Apart from this, it focuses on gathering new
kind of developments. Apart from this, there is new kind of new kind of automation which is
major area of concern. Automation is considered to be in the pilot stage and is long before it can
be adapted in proper way.
3. Discussion of Legal Issues
Based on the legal aspects in relation to the data breach incident, the different security
executives at the Singapore Law agencies have stated that the Personal Data Protection
Companies (PDPC) takes a responsibility in dealing with the raised issues (Opderbeck 2015).
The authority also takes responsibility in investigating about the major causes of the data breach
incident and whether the company was liable in the incident of breach against the provisions of
the Personal Data Protection Act (PDPA). The different kinds of vital laws implemented by the
government of Singapore have been able to restrict the unauthorized access to hackers from
gaining access to the vital data of the customers. These laws have been helpful for securing the
data of the customers in relation to the ridesharing application.
The Land Transport Authority (LTA) have stated that they have expected that the
company should be fully transparent within their operations based on protecting the customer
data. They should also cooperate with the local regulators in dealing with the higher form of
security of the data of the company (Khan et al. 2017). The LTA also suggests that the company
should also be cooperative with the law authorities and the IT security executives in disclosing
the extent up to which the customers and drivers have been affected during the breach of data
breach. A high level of transparency within the entire system would be able to restrict the
LAW
It can easily result in decrease in demand number of deaths as driver encounters errors in various
motor-vehicle. General Insurance organization is very engaged in LTA along with implication of
AV which is needed for insurance (Cohen 2018). Apart from this, it focuses on gathering new
kind of developments. Apart from this, there is new kind of new kind of automation which is
major area of concern. Automation is considered to be in the pilot stage and is long before it can
be adapted in proper way.
3. Discussion of Legal Issues
Based on the legal aspects in relation to the data breach incident, the different security
executives at the Singapore Law agencies have stated that the Personal Data Protection
Companies (PDPC) takes a responsibility in dealing with the raised issues (Opderbeck 2015).
The authority also takes responsibility in investigating about the major causes of the data breach
incident and whether the company was liable in the incident of breach against the provisions of
the Personal Data Protection Act (PDPA). The different kinds of vital laws implemented by the
government of Singapore have been able to restrict the unauthorized access to hackers from
gaining access to the vital data of the customers. These laws have been helpful for securing the
data of the customers in relation to the ridesharing application.
The Land Transport Authority (LTA) have stated that they have expected that the
company should be fully transparent within their operations based on protecting the customer
data. They should also cooperate with the local regulators in dealing with the higher form of
security of the data of the company (Khan et al. 2017). The LTA also suggests that the company
should also be cooperative with the law authorities and the IT security executives in disclosing
the extent up to which the customers and drivers have been affected during the breach of data
breach. A high level of transparency within the entire system would be able to restrict the

9CURRENT ISSUES IN RELATION TO INFORMATION TECHNOLOGY AND SINGAPORE
LAW
unauthorized access within the system information. This would also allow the users to remain
notified about any form of unforeseen incident.
Uber Technologies Inc. (Uber) have agreed to the settlement with each of the 50 U.S
state attorneys general based with the connection with the breach of data that had affected the
personal information of the users. The data breach incident had affected the personal information
of the driver license numbers of an approx. of 607,000 drivers on a nation-wide basis (Lowry,
Dinev and Willison 2017). The Attorney General have also alleged that after the company had
learned of the incident of the data breach, they had paid the intruders a ransom amount of
$100,000 in order to delete the data of the customers and drivers. The Attorney General had also
alleged the company that they had failed to notify each of the individuals about the breach of
data (Cunha et al. 2018). The notification that was needed to be provided to each of the
customers was needed to be provided to the users should have been provided during the incident.
As per the reports of Pennsylvania Office of the Attorney General, the settlement within
the top officials would require the company to pay $148 million to the Attorney General. This
amount would be divided among 50 states. In addition to paying the ransom amount, Uber
should also be able to undertake certain security measures in relation to the security (Park et al.
2018). These security measures should include:
Implementation of severe measures in order to protect the data of the users that would be
stored on the third-party platforms.
To comply with the applicable notification based on the data breach and laws based on
consumer protection in regards with the protection of personal information about the
users.
LAW
unauthorized access within the system information. This would also allow the users to remain
notified about any form of unforeseen incident.
Uber Technologies Inc. (Uber) have agreed to the settlement with each of the 50 U.S
state attorneys general based with the connection with the breach of data that had affected the
personal information of the users. The data breach incident had affected the personal information
of the driver license numbers of an approx. of 607,000 drivers on a nation-wide basis (Lowry,
Dinev and Willison 2017). The Attorney General have also alleged that after the company had
learned of the incident of the data breach, they had paid the intruders a ransom amount of
$100,000 in order to delete the data of the customers and drivers. The Attorney General had also
alleged the company that they had failed to notify each of the individuals about the breach of
data (Cunha et al. 2018). The notification that was needed to be provided to each of the
customers was needed to be provided to the users should have been provided during the incident.
As per the reports of Pennsylvania Office of the Attorney General, the settlement within
the top officials would require the company to pay $148 million to the Attorney General. This
amount would be divided among 50 states. In addition to paying the ransom amount, Uber
should also be able to undertake certain security measures in relation to the security (Park et al.
2018). These security measures should include:
Implementation of severe measures in order to protect the data of the users that would be
stored on the third-party platforms.
To comply with the applicable notification based on the data breach and laws based on
consumer protection in regards with the protection of personal information about the
users.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

10CURRENT ISSUES IN RELATION TO INFORMATION TECHNOLOGY AND SINGAPORE
LAW
Implementation of strict form of password policies based on access of the employee
within the Uber network.
Development and implementation of an overall policy based on data security. This would
be highly needed for addressing the collection and protection of the personal information
that would include the risks based on data security.
Implementation of measures based on data security based on in relation to the personal
information of customers based within the Uber network.
Implementation of a corporate integrity program based on ensuring different appropriate
reporting channels based on internal ethics, concerns and complaints of customers and
employees within the organisation.
Engaging with a third party expert who would be able to conduct different kinds of
regular assessments based on the data security efforts of Uber. They would also be able to
provide different kinds of recommendations based on the improvement of the security
program.
Information was also collected from the website of the Land Transport Authority (LTA)
of Singapore and the different kinds of discussions based within the Parliament of Singapore.
Different kinds of examination based on the governance of ridesharing was conducted in order to
understand about the different kinds of security measures that are taken by the company. The
major kind of changes that were made to the PDPA, which was proposed in Singapore in July
2017 had included the requirements that the organisation should be able to take the responsibility
in notifying the users against the incident of data breach (Farnga 2018). According to the new
laws that were set by PDPA, the organisation should also be able to notify the customers in case
of any kind of data incident within 72 hours of detecting the incident. In case of any kind of
LAW
Implementation of strict form of password policies based on access of the employee
within the Uber network.
Development and implementation of an overall policy based on data security. This would
be highly needed for addressing the collection and protection of the personal information
that would include the risks based on data security.
Implementation of measures based on data security based on in relation to the personal
information of customers based within the Uber network.
Implementation of a corporate integrity program based on ensuring different appropriate
reporting channels based on internal ethics, concerns and complaints of customers and
employees within the organisation.
Engaging with a third party expert who would be able to conduct different kinds of
regular assessments based on the data security efforts of Uber. They would also be able to
provide different kinds of recommendations based on the improvement of the security
program.
Information was also collected from the website of the Land Transport Authority (LTA)
of Singapore and the different kinds of discussions based within the Parliament of Singapore.
Different kinds of examination based on the governance of ridesharing was conducted in order to
understand about the different kinds of security measures that are taken by the company. The
major kind of changes that were made to the PDPA, which was proposed in Singapore in July
2017 had included the requirements that the organisation should be able to take the responsibility
in notifying the users against the incident of data breach (Farnga 2018). According to the new
laws that were set by PDPA, the organisation should also be able to notify the customers in case
of any kind of data incident within 72 hours of detecting the incident. In case of any kind of

11CURRENT ISSUES IN RELATION TO INFORMATION TECHNOLOGY AND SINGAPORE
LAW
critical infrastructure, the Cyber Security Agency (CSA) of Singapore should also be informed
about the new form of proposed cyber-security bill.
The law agencies have stated the ride sharing platforms have collected different forms of
vital sensitive information about their customers. These include the geo-location data, credit card
numbers and telephone numbers of the customers. Some of the users of the ridesharing
applications have complained the inappropriate ways of gathering data from the users. Based on
the regular incidents in relation to the data breach, it has been seen that there different kinds of
major changes that were introduced within PDPA in the summer of 2017. Different other kinds
of cyber security measures were also introduced in 2018 with the implementation of Cyber
Security Act. This kind of implemented law defined that if the organisation were making use of
the private information of the citizens then they should be solely responsible about any form of
illegal usage of such kind of information.
In order to manage the major forms of developments of different ridesharing platforms
within Singapore and collection of information of customers, it would be necessary for taking
different kinds of regulatory actions. In the recent case based on the data breach incident in
relation to Uber Technologies, it has been seen that the Parliament had approved the Third-party
Taxi Booking Services Act. Under the provisions of the Act, the third-party providers based on
taxi-booking service should be conformed to register themselves with the LTA and thus should
also comply with the defined regulations (Gan, Chua and Wong 2018). The Singapore
government has also developed a PDVL framework based on private hire car drivers, which had
come into effect during the first half of 2017.
In addition with the passing of the PDPA Act in Singapore in 2012 and the major
amendment in 2017, it has been seen that the use of personal data would be already strictly
LAW
critical infrastructure, the Cyber Security Agency (CSA) of Singapore should also be informed
about the new form of proposed cyber-security bill.
The law agencies have stated the ride sharing platforms have collected different forms of
vital sensitive information about their customers. These include the geo-location data, credit card
numbers and telephone numbers of the customers. Some of the users of the ridesharing
applications have complained the inappropriate ways of gathering data from the users. Based on
the regular incidents in relation to the data breach, it has been seen that there different kinds of
major changes that were introduced within PDPA in the summer of 2017. Different other kinds
of cyber security measures were also introduced in 2018 with the implementation of Cyber
Security Act. This kind of implemented law defined that if the organisation were making use of
the private information of the citizens then they should be solely responsible about any form of
illegal usage of such kind of information.
In order to manage the major forms of developments of different ridesharing platforms
within Singapore and collection of information of customers, it would be necessary for taking
different kinds of regulatory actions. In the recent case based on the data breach incident in
relation to Uber Technologies, it has been seen that the Parliament had approved the Third-party
Taxi Booking Services Act. Under the provisions of the Act, the third-party providers based on
taxi-booking service should be conformed to register themselves with the LTA and thus should
also comply with the defined regulations (Gan, Chua and Wong 2018). The Singapore
government has also developed a PDVL framework based on private hire car drivers, which had
come into effect during the first half of 2017.
In addition with the passing of the PDPA Act in Singapore in 2012 and the major
amendment in 2017, it has been seen that the use of personal data would be already strictly

12CURRENT ISSUES IN RELATION TO INFORMATION TECHNOLOGY AND SINGAPORE
LAW
regulated. In February 2017, it was firmly reported that the LTA would be responsible for setting
up of time and different kinds of space limits based on driverless cars. They would thus be able
to establish different kinds of design standards based on the equipment within such kind of
vehicles. These kinds of laws implemented by the government at Singapore have majorly helped
in regulating the different functions performed by the ridesharing applications within Singapore
(Ow Yong et al. 2014). They would be able to point for adopting the control-oriented strategy set
by the government.
Under the existing Singapore Laws based on enforcing IT security laws, most of the
companies including Uber are primarily required to report any kind of incident of security
breach. The different licensees of Monetary Authority of Singapore are also mandated to report
any kind of incident of security breach. The mandatory approach of reporting any kind of
incident of security breach would also be required by different kinds of selected organisations
under the upcoming cyber security bill of the country. The cyber security bill have been expected
to be introduced in the upcoming year. Under the newly proposed law, the different operators
based on local form of critical information infrastructure (CII) should be responsible for taking
some necessary steps based on safeguarding their information systems (Hwang, Zhao and Gay
2013). These organisations should also be responsible for reporting any kinds of threats and
incidents within their systems within the next 72 hours from the notification of the incident.
On November 30, a bill was introduced based on the Data Security and Breach
Notification Act that would require the businesses for reporting the data breaches that would be
active within a minimum period of 30 days. This would also institute a maximum period of 5
years of imprisonment for the individuals who would be responsible for concealing the incident
of the data breach (Lin et al. 2016). As Uber has been in the highlight within the current process
LAW
regulated. In February 2017, it was firmly reported that the LTA would be responsible for setting
up of time and different kinds of space limits based on driverless cars. They would thus be able
to establish different kinds of design standards based on the equipment within such kind of
vehicles. These kinds of laws implemented by the government at Singapore have majorly helped
in regulating the different functions performed by the ridesharing applications within Singapore
(Ow Yong et al. 2014). They would be able to point for adopting the control-oriented strategy set
by the government.
Under the existing Singapore Laws based on enforcing IT security laws, most of the
companies including Uber are primarily required to report any kind of incident of security
breach. The different licensees of Monetary Authority of Singapore are also mandated to report
any kind of incident of security breach. The mandatory approach of reporting any kind of
incident of security breach would also be required by different kinds of selected organisations
under the upcoming cyber security bill of the country. The cyber security bill have been expected
to be introduced in the upcoming year. Under the newly proposed law, the different operators
based on local form of critical information infrastructure (CII) should be responsible for taking
some necessary steps based on safeguarding their information systems (Hwang, Zhao and Gay
2013). These organisations should also be responsible for reporting any kinds of threats and
incidents within their systems within the next 72 hours from the notification of the incident.
On November 30, a bill was introduced based on the Data Security and Breach
Notification Act that would require the businesses for reporting the data breaches that would be
active within a minimum period of 30 days. This would also institute a maximum period of 5
years of imprisonment for the individuals who would be responsible for concealing the incident
of the data breach (Lin et al. 2016). As Uber has been in the highlight within the current process
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

13CURRENT ISSUES IN RELATION TO INFORMATION TECHNOLOGY AND SINGAPORE
LAW
of evaluation, it has been discussed that the hack and history of the security breach incident
would have a major form of negative impact on the valuation within the company.
Based on the current issues of data breach within Uber, it has been suggested by the
government that these organisations should be proactive in taking certain necessary steps based
on protection against the breach of data (Huang et al. 2014). The several kinds of best practices
that have been passed by the IT related laws by the government of Singapore are:
Multifactor Authentication – The implementation of multifactor authentications would
be able to prevent a remote attacker based on gaining access to different kinds of targeted
systems. A hard form of token, time-based soft token, SMS based text message or even a
card-based token could be regarded as the different kinds of effective ways in which
different kinds of remote logins could be helpful for the prevention of remote attackers
from gaining access to different kinds of sensitive systems.
Least Privilege – the different attackers were able to gain access to make use of the
credentials of the administrator and thus infiltrate into the millions of records based on
sensitive data. One of the most important strategy based on the prevention of this form of
security breach is based on the restriction of privileges (Li et al. 2015). A particular
administrator would have the rights based on accessing the sensitive production of
databases within the AWS platform. They would also be able to gain access to the
development environment (Wang et al. 2016). Based on the restriction of privileges to
the facts that would only be needed, the impact of the hacked account would be highly
minimized.
Threat Assessment – One important way in which the organisation would be able to
combat against different attackers would be based on the conduction of different forms of
LAW
of evaluation, it has been discussed that the hack and history of the security breach incident
would have a major form of negative impact on the valuation within the company.
Based on the current issues of data breach within Uber, it has been suggested by the
government that these organisations should be proactive in taking certain necessary steps based
on protection against the breach of data (Huang et al. 2014). The several kinds of best practices
that have been passed by the IT related laws by the government of Singapore are:
Multifactor Authentication – The implementation of multifactor authentications would
be able to prevent a remote attacker based on gaining access to different kinds of targeted
systems. A hard form of token, time-based soft token, SMS based text message or even a
card-based token could be regarded as the different kinds of effective ways in which
different kinds of remote logins could be helpful for the prevention of remote attackers
from gaining access to different kinds of sensitive systems.
Least Privilege – the different attackers were able to gain access to make use of the
credentials of the administrator and thus infiltrate into the millions of records based on
sensitive data. One of the most important strategy based on the prevention of this form of
security breach is based on the restriction of privileges (Li et al. 2015). A particular
administrator would have the rights based on accessing the sensitive production of
databases within the AWS platform. They would also be able to gain access to the
development environment (Wang et al. 2016). Based on the restriction of privileges to
the facts that would only be needed, the impact of the hacked account would be highly
minimized.
Threat Assessment – One important way in which the organisation would be able to
combat against different attackers would be based on the conduction of different forms of

14CURRENT ISSUES IN RELATION TO INFORMATION TECHNOLOGY AND SINGAPORE
LAW
cyber security based threat assessment (Jiang et al. 2015). Companies should be able to
review their important assets and the top risks in order to determine the areas in which
there would be an additional need of controls based on security.
Monitoring of Cloud Security – Different kinds of cloud hosting services are often
neglected due to traditional logging and controls of monitoring. Different forms of cloud
services such as hosting services are needed based on effective monitoring (Olalere et al.
2015). This form of monitoring would be based on the detection of any form of
unauthorized access to vital data (Karabat et al. 2015). Uber could have been able to
detect the unauthorized access and infiltration within large amounts of data if there had
been effective form of monitoring within the systems.
LAW
cyber security based threat assessment (Jiang et al. 2015). Companies should be able to
review their important assets and the top risks in order to determine the areas in which
there would be an additional need of controls based on security.
Monitoring of Cloud Security – Different kinds of cloud hosting services are often
neglected due to traditional logging and controls of monitoring. Different forms of cloud
services such as hosting services are needed based on effective monitoring (Olalere et al.
2015). This form of monitoring would be based on the detection of any form of
unauthorized access to vital data (Karabat et al. 2015). Uber could have been able to
detect the unauthorized access and infiltration within large amounts of data if there had
been effective form of monitoring within the systems.

15CURRENT ISSUES IN RELATION TO INFORMATION TECHNOLOGY AND SINGAPORE
LAW
References
Agrafiotis, I., Nurse, J.R., Goldsmith, M., Creese, S. and Upton, D., 2018. A taxonomy of cyber-
harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of
Cybersecurity.
Ann, C.W.S. and Iqbal, N.M., 2017. Open Application Programming Interface (API): A
Financial Revolution. Bank Negara Malaysia Quarterly Bulletin, 4, pp.51-57.
Chesterman, S., 2018. Data Protection Law in Singapore: Privacy and Sovereignty in an
Interconnected World (Introduction).
Cohen, M.C., 2018. Big data and service operations. Production and Operations Management.
Cunha, F., Maia, G., Ramos, H.S., Perreira, B., Celes, C., Campolina, A., Rettore, P., Guidoni,
D., Sumika, F., Villas, L. and Mini, R., 2018. Vehicular Networks to Intelligent Transportation
Systems. In Emerging Wireless Communication and Network Technologies (pp. 297-315).
Springer, Singapore.
Detsky, A.S. and Garber, A.M., 2016. Uber’s message for health care. N Engl J Med, 374(9),
pp.806-809.
Engin, Z. and Treleaven, P., 2018. Algorithmic Government: Automating Public Services and
Supporting Civil Servants in using Data Science Technologies. The Computer Journal.
Farnga, M., 2018. Cloud Security Architecture and Implementation-A practical approach. arXiv
preprint arXiv:1808.03892.
LAW
References
Agrafiotis, I., Nurse, J.R., Goldsmith, M., Creese, S. and Upton, D., 2018. A taxonomy of cyber-
harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of
Cybersecurity.
Ann, C.W.S. and Iqbal, N.M., 2017. Open Application Programming Interface (API): A
Financial Revolution. Bank Negara Malaysia Quarterly Bulletin, 4, pp.51-57.
Chesterman, S., 2018. Data Protection Law in Singapore: Privacy and Sovereignty in an
Interconnected World (Introduction).
Cohen, M.C., 2018. Big data and service operations. Production and Operations Management.
Cunha, F., Maia, G., Ramos, H.S., Perreira, B., Celes, C., Campolina, A., Rettore, P., Guidoni,
D., Sumika, F., Villas, L. and Mini, R., 2018. Vehicular Networks to Intelligent Transportation
Systems. In Emerging Wireless Communication and Network Technologies (pp. 297-315).
Springer, Singapore.
Detsky, A.S. and Garber, A.M., 2016. Uber’s message for health care. N Engl J Med, 374(9),
pp.806-809.
Engin, Z. and Treleaven, P., 2018. Algorithmic Government: Automating Public Services and
Supporting Civil Servants in using Data Science Technologies. The Computer Journal.
Farnga, M., 2018. Cloud Security Architecture and Implementation-A practical approach. arXiv
preprint arXiv:1808.03892.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

16CURRENT ISSUES IN RELATION TO INFORMATION TECHNOLOGY AND SINGAPORE
LAW
Gan, M.F., Chua, H.N. and Wong, S.F., 2018. Personal Data Protection Act Enforcement with
PETs Adoption: An Exploratory Study on Employees’ Working Process Change. In IT
Convergence and Security 2017 (pp. 193-202). Springer, Singapore.
Huang, X., Xiang, Y., Bertino, E., Zhou, J. and Xu, L., 2014. Robust multi-factor authentication
for fragile communications. IEEE Transactions on Dependable and Secure Computing, 11(6),
pp.568-581.
Hwang, B.G., Zhao, X. and Gay, M.J.S., 2013. Public private partnership projects in Singapore:
Factors, critical risks and preferred risk allocation from the perspective of
contractors. International Journal of Project Management, 31(3), pp.424-433.
Jiang, Q., Ma, J., Lu, X. and Tian, Y., 2015. An efficient two-factor user authentication scheme
with unlinkability for wireless sensor networks. Peer-to-peer Networking and Applications, 8(6),
pp.1070-1081.
Kamal, P. and Chen, J.Q., 2016, June. Trust in Sharing Economy. In PACIS (p. 109).
Karabat, C., Kiraz, M.S., Erdogan, H. and Savas, E., 2015. THRIVE: threshold homomorphic
encryption based secure and privacy preserving biometric verification system. EURASIP Journal
on Advances in Signal Processing, 2015(1), p.71.
Khan, S.M., Rahman, M., Apon, A. and Chowdhury, M., 2017. Characteristics of Intelligent
Transportation Systems and Its Relationship With Data Analytics. In Data Analytics for
Intelligent Transportation Systems (pp. 1-29).
Kitchin, R., 2016. Reframing, reimagining and remaking smart cities. Creating Smart Cities,
pp.219-230.
LAW
Gan, M.F., Chua, H.N. and Wong, S.F., 2018. Personal Data Protection Act Enforcement with
PETs Adoption: An Exploratory Study on Employees’ Working Process Change. In IT
Convergence and Security 2017 (pp. 193-202). Springer, Singapore.
Huang, X., Xiang, Y., Bertino, E., Zhou, J. and Xu, L., 2014. Robust multi-factor authentication
for fragile communications. IEEE Transactions on Dependable and Secure Computing, 11(6),
pp.568-581.
Hwang, B.G., Zhao, X. and Gay, M.J.S., 2013. Public private partnership projects in Singapore:
Factors, critical risks and preferred risk allocation from the perspective of
contractors. International Journal of Project Management, 31(3), pp.424-433.
Jiang, Q., Ma, J., Lu, X. and Tian, Y., 2015. An efficient two-factor user authentication scheme
with unlinkability for wireless sensor networks. Peer-to-peer Networking and Applications, 8(6),
pp.1070-1081.
Kamal, P. and Chen, J.Q., 2016, June. Trust in Sharing Economy. In PACIS (p. 109).
Karabat, C., Kiraz, M.S., Erdogan, H. and Savas, E., 2015. THRIVE: threshold homomorphic
encryption based secure and privacy preserving biometric verification system. EURASIP Journal
on Advances in Signal Processing, 2015(1), p.71.
Khan, S.M., Rahman, M., Apon, A. and Chowdhury, M., 2017. Characteristics of Intelligent
Transportation Systems and Its Relationship With Data Analytics. In Data Analytics for
Intelligent Transportation Systems (pp. 1-29).
Kitchin, R., 2016. Reframing, reimagining and remaking smart cities. Creating Smart Cities,
pp.219-230.

17CURRENT ISSUES IN RELATION TO INFORMATION TECHNOLOGY AND SINGAPORE
LAW
Krishnamurthy, R., Smith, K.L. and Desouza, K.C., 2017. Urban informatics: critical data and
technology considerations. In Seeing Cities Through Big Data (pp. 163-188). Springer, Cham.
Larcker, D. and Tayan, B., 2017. Governance Gone Wild: Epic Misbehavior at Uber
Technologies..
Laudon, K.C. and Traver, C.G., 2017. E-commerce 2017.
Li, X., Niu, J., Liao, J. and Liang, W., 2015. Cryptanalysis of a dynamic identity‐based remote
user authentication scheme with verifiable password update. International Journal of
Communication Systems, 28(2), pp.374-382.
Li, Y., Taeihagh, A. and Jong, M.D., 2018. The Governance of Risks in Ridesharing: A
Revelatory Case from Singapore. Energies, 11(5), p.1277.
Lin, T.T., Paragas, F., Goh, D. and Bautista, J.R., 2016. Developing location-based mobile
advertising in Singapore: A socio-technical perspective. Technological Forecasting and Social
Change, 103, pp.334-349.
Lowry, P.B., Dinev, T. and Willison, R., 2017. Why security and privacy research lies at the
centre of the information systems (IS) artefact: Proposing a bold research agenda. European
Journal of Information Systems, 26(6), pp.546-563.
Manning, L., 2015. Setting the Table for Feast or Famine: How Education Will Play a Deciding
Role in the Future of Precision Agriculture. J. Food L. & Pol'y, 11, p.113.
Noto La Diega, G., 2016. Uber law and awareness by design. An empirical study on online
platforms and dehumanised negotiations. Revue européenne de droit de la
consommation/European Journal of Consumer Law, 2016(II), pp.383-413.
LAW
Krishnamurthy, R., Smith, K.L. and Desouza, K.C., 2017. Urban informatics: critical data and
technology considerations. In Seeing Cities Through Big Data (pp. 163-188). Springer, Cham.
Larcker, D. and Tayan, B., 2017. Governance Gone Wild: Epic Misbehavior at Uber
Technologies..
Laudon, K.C. and Traver, C.G., 2017. E-commerce 2017.
Li, X., Niu, J., Liao, J. and Liang, W., 2015. Cryptanalysis of a dynamic identity‐based remote
user authentication scheme with verifiable password update. International Journal of
Communication Systems, 28(2), pp.374-382.
Li, Y., Taeihagh, A. and Jong, M.D., 2018. The Governance of Risks in Ridesharing: A
Revelatory Case from Singapore. Energies, 11(5), p.1277.
Lin, T.T., Paragas, F., Goh, D. and Bautista, J.R., 2016. Developing location-based mobile
advertising in Singapore: A socio-technical perspective. Technological Forecasting and Social
Change, 103, pp.334-349.
Lowry, P.B., Dinev, T. and Willison, R., 2017. Why security and privacy research lies at the
centre of the information systems (IS) artefact: Proposing a bold research agenda. European
Journal of Information Systems, 26(6), pp.546-563.
Manning, L., 2015. Setting the Table for Feast or Famine: How Education Will Play a Deciding
Role in the Future of Precision Agriculture. J. Food L. & Pol'y, 11, p.113.
Noto La Diega, G., 2016. Uber law and awareness by design. An empirical study on online
platforms and dehumanised negotiations. Revue européenne de droit de la
consommation/European Journal of Consumer Law, 2016(II), pp.383-413.

18CURRENT ISSUES IN RELATION TO INFORMATION TECHNOLOGY AND SINGAPORE
LAW
Olalere, M., Abdullah, M.T., Mahmod, R. and Abdullah, A., 2015. A review of bring your own
device on security issues. Sage Open, 5(2), p.2158244015580372.
Opderbeck, D.W., 2015. Cybersecurity, Data Breaches, and the Economic Loss Doctrine in the
Payment Card Industry. Md. L. Rev., 75, p.935.
Ow Yong, L.M., Tan, A.W.L., Loo, C.L.K. and Lim, E.L.P., 2014. Risk Mitigation of Shared
Electronic Records System in Campus Institutions: Medical Social Work Practice in
Singapore. Social work in health care, 53(9), pp.834-844.
Park, S., Akatyev, N., Jang, Y., Hwang, J., Kim, D., Yu, W., Shin, H., Han, C. and Kim, J., 2018.
A comparative study on data protection legislations and government standards to implement
Digital Forensic Readiness as mandatory requirement. Digital Investigation, 24, pp.S93-S100.
Scassa, T., 2017. Sharing Data in the Platform Economy: A Public Interest Argument for Access
to Platform Data. UBCL Rev., 50, p.1017.
Tian, G.Y., 2016. Current Issues of Cross-Border Personal Data Protection in the Context of
Cloud Computing and Trans-Pacific Partnership Agreement: Join or Withdraw. Wis. Int'l LJ, 34,
p.367.
Wang, F., Xu, Y., Zhang, H., Zhang, Y. and Zhu, L., 2016. 2FLIP: a two-factor lightweight
privacy-preserving authentication scheme for VANET. IEEE Transactions on Vehicular
Technology, 65(2), pp.896-911.
LAW
Olalere, M., Abdullah, M.T., Mahmod, R. and Abdullah, A., 2015. A review of bring your own
device on security issues. Sage Open, 5(2), p.2158244015580372.
Opderbeck, D.W., 2015. Cybersecurity, Data Breaches, and the Economic Loss Doctrine in the
Payment Card Industry. Md. L. Rev., 75, p.935.
Ow Yong, L.M., Tan, A.W.L., Loo, C.L.K. and Lim, E.L.P., 2014. Risk Mitigation of Shared
Electronic Records System in Campus Institutions: Medical Social Work Practice in
Singapore. Social work in health care, 53(9), pp.834-844.
Park, S., Akatyev, N., Jang, Y., Hwang, J., Kim, D., Yu, W., Shin, H., Han, C. and Kim, J., 2018.
A comparative study on data protection legislations and government standards to implement
Digital Forensic Readiness as mandatory requirement. Digital Investigation, 24, pp.S93-S100.
Scassa, T., 2017. Sharing Data in the Platform Economy: A Public Interest Argument for Access
to Platform Data. UBCL Rev., 50, p.1017.
Tian, G.Y., 2016. Current Issues of Cross-Border Personal Data Protection in the Context of
Cloud Computing and Trans-Pacific Partnership Agreement: Join or Withdraw. Wis. Int'l LJ, 34,
p.367.
Wang, F., Xu, Y., Zhang, H., Zhang, Y. and Zhu, L., 2016. 2FLIP: a two-factor lightweight
privacy-preserving authentication scheme for VANET. IEEE Transactions on Vehicular
Technology, 65(2), pp.896-911.
1 out of 19
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.