Role of Personal Data in the System of Information with Restricted Access

被引:0
|
作者
Volchinskaya, E. K. [1 ]
机构
[1] Natl Res Univ, Fed Chamber Notarios, Ctr Innovat & Informat Technol, Higher Sch Econ, Moscow, Russia
来源
关键词
Information of restricted access; types of secrets; privacy; personal data; state secrets; commercial secret; professional secret; criminal and administrative liability;
D O I
暂无
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
The article proposes a personal approach to the formation in Russian legislation a closed system of limiting access to information that is a system with several types of secrets. Under the presented conception, the secrets are classified by the type of their formation. Primary secrets directly related to the activity of a subject and ensure his right to the restricted access to the information. Such secrets deal with the information processed by the subject during his activity. Derived secrets relate to the obligation of a subject as to the protection of information of another subject and communicated on a secret basis (regime of confidentiality). The article specifies the elements of legal regime for each type of secrets including subjective elements and the elements of legal regulators. The article proposes the principles of transforming the regimes for secrets when transmitting information. It studies the regimes of confidentiality acceptable to protect personal data (commercial secret, professional secret, state secret, business secret) and makes a conclusion on the necessity to use these regimes instead of establishing an independent regime of the personal data protection. The author examines certain problems of protecting personal data in the regime of commercial secret, related to the RF Labour Code and the Federal laws On Commercial Secret and On Personal Data. The paper also formulates the conditions of achieving the balance of interests of the subject of personal data (employee) and the operator (employer). A question is studied as to the balance of responsibility of norms for disclosing different types of secrets. It is noted that the balance of sanctions is inconsistent. In particular, maximum sanctions for disclosing commercial or state secrets are equal, the balance has not been arranged properly as to the criminal liability for breaching privacy (breaching the secret of correspondence, disclosing the secret of adoption), sanctions vary too much in relation to the disclosure of professional secrets. All these aspects require the further development of liability measures within the system of secrets.
引用
收藏
页码:193 / 207
页数:15
相关论文
共 50 条
  • [31] Personal model of data: Towards a privacy-oriented information system
    Biskup, Joachim
    Brueggemann, Hans Hermann
    Computers and Security, 1988, 7 (06): : 575 - 597
  • [32] Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System
    Rath, Annanda Thavymony
    Colin, Jean-Noel
    Data and Applications Security and Privacy XXIX, 2015, 9149 : 233 - 241
  • [33] THE PERSONAL MODEL OF DATA - TOWARDS A PRIVACY ORIENTED INFORMATION-SYSTEM
    BISKUP, J
    BRUGGEMANN, HH
    PROCEEDINGS : FIFTH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, 1989, : 348 - 355
  • [34] Personal Innovativeness and Perceived System Quality for Information System Success: the Role of Diffusability of Innovation
    Donmez-Turan, Aygul
    Zehir, Cemal
    TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2021, 28 (05): : 1717 - 1726
  • [35] A Software Product for Processing Data on Employees of a Small Enterprise Who are Allowed to Work with Restricted Access Information
    Astakhova, Liudmila
    Basharin, Sergey
    2019 URAL SYMPOSIUM ON BIOMEDICAL ENGINEERING, RADIOELECTRONICS AND INFORMATION TECHNOLOGY (USBEREIT), 2019, : 213 - 216
  • [36] Personal Access Communications System in Taiwan
    Chiu, WJ
    Shih, MP
    Chen, FF
    1996 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLUMES 1 AND 2 - PROCEEDINGS, 1996, : 845 - 848
  • [37] Information-telecommunication system providing access to data and knowledge bases
    Yakimenko, Yu. I.
    Narytnik, T. N.
    Voytenko, A. G.
    Kazimirenko, V. A.
    Ostapchuk, D. I.
    Strizhak, A. E.
    2005 15th International Crimean Conference Microwave & Telecommunication Technology, Vols 1 and 2, Conference Proceedings, 2005, : 287 - 289
  • [40] Application of role-based access control in management information system
    Li, Jian
    Tang, Wenzhong
    Song, Changfu
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2003, 29 (06): : 534 - 538