Patching the patchwork: appraising the EU regulatory framework on cyber security breaches

被引:18
|
作者
Porcedda, Maria Grazia [1 ]
机构
[1] Univ Leeds, Sch Law, Liberty Bldg, Leeds LS2 9JT, W Yorkshire, England
基金
英国工程与自然科学研究理事会;
关键词
Data breaches; Security breaches; Cyber security; Data protection; Network and information security; Cloud computing; Data security breaches;
D O I
10.1016/j.clsr.2018.04.009
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
Breaches of security, a.k.a. security and data breaches, are on the rise, one of the reasons being the well-known lack of incentives to secure services and their underlying technologies, such as cloud computing. In this article, I question whether the patchwork of six EU instruments addressing breaches is helping to prevent or mitigate breaches as intended. At a lower level of abstraction, the question concerns appraising the success of each instrument separately. At a higher level of abstraction, since all laws converge on the objective of network and information security - one of the three pillars of the EU cyber security policy - the question is whether the legal 'patchwork' is helping to 'patch' the underlying insecurity of network and information systems thus contributing to cyber security. To answer the research question, I look at the regulatory framework as a whole, from the perspective of network and information security and consequently I use the expression cyber security breaches. I appraise the regulatory patchwork by using the three goals of notification identified by the European Commission as a benchmark, enriched by policy documents, legal analysis, and academic literature on breaches legislation, and I elaborate my analysis by reasoning on the case of cloud computing. The analysis, which is frustrated by the lack of adequate data, shows that the regulatory framework on cyber security breaches may be failing to provide the necessary level of mutual learning on the functioning of security measures, awareness of both regulatory authorities and the public on how entities fare in protecting data (and the related network and information systems), and enforcing self-improvement of entities dealing with information and services. I conclude with some recommendations addressing the causes, rather than the symptoms, of network and information systems insecurity. (C) 2018 Maria Grazia Porcedda. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:1077 / 1098
页数:22
相关论文
共 50 条
  • [1] Trade secrets and cyber security breaches
    Ettredge, Michael
    Guo, Feng
    Li, Yijun
    [J]. JOURNAL OF ACCOUNTING AND PUBLIC POLICY, 2018, 37 (06) : 564 - 585
  • [2] RECENT CYBER SECURITY BREACHES AND PREVENTIVE MEASURES
    Rao, N. Thirupathi
    Bhattacharyya, Debnath
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2019, 13 (04): : 117 - 126
  • [3] Understanding the full cost of cyber security breaches
    Furnell, Steven
    Heyburn, Harry
    Whitehead, Andrew
    Shah, Jayesh Navin
    [J]. Computer Fraud and Security, 2020, 2020 (12): : 6 - 12
  • [4] EU AND CYBER SECURITY
    Onescu, Dragos Ionut
    [J]. ELEARNING VISION 2020!, VOL I, 2016, : 436 - 441
  • [5] The regulatory intersections between artificial intelligence, data protection and cyber security: challenges and opportunities for the EU legal framework
    Andrasko, Jozef
    Mesarcik, Matus
    Hamul'ak, Ondrej
    [J]. AI & SOCIETY, 2021, 36 (02) : 623 - 636
  • [6] The regulatory intersections between artificial intelligence, data protection and cyber security: challenges and opportunities for the EU legal framework
    Jozef Andraško
    Matúš Mesarčík
    Ondrej Hamuľák
    [J]. AI & SOCIETY, 2021, 36 : 623 - 636
  • [7] Internet banking in Nigeria: Cyber security breaches, practices and capability
    Wang, Victoria
    Nnaji, Harrison
    Jung, Jeyong
    [J]. INTERNATIONAL JOURNAL OF LAW CRIME AND JUSTICE, 2020, 62
  • [8] Traffic-Aware Patching for Cyber Security in Mobile IoT
    Cheng, Shin-Ming
    Chen, Pin-Yu
    Lin, Ching-Chao
    Hsiao, Hsu-Chun
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (07) : 29 - 35
  • [9] Trusted Computing Initiative on the Spectrum of EU Cyber-Security Legal Framework
    Danidou, Yianna
    [J]. EU INTERNET LAW IN THE DIGITAL ERA: REGULATION AND ENFORCEMENT, 2020, : 277 - 296
  • [10] From Cyber Security to Cyber Power: Appraising the Emergence of 'Responsible, Democratic Cyber Power' in UK Strategy
    Devanny, Joe
    Dwyer, Andrew C.
    [J]. 2023 15TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT, CYCON, 2023, : 381 - 397