DATA BREACHES EXIT STRATEGY: A COMPARATIVE ANALYSIS OF DATA PRIVACY LAWS

Author:

Shahul Ikram Nur Adlin Hanisah

Abstract

Data has become highly valuable in the era of digitalisation and is the main target of cybercriminals. Cybercriminals steal data by exploiting system vulnerabilities. The rise of catastrophic data breach incidents affects business operations, reputation and legal standing, leading to business disruptions, financial loss and reputation damage. These incidents have raised data security concerns. The frequent incident is partly due to insufficient security measures in place. This article employs doctrinal research focusing on legal principles based on legislation to analyse Malaysia’s legal framework for protecting personal data in Malaysia and a comparison with other jurisdictions, i.e. the European Union General Data Protection Regulation (GDPR), the Singapore Personal Data Protection Act 2012 and the China Personal Information Protection Law (PIPL). The findings show that Malaysia’s data protection laws fall short of the international norm in some areas. This article suggests that Malaysian policymakers may amend the Personal Data Protection Act 2010 to align with international data protection standards to strengthen data security measures in preventive, detective and responsive data breaches. Consequently, this article provides an analysis of data protection laws in Malaysia and compares them with other advanced jurisdictions. It offers valuable insights into the challenges and opportunities involved in safeguarding personal data, the legal framework, and organisational strategies related to data privacy and security.

Publisher

Universiti Sains Islam Malaysia

Reference31 articles.

1. Data Breach Investigations Report (DBIR). (2023). In Verizon Enterprise Solutions. Retrieved March 26, 2024, from https://www.verizon.com/business/resources/reports/2023-data-breach-investigations-report-dbir.pdf

2. Agrawal, D., Bernstein, P. A., Bertino, E., Davidson, S. B., Dayal, U., Franklin, M., Gehrke, J., Haas, L. M., Halevy, A., Han, J., Jagadish, H. V., Labrinidis, A., Madden, S., Papakonstantinou, Y., Patel, J. M., Ramakrishnan, R., Ross, K. A., Shahabi, C., Suciu, D., . . . Widom, J. (2011). Challenges and opportunities with Big Data 2011-1. Purdue University. https://docs.lib.purdue.edu/cctech/1/

3. Ali Alibeigi, & Abu Bakar Munir. (2020). Malaysian Personal Data Protection Act, a mysterious application. University of Bologna Law Review, 5(2), 362-374.

4. Beebeejaun, A. (2019). Privacy laws in the context of Fintech Industry in Mauritius: A comparative study. International Journal of Law, Humanities & Social Science, 3(3), 23–37.

5. Chandrasekaran, D. P., Zulkifli, I. H. B. M., Anis, A. M., & Han, Y. S. (2023, February 17). Personal Data Protection Act 2010 under the New Government: Updates to the proposed amendments in 2023. Lexology. https://www.lexology.com/library/detail.aspx?g=a6ddd77f-eb48-463e-aaec-ab9174520113

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3