Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 6

first rewind previous Page / 1 next fast forward last

Search results

help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
The Lawyer Quarterly
|
2018
|
vol. 8
|
issue 2
165-188
EN
The issues related to cybersecurity are being amplified by the growing role of the Internet of Things devices in current digital economy. The focus of this contribution is to examine the challenges of IoT environment for the corporate cybersecurity from the legal perspective with regards to the specific role of small and medium enterprises. It provides an introduction into the environment of SMEs and the transformation of their operations through new technologies, followed by highlights of the cybersecurity challenges brought by the IoT. Core part of the contribution is an analysis of the applicable legal frameworks and discussion of the broader picture with regard to this specific perspective on the regulation of corporate cybersecurity.
2
100%
The Lawyer Quarterly
|
2021
|
vol. 11
|
issue 1
192-205
EN
The new obligation to notify personal data breaches under Articles 33 and 34 of the General Data Protection Regulation 2016/679 can be seen as a reflection of the US regulatory approach to security breach incidents, which has an established tradition since the enactment of Security Breach Information Act in California in 2002. The contribution presents in two parts the relevant legal frameworks of the US and the EU, in order to provide a discussion on their similarities and differences. The aim is to identify available intellectual stimuli to the respective academic debate regarding interpretation, application and specification of the EU provisions based on inspiration from the US experience. The Part II adds the insight into the respective EU regulatory approach and contains the discussion of the parallels of the US and EU frameworks and available insight to be drawn from this doctrinal research.
The Lawyer Quarterly
|
2019
|
vol. 9
|
issue 4
349-358
EN
The modern society is facing multiple new challenges brought by digitalisation, globalisation and personalisation. Public disorder and social tensions are increasingly suppressed by progressive surveillance and control mechanisms that utilize the ICT technology and digital footprint of an individual. For some time now, a heated discussion follows the planned introduction of Social Credit System in the People’s Republic of China. Multitude of authors and journalists argue benefits or threats related to this project. The aim of this contribution is to provide sober-minded overview of this mechanism in its broader context and point out similarities and differences from approaches in the West. As a result, the contribution points out a set of specifics of the Chinese setting, which make similar mechanism unfeasible in European environment.
4
100%
The Lawyer Quarterly
|
2020
|
vol. 10
|
issue 4
476-498
EN
The new obligation to notify personal data breaches under Articles 33 and 34 of the General Data Protection Regulation 2016/679 can be seen as a reflection of the US regulatory approach to security breach incidents, which has an established tradition since the enactment of Security Breach Information Act in California in 2002. The contribution presents in two parts the relevant legal frameworks of the US and the EU, in order to provide a discussion on their similarities and differences. The aim is to identify available intellectual stimuli to the respective academic debate regarding interpretation, application and specification of the EU provisions based on inspiration from the US experience. The Part I introduces the reader to the concept of personal data breach and its relevance in nowadays digital society and then offers and introduction of the relevant US regulatory frameworks.
EN
In this article, we present the reasons for and the way of introducing bank identity in Czech law. Although the potential for increased use of electronic documents has been generally supported by the eIDAS Regulation, in particular the possibilities of using electronic identification have not yet been well exploited in the Czech Republic. Banking identity holds the promise of more fundamental change in this respect. Potential user benefits are associated in particular with the simplicity of setting up this electronic identity and its subsequent use. Nevertheless, there are certain pitfalls to be borne in mind. Our aim is to identify and analyse the problematic aspects of the functioning of the banking identity and to discuss how the described obstacles could be eliminated. In this direction, a technologically innovative solution of the so-called attribute authentication system and the possible benefits of its deployment in the context of identification services are also presented.
CS
V rámci tohoto článku přibližujeme důvody a způsob zavedení bankovní identity v českém právu. Přestože byl potenciál pro vyšší využívání elektronických dokumentů obecně podpořen nařízením eIDAS, zejména možnosti elektronické identifikace nebyly v České republice prozatím příliš vhodně využity. Bankovní identita v tomto směru přináší příslib zásadnější změny. Potenciální uživatelské výhody jsou spojovány zejména s jednoduchostí zřízení této elektronické identity a jejího následného užívání. Přesto je vhodné upozornit na jistá úskalí, která je nutno mít na zřeteli. Naším cílem je vytyčit a analyzovat problematické aspekty fungování bankovní identity a diskutovat, jak by šlo popsané překážky eliminovat. V tomto směru je přiblíženo též technologicky inovativní řešení tzv. systému atributové autentizace a možný přínos jeho nasazení v rámci identifikačních služeb.
EN
Growing importance of information technologies brings also the need for continuous updating of particular features of the mechanism of legal regulation. The purpose of such updates is to provide for stable efficiency of law. This text analyses two relatively new regulatory methods in cyberlaw based on performative rules and smart rules. The paper shortly explains these methods and demonstrates their use on examples from cybersecurity law, personal data protection and on-line resolution of consumer disputes.
CS
Rostoucí význam informačních technologií se mimo jiné projevuje i potřebou průběžně upravovat dílčí charakteristiky mechanismu právní regulace. Cílem takových úprav je zajištění stabilní efektivity práva. V tomto textu je proveden rozbor dvou relativně nových regulatorních metod, které se postupně prosazují v právu informačních technologií a jsou založeny na použití tzv. performativních a chytrých pravidel. Článek tyto metody krátce vysvětluje a následně jejich užití demonstruje na pozitivních i problémových příkladech z oborů kybernetické bezpečnosti, ochrany osobních údajů a on-line řešení spotřebitelských sporů.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.