Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 5

first rewind previous Page / 1 next fast forward last

Search results

Search:
in the keywords:  information protection
help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
1
Publication available in full text mode
Content available

Normy prawne ochrony informacji

100%
Cywilizacja i Polityka
|
2022
|
vol. 20
|
issue 20
213-230
PL
Informacja jest ważnym elementem życia człowieka i towarzyszy mu w jego codziennym życiu. Od dawnych czasów przyczyniała się do rozwoju cywilizacji. Wraz z rozwojem technologii jej udział w życiu człowieka tylko się zwiększył. Dzięki współczesnym technologiom każdy człowiek ma prawie nieograniczony dostęp do informacji. Na przykład dzięki Internetowi informacja w mgnieniu oka może zostać przesłana z jednego miejsca na świecie do drugiego. Tak łatwy dostęp do informacji ułatwia podejmowanie decyzji biznesowych oraz życiowych. Jednak nie każda informacja wytworzona na przykład przez firmę lub instytucje państwową powinna być łatwo dostępna dla każdego. Spowodowało to konieczność stosowania środków ochrony informacji, które zapewnią jej bezpieczeństwo. Konieczność ochrony informacji doprowadziła do powstania norm prawnych, które regulują jej ochronę.
EN
Information is an important element of human life and accompanies him in his everyday life. It has contributed to the development of civilization since ancient times. With the development of technology, its share in human life has only increased. Thanks to modern technologies, everyone has almost unlimited access to information. For example, thanks to the Internet, information can be sent from one place in the world to another in the blink of an eye. Such easy access to information makes it easier to make business and life decisions. However, not every piece of information produced, for example, by a company or state institution, should be easily accessible to everyone. This resulted in the need to use information protection measures that will ensure its security. The need to protect information has led to the creation of legal standards that regulate its protection.
EN
Acquiring information that has an impact on a country's security, i.e. its independence, sovereignty and international position, by unauthorized persons, whether from another country's intelligence services or criminal groups, may have far-reaching consequences. Therefore, to preserve the stability of the state and give a sense of security to its citizens, the most important task and duty of the government is to protect them. This can be provided by an efficiently functioning system that will guarantee restrictions on access to classified information, its proper processing, as well as the use of appropriate and suffcient physical and ICT security measures. For this reason, this system requires at the state level precisely defined rules and norms based on the law, defining the principles of creating classified information, how to protect it and sanctions that can be applied in the event of non-compliance. The protection of information having a significant impact on the functioning of the Polish state in each period of its existence was an important element of defense and security policy. After regaining independence, the protection of state secrets took on special significance both for the country's existence and the foundations of its existence. It was realized that their disclosure could be fatal to its organization and functioning, as well as defense capabilities. The presented material presents the evolution of the protection of classified information in Poland, and its importance for the security and defense of the state by ensuring the effectiveness(concealing) of actions aimed at their implementation.
EN
The current publication presents selected risks resulting from the involvement of the human factor. In the opinion of the authors of the paper, it is the human inclination to make mistakes, commit breaches and abuses that can generate losses and damages caused by disclosure, modification, destruction or loss of corporate data. Theoretical considerations on the subject matter have been enriched by the results of conducted empirical research. They answer the following question: What categories of information security threats are associated with the human factor.
EN
The article investigates the evolutionary development of the information space and traces the historical stages of growth of information security problems. This distribution is based on the technological evolution of the types of media, which allowed to divide it into several periods. The first period is associated with the invention of writing and the advent of encryption and concealment. The second period is characterized by the emergence of the first technical means of information processing and the ability to store and transmit messages using media such as electrical signals and electromagnetic fields. The third period is determined by the introduction of automated information processing systems and is measured by a period of more than 40 years. The role of the information sphere in modern conditions is substantiated, it is established that the information turns into a national political and strategic resource of the states and acts as a criterion of maturity and development of the political system. The urgency of defining cybersecurity as one of the main components of the security policy of the Ukrainian state is emphasized.
PL
Scharakteryzowano akty prawne dotyczące ochrony informacji, obowiązujące przedsiębiorstwa. Przeprowadzono badania aktów prawnych celem określenia odpowiedzialności i obowiązków przedsiębiorców przetwarzających informacje chronione na podstawie przepisów prawa. Podjęto próbę określenia działań niezbędnych do zaimplementowania w przedsiębiorstwach dokumentacji dotyczą-cej ochrony informacji prawnie chronionych oraz próbę przedstawiania skutków dla przedsiębiorstwa spowodowanych niewłaściwą ochroną tych informacji.
EN
The author characterised the legal acts concerning information protection obligatory for enterprises. There were carried out surveys of legal acts to determine the responsibility and duties of the entrepreneurs processing information protected pursuant to the provisions of law. The author undertook an attempt to determine the actions indispensable for implementation at enterprises of the documentation concerning protection of legally protected information as well as an attempt to present the consequences for the enterprise caused by improper protection of that information.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.