Human and Civil Rights Guarantees While Providing Information Security

Serhii Yesimov, Rostyslav Sopilnyk, Myroslav Kovaliv, Ruslan Skrynkovskyy

Abstract

With the development of information and communication technologies, issues of providing information security are becoming more and more aggravated. These are crimes related to the use of electronic computers, systems and computer networks and telecommunication networks, the propaganda of separatism and extremism, etc.

While providing information security in the digital environment, the role of technical and legal human rights guarantees, due to technical means of protection, is increasing. Relying on the developers of technical means of protection determines the difference between the aforesaid concepts and the traditional approach to ensuring the protection of human and citizen rights, in which responsibilities are put on information intermediaries, owners of confidential information.

Technical guarantees of human rights are a necessary component of ensuring information security, but the effectiveness of the application is provided in conjunction with the legal guarantees of human rights, as evidenced by the tendency to recognize the principles of inviolability of privacy on the basis of design decisions in the law of the European Union as legal acts.

Providing information security is a legitimate goal of establishing constraints of human rights, since it can be correlated with the norms of international law. The establishment of constraints of human rights is permissible in order to attain other objectives–ensuring state security, public order, health, rights and freedoms of the person in the information sphere. The legitimacy of this goal is determined by its compliance with the objectives envisaged by international agreements ratified in an established order.

The article examines the impact of the use of technical means in the field of providing information security in the aspect of following the fundamental human and civil rights in Ukraine, taking into account the legislation of the European Union and the decision of the European Court of Justice. The comparative and legal analysis of various factors influencing the restriction of information rights of people in the digital environment is carried out. Legal guarantees from the point of view of the concept of privacy and security due to design decisions, taking into account the role and characteristics of technical primus are revealed.

 




Keywords


human and civil rights; informational security; application of technical means; legal guarantees



References


1. Nashynets-Naumova, A. Yu. (2017). Informatsiina bezpeka: pytannia pravovoho rehuliuvannia [Information security: issues of legal regulation]. Kyiv: Helvetyka (in Ukrainian)
[Нашинець-Наумова, А. Ю. (2017). Інформаційна безпека: питання правового регулювання. Київ: Гельветика].

[Google Scholar]

2. Voron, M. (2016). Prava liudyny v Interneti [Human rights on the Internet]. Retrieved April 1, 2018, from http://nmcio.ippo.kubg.edu.ua/?p=2213 (in Ukrainian)
[Ворон, М. (2016). Права людини в Інтернеті. Актуально на 01.04.2018. URL: http://nmcio.ippo.kubg.edu.ua/?p=2213].

3. Tarasenko, L. L. (n. d.). Tsyfrove seredovyshche yak mistse zdiisnennia prav intelektualnoi vlasnosti [The digital environment as a place of realization of intellectual property rights]. Retrieved April 1, 2018, from https://goo.gl/HYymYb (in Ukrainian)
[Тарасенко, Л. Л. (н. д.). Цифрове середовище як місце здійснення прав інтелектуальної власності. Актуально на 01.04.2018. URL: https://goo.gl/HYymYb].

[Google Scholar]

4. Pavlysh, V. A., & Holinenko, L. K. (2013). Osnovy informatsiinykh tekhnolohii i system [Fundamentals of Information Technology and Systems]. Lviv: Lvivcka politekhnika (in Ukrainian)
[Павлиш, В. А., & Голіненко, Л. К. (2013). Основи інформаційних технологій і систем. Львів: Львівcькa політехнікa].

[Google Scholar]

5. Kharytonova, O. I., Ulianova, H. O., Kyryliuk, A. V., Symonian, Yu. Yu., Baadzhy, N. P., Pozova, D. D. …, Martyniuk, I. V. (2015). Problemni pytannia vyznachennia pravovoi pryrody i struktury pravovidnosyn intelektualnoi vlasnosti, shcho vynykaiut u merezhi Internet [Problematic issues of determining the legal nature and structure of intellectual property rights arising in the Internet]. Naukovi pratsi NU OIuA, 159–200 (in Ukrainian)
[Харитонова, О. І., Ульянова, Г. О., Кирилюк, А. В., Симонян, Ю. Ю., Бааджи, Н. П., Позова, Д. Д. …, Мартинюк, І. В. (2015). Проблемні питання визначення правової природи і структури правовідносин інтелектуальної власності, що виникають у мережі Інтернет. Наукові праці НУ ОЮА, 159–200].

[Google Scholar]

6. Privacy by Design Centre of Excellence. (n. d.). The Seven Foundational Principles. Retrieved April 1, 2018, from https://goo.gl/ofgwa6

7. The Open Web Application Security Project (OWASP). (2016). Security by Design Principles. Retrieved April 1, 2018, from https://www.owasp.org/index.php/Security_by_Design_Principles

8. Rubinstein, I., & Good, N. (2012). Privacy by Design: A Counterfactual Analysis of Google and Facebook Privacy Incidents. SSRN Electronic Journal. doi: 10.2139/ssrn.2128146

[Google Scholar] [CrossRef]

9. Repetskyi, V. M., & Hutnyk, V. V. (Ed.) (2017). Suchasni problemy mizhnarodnoho prava. Liber Amicorum do 60-richchia prof. M. V. Buromenskoho [Current problemsof international law. Liber Amicorum Professor Mykhaylo Buromenskiy in Honour of His 60th Birthday]. Lviv, Odesa: Feniks (in Ukrainian)
[Репецький, В. М., & Гутник, В. В. (Ред.) (2017). Сучасні проблеми міжнародного права. Liber Amicorum до 60-річчя проф. М. В. Буроменського. Львів, Одеса: Фенікс].

10. Rishennia Konstytutsiinoho Sudu Ukrainy [Decision of the Constitutional Court of Ukraine] (Ukraine), 01 June 2016, No 2-рп/2016. Retrieved April 1, 2018, from http://zakon2.rada.gov.ua/laws/show/v002p710-16 (in Ukrainian)
[Рішення Конституційного Суду України (Україна), 01 червня 2016, № 2-рп/2016. Актуально на 01.04.2018. URL: http://zakon2.rada.gov.ua/laws/show/v002p710-16].

11. Barak, A. (2012). Proportionality: Constitutional rights and their limitations. New York: Cambridge University Press.

[Google Scholar]

12. Class and Others v. Germany (Council of Europe, European Court of Human Rights), 06 September 1978. Retrieved April 1, 2018, from http://zakon5.rada.gov.ua/laws/show/980_093 (in Ukrainian)
[Класс та інші проти Німеччини (Рада Європи, Європейський Суд з прав людини), 06 вересня 1978. Актуально на 01.04.2018. URL: http://zakon5.rada.gov.ua/laws/show/980_093].

13. Bryzhko, V. M. (2016). Suchasni osnovy zakhystu personalnykh danykh v yevropeiskykh pravovykh aktakh [Modern bases of protection of personal data in European legal acts]. Informatsiia i pravo, 3(18), 45–57 (in Ukrainian)
[Брижко, В. М. (2016). Сучасні основи захисту персональних даних в європейських правових актах. Інформація і право, 3(18), 45–57].

14. European Commission. (2017). EU – U.S. Privacy Shield – First annual Joint Review. Retrieved April 1, 2018, from https://www.huntonprivacyblog.com/wp-content/uploads/sites/28/2017/12/WP-29-Privacy-Shield-Opinion.pdf


Article Metrics

Metrics Loading ...

Metrics powered by PLOS ALM

Refbacks

  • There are currently no refbacks.




Copyright (c) 2018 Serhii Yesimov, Rostyslav Sopilnyk, Myroslav Kovaliv, Ruslan Skrynkovskyy

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.