top of page

Cybersecurity And Data Protection: A Contraposition




Riddhima Agarwal & Tanvi Pandey, B.A.LL.B, Jamnalal Bajaj School of Legal Studies, Banasthali Vidyapith, Rajasthan, India


ABSTRACT


As the old saying goes, necessity has always been the mother of invention, with the emerging need for technology its scope has become immeasurable but simultaneous to that so have the nefarious realities of Information technology escalated. In recent times both large and small organizations have been victimized by data breaches, when any institution faces a data breach not only are they at a loss of productivity and credibility but also undergo a huge financial deficit to recover from them. On an encyclopedic level cyber-terrorism, ransomware-attack, breach of privacy issues, lawless government surveillance, non-consensual personal data-tracking including health status by corporations and cyber-crime have become prevalent realities. Analogous to these circumstances the requisite of cyber-security and data protection laws becomes indispensable. Through the medium of this paper, we have explored the fundamentals of cybersecurity and data protection also the acute need for the data protection act and cybersecurity laws into the bargain to protect one from exploitation and leveraging of compromised data. Furthermore, it elucidates the standing of cybersecurity and data protection laws in the future and what can be expected from it. The right to privacy is a fundamental right and it must be protected by the judicature, if not the government.

Comments


Indian Journal of Law and Legal Research

Abbreviation: IJLLR

ISSN: 2582-8878

Website: www.ijllr.com

Accessibility: Open Access

License: Creative Commons 4.0

Submit Manuscript: Click here

Open Access Logo

Licensing:

​All research articles published in The Indian Journal of Law and Legal Research are fully open access. i.e. immediately freely available to read, download and share. Articles are published under the terms of a Creative Commons license which permits use, distribution and reproduction in any medium, provided the original work is properly cited.

Disclaimer:

The opinions expressed in this publication are those of the authors. They do not purport to reflect the opinions or views of the IJLLR or its members. The designations employed in this publication and the presentation of material therein do not imply the expression of any opinion whatsoever on the part of the IJLLR.

bottom of page