Ensuring Information Security as a Guarantee of Human Rights

  • O’rinov Nodirbek Toxirjonovich Teacher, Department of Information Technology, Andijan State University
  • Ahmedov Husanboy Muhammadshukur o’g’li Student, Computer science teaching methods, Andijan State University
  • Mirabdullayev Izzatillo Isroiljon o’g’li Student, Computer science teaching methods, Andijan State University
Keywords: human rights, information security, legal principles, limitation of rights, security threats, privacy

Abstract

The article is devoted to the actual problem of information security and the rights ratio brow century. In Uzbekistan, the concept of "information security", as a rule, is revealed through "the state of protection of the vital interests of the individual, society and the state." In the US and the European Union, the definition of "information security" associated with the legal principles of confidentiality, integrity and availability of information and information si tems. Implementation of these principles allows to balance the interests of various participative Cove  legal relations, thus acting as a guarantee of human rights. The influence of modern technology is manifested primarily in the field of personal rights, among which the right to privacy occupies a special place. On the one hand, measures directly aimed at protecting this right act as guarantees of the right to privacy. On the other hand, when limiting the right to privacy, appropriate safeguards should prevent possible abuse. In addition to the principles of confidentiality, integrity and accessibility, specific legal principles have been developed to protect the right to privacy. The main mechanisms for protecting the right to privacy that are foundexpression in these principles are the consent of the personal data subject to the processing of personal data and his notification of such processing. At the same time, with the development of Internet technologies, these mechanisms turn out to be insufficient to respect the human right to privacy.

References

1. V.N. Lopatin Information security of Russia: dis ... Doctor of Law. sciences. M., 2003.433 p.
2. Polyakova T.A. Legal support of information security in building the information society in Russia: dis ... Dr. jurid. sciences. M., 2008.437 p.
3. Human rights: textbook for universities / otv. ed. E.A. Lukashev. M .: NORMA, 2001.573 p.
4. Sokolov M.S. Information security. On the question of the content of the concept of “information security” // Zakon i pravo. 2011. No. 5. P. 9–14.
5. Streltsov A.A. Theoretical and methodological foundations of legal support of information security in Russia: dis ... Doctor of Law. sciences. Moscow: RSL, 2005.371 p.
6. Shvetsova T.V. Information security, information security, information protection: the relationship of concepts // Bulletin of the Moscow University of the Ministry of Internal Affairs of Russia. 2007. No. 2. P. 43–45.
7. Cumbley R., Church P. Is "Big Data" Creepy? // Computer Law and Security Review. 2013. No. 29. P. 601-609.
8. Coudert F. When Video Cameras Watch and Screen: Privacy Implications of Pattern Recognition Technologies // Computer Law and Security Review. 2010. No. 26. P. 377–384.
9. Crounse S. The Fair Information Principles: A Comparison of US and Canadian Privacy Policy as Applied to the Private Sector. NY: Rochester Institute of Technology, UMI Dissertations Publishing, 2009.174 p.
10. Grama J. Legal Issues in Information Security. Sudbury: Jones and Bartlett Publishers, 2010.526 p.
11. Goncalves ME, Jesus IA Security policies and the weakening of personal data protection in the European Union // Computer Law and Security Review. 2013. No. 29. P. 255–263.
12. Information Security and Privacy: a Practical Guide for Global Executives, Lawyers and Technologists.
13. T. Shaw, ed. Chicago: American Bar Association, 2011. 395 p.
14. King NJ, Raja VT Protecting the Privacy and Security of Sensitive Customer Data in the Cloud // Computer Law and Security Review. 2012. No. 28. P. 308–319.
15. McDonald AM, Cranor LF The Cost of Reading Privacy Policies // Journal of Law and Policy for the Information Society. 2008. Vol. 4. P. 540-565.
16. Ryan P., Falvey S. Trust in the Clouds // Computer Law and Security Review. 2012. No. 28. P. 513–521.
17. Silver D. National Security and Transparency: The Legal Frameworks and Factors Federal Courts Use to Balance Competing Democratic Values. PhD Diss. Chapel Hill, 2009.313 p.
Published
2021-10-26
How to Cite
Toxirjonovich, O. N., o’g’li, A. H. M., & o’g’li, M. I. I. (2021). Ensuring Information Security as a Guarantee of Human Rights. CENTRAL ASIAN JOURNAL OF MATHEMATICAL THEORY AND COMPUTER SCIENCES, 2(10), 22-27. Retrieved from https://cajmtcs.centralasianstudies.org/index.php/CAJMTCS/article/view/112
Section
Articles