Study of Cybersecurity Laws and Regulations
DOI:
https://doi.org/10.36676/ijl.v2.i3.27Keywords:
Cybersecurity, Laws, Regulations, landscapeAbstract
In the modern digital era, cybersecurity has become a crucial field due to the increase in cyberthreats and assaults, which pose serious hazards to people, businesses, and countries. To meet these changing difficulties, a wide range of national and international cybersecurity rules and regulations have been developed. This research paper explores a thorough analysis of these laws and regulations. The first section of the report gives an overview of the state of cybersecurity throughout the world, emphasising how frequently and how sophisticatedly cyber-attacks are becoming. After that, it takes a close look at the laws that control cybersecurity in both the public and private domains. The paper addresses the jurisdictional issues that emerge in the globally interconnected realm of cyberspace and investigates the fundamental ideas that support cybersecurity legislation, such as data protection, breach notification, and responsibility. Additionally, the study paper examines important cybersecurity laws from across the globe, such as the Cybersecurity Information Sharing Act of the United States, the California Consumer Privacy Act, and the General Data Protection Regulation (GDPR) of the European Union (CISA). The efficacy of these measures in protecting confidential data and reducing cyber risks is assessed.
References
Ashutosh. (2024). Cross-Border Data Flows and International Law: Navigating Jurisdictional Complexities in the Digital Age. Indian Journal of Law, 2(1), 15–23. https://doi.org/10.36676/ijl.v2.i1.03
Atomode, D (2024). OPTIMIZING ENERGY EFFICIENCY IN MECHANICAL SYSTEMS: INNOVATIONS AND APPLICATIONS, Journal of Emerging Technologies and Innovative Research (JETIR), 11 (5), 458-464.
Avinash Gaur. (2023). The Evolution of Privacy Laws in the Digital Age: Challenges and Solutions. International Journal for Research Publication and Seminar, 14(1), 352–360. Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/382
Avinash Gaur. (2024). Addressing Cybersecurity and Data Breach Regulations: A Global Perspective. Innovative Research Thoughts, 9(3), 157–163. Retrieved from https://irt.shodhsagar.com/index.php/j/article/view/743
Clarke, N. (2018). "The EU General Data Protection Regulation: How Will it Affect U.S. Healthcare Companies?" Journal of Law, Technology & the Internet, 9(2), 51-64.
Council of Europe. (2001). "Convention on Cybercrime (Budapest Convention)." https://www.coe.int/en/web/cybercrime/budapest-convention
Denning, D. E., & Denning, P. J. (2015). "Cybersecurity: The Role of States in National Cybersecurity." Georgetown Journal of International Affairs, 16(2), 42-49.
Dr. J.Thulasiraman. (2014). MASS MEDIA AND LEGAL CONTROL. International Journal for Research Publication and Seminar, 5(1), 112–116. Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/47
European Union Agency for Network and Information Security (ENISA). (2021). "EU Member State Cybersecurity Laws and Regulations." https://www.enisa.europa.eu/topics/national-cyber-security-strategies/ncss-map
Himanshu. (2024). Cybersecurity Law: Challenges and Legal Frameworks for Protecting Digital Assets and Privacy Rights. Indian Journal of Law, 2(2), 18–22. https://doi.org/10.36676/ijl.v2.i2.05
International Telecommunication Union (ITU). (2020). "Global Cybersecurity Index 2020." https://www.itu.int/en/ITU-D/Cybersecurity/Pages/Global-Cybersecurity-Index.aspx
Kanungo, S (2020). Enhancing Cloud Performance with Machine Learning: Intelligent Resource Allocation and Predictive Analytics. International Journal of Emerging Technologies and Innovative Research, 7(6), 32-38
Poonam Kundu, & Ranadip Mandal. (2016). A Review over Outdoor Advertisement And Hoardings and Principals for Road User Safety. International Journal for Research Publication and Seminar, 7(2). Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/771
Rawat, R. K. (2023). Protecting India’s Children: A Comprehensive Legal Examination. Universal Research Reports, 10(4), 157–162. Retrieved from https://urr.shodhsagar.com/index.php/j/article/view/1154
Raghuvanshi, T. (2023). Addressing Cybersecurity and Data Breach Regulations: A Global Perspective. Indian Journal of Law, 1(1), 71–79. https://doi.org/10.36676/ijl.2023-v1i1-09
Reecha. (2019). INDIA’S MEDIA FREEDOM: A LEGAL PERSPECTIVE. International Journal for Research Publication and Seminar, 10(1), 69–78. Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/1244
Rosenzweig, P., & Hershman, S. (2018). "The California Consumer Privacy Act: What You Need to Know." Washington Legal Foundation Legal Backgrounder, 33.
Sankeetha, K., & Singh, K. (2022). RIGHT TO INFORMATION IN INDIA. Universal Research Reports, 9(4), 154–164. Retrieved from https://urr.shodhsagar.com/index.php/j/article/view/1025
Singla, A. (2023). Corporate Governance and Legal Compliance in Indian Business Sector. Indian Journal of Law, 1(1), 1–7. https://doi.org/10.36676/ijl.2023-v1i1-01
Singla, A. (2024). The Evolving Landscape of Privacy Law: Balancing Digital Innovation and Individual Rights. Indian Journal of Law, 2(1), 1–6. https://doi.org/10.36676/ijl.v2.i1.01
Stone, K. (2016). "The Cybersecurity Information Sharing Act of 2015: The Good, The Bad, and The Unknown." Journal of National Security Law & Policy, 8(2), 403-432.
United Nations. (2021). "UN Open-Ended Working Group (OEWG) on Developments in the Field of Information and Telecommunications in the Context of International Security." https://www.un.org/disarmament/ict-security/oewg/