Access to Information in the Republic of Macedonia: Between Transparency and Secrecy

Access to Information in the Republic of Macedonia: Between Transparency and Secrecy

Stojan Slaveski, Biljana Popovska
Copyright: © 2019 |Pages: 19
DOI: 10.4018/978-1-5225-7912-0.ch036
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Certain information and personal data, held by the government, needs to be kept secret because its disclosure to the general public could jeopardize the operation of the state. On the other hand, the state should allow the public to have free access to all other state-held information. To ensure a balance between these two claims of modern democratic societies, there is a need to legally regulate this matter. The state should have a law on access to public information and a law that will regulate the classification, access to and storage of information which should be kept secret. This chapter analyzes the global experiences in regulating this matter, with a particular emphasis on the practice in the Republic of Macedonia.
Chapter Preview
Top

Critical Infrastructure Versus Critical Information Infrastructure

Critical infrastructure (CI) and critical information infrastructure protection have been a focus of attention in many countries in recent years. Many developed countries generally define their critical infrastructure in terms of the criticality of particular sectors or services to the safety and security of their society, government and economy. While countries widely use the term “critical infrastructure”, the term “critical information infrastructure” is less common in national policies, strategies and structures. However, “critical information infrastructure” has emerged as a somewhat neutral and general term in the international community although no formal attempt has been made to reach a common definition or understanding. The diversity of input across the different countries does not allow us for a single common formal definition. Most of the countries have formulated policy and developed good practices to safeguard the information systems and networks that can be considered as critical information infrastructure. However, there are different approaches to the problem (Auerswald, Branscomb, Porte, & Michel-Kerjan, 2005).

Complete Chapter List

Search this Book:
Reset