A Global Perspective of Laws and Regulations Dealing with Information Security and Privacy

A Global Perspective of Laws and Regulations Dealing with Information Security and Privacy

B. Dawn Medlin (Appalachian State University, USA) and Charlie C. Chen (Appalachian State University, USA)
DOI: 10.4018/978-1-61520-975-0.ch009
OnDemand PDF Download:
No Current Special Offers


The price of privacy intrusion and security breaches is often due to the ubiquitous connectivity of networks.  National entities as well as other governing bodies have passed laws and regulations to assist individuals in their quest to protect their information as it is being transmitted as well as received over these networks.  An international perspective of information privacy and security laws and regulations can provide an insightful view concerning how each country differs as well as the important drivers for these differences. Policy makers can learn from the comparisons made in relation to similarity and/or differences of privacy and security laws as well.  In chapter 9, authors have selected different countries and regions around the world due to the growth of security and privacy threats that has grown over the past 10 years as well as their legislative practices.
Chapter Preview

Conceptual Formation

Different countries have adopted disparate approaches in their approach to the implementation of information privacy laws and regulations. The U.S. delegated states to enact their own information privacy rules while the European Union attempted to enforce a common standard to regulate privacy across member countries. Australia adopted the third perspective of legalizing privacy laws and regulations at the Commonwealth and industry levels. Industry-specific privacy regulations supersede the jurisdiction of the Commonwealth’s when coming to industrial relations. Unlike these three continents, Asia has largely ignored the importance of personal privacy, but has emphasized group interests over individual interests.

Complete Chapter List

Search this Book: