Protecting the communication: Data protection and security measures under telecommunications regulations in the digital age

被引:8
作者
Gurkaynak, Gonenc [1 ]
Yilmaz, Ilay [1 ]
Taskiran, Nazli Pinar [1 ]
机构
[1] ELIG Attorneys At Law, Istanbul, Turkey
关键词
Telecommunication; Security; Cyber security; Data protection; Privacy; EU; Turkey;
D O I
10.1016/j.clsr.2014.01.010
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
This paper aims to provide a comparative overview and evaluation of various legal frameworks for electronic communications security in light of the recent developments in the electronic communications sector. The article also includes an insight on European Union and Turkish legal environment for data protection security in electronic communications sector. The dynamic and ever-changing nature of electronic communication technologies brings brand new opportunities for quick access to extensive information and communication through integrated channels. On the other hand such dynamic nature paves the way for new challenges and concerns regarding electronic communications security. Both national and international sector regulators and policy-makers are encountering new threats for security of electronic communications while trying to adapt to convergence and the, ongoing tendency for Internet Protocol ("IP") based digital networks.(1) Various legal frameworks come into force accordingly and legal security measures are created by the regulators and the sector actors, in order to overcome security concerns. Evolution of electronic communication technologies and new challenges that it yields, forces national and international authorities to work for unified solutions and cooperation in fighting against these challenges. (C) 2014 ELIG Attorneys-at-Law, Istanbul, Turkey. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:179 / 189
页数:11
相关论文
共 18 条
[1]  
[Anonymous], 177992005 ISOIEC
[2]  
[Anonymous], OFC ANN PLAN 2013 14
[3]  
[Anonymous], 270012005 ISOIEC
[4]  
Cayci A. D., 2009, CONVERGENCE INFORM C
[5]  
Dekker M., 2013, Annual Incident Reports 2012
[6]  
Gelbstein, 2011, ISACA J, V6
[7]  
Gladman B., 1998, CYBER CRIME INFORM T
[8]  
Hogan & Hartson LLP and Analysys Consulting Ltd, 2006, PREP NEXT STEPS REG
[9]  
Jay R., 2012, DATA PROTECTION LAW, V7-02, P302
[10]  
Jay Rosemary, 2012, DATA PROTECTION LAW, V7-01, P301