The problem of the protection of personal data in the context of information security issues is quite reasonable to consider. Information security is a category that applies to all matters of information relations, including States and non-States (legal persons, individuals, TNCs, non-governmental organizations, etc.). Information security of individuals refers to respect for their privacy in the field of information, protection against defamation, defamation, insults, psychological pressure, information terrorism, etc. Therefore, the legal issues of privacy in the field of information are part of the legal regulation of the security of the information of the individual. The Family Education Rights and Protection of Privacy Act (FERPA) regulates the dissemination of information about students. The provisions apply to information published on the Internet or on the Internet. Posting student materials, photos, or other personally identifiable information on a website is one of the most obvious issues addressed by federal and state data protection laws. Information terrorism can be defined as the use of information weapons to undermine the constitutional order of other States or the international legal order and international relations in general. The question of the implementation of the concept of ensuring international information security has already been taken into account in the research, although the concept itself has not been defined. Lloyd [14] took into account the actions of the United Nations, the Council of Europe, the OECD and the Asia-Pacific Community when it came to privacy issues, focusing mainly on non-binding laws. In an overview of cybercrime issues, this author gives a brief overview of the Council of Europe Convention on Cybercrime, the OECD Guidelines on the Security of Information Systems and EU legal acts. An institutional mechanism to ensure international information security has been established within the framework of the United Nations. States regularly provide their assessments of the state of information security, contained in the reports of the Secretary-General, which have contributed to a better understanding of the nature of international information security issues and related concepts.
The objective of the research is to examine the international concept of information security developed at the global and regional levels and the proposed formulation for the development of legal instruments for implementation in relation to the concept of the global information society. To this end, the analysis of the existing international information security system at the global and regional levels, a description and generalization of the results of the analysis will be carried out. For the analysis of existing international information security systems, formal-logical, systemic-structural and problematic-theoretical methods were used. At the same time, a comparative legal method is used to analyse the provision of information security at the global and regional levels. EUROPEAN COMMISSION Brussels, XXX C(2013) 8179/2 COMMISSION RECOMMENDATION of XXX on the right to legal aid of suspects or accused persons in criminal proceedings IN COMMISSION Recommendation of XXX Therefore, the concept of the information society requires a corresponding comprehensive approach to the international legal regulation of information exchange relations in the information society. Certain aspects of maintaining a website, such as accessibility, privacy, and copyright, may require compliance with federal laws or regulations. Whether you are working with external sources on website development and/or maintenance or managing the process internally, the agency should have guidelines in place to ensure that usability guidelines are followed. However, the United Nations General Assembly has expressed concern that new technologies and facilities that may enable the use of such technologies and means for purposes incompatible with the objectives of maintaining international stability and security could compromise the integrity of the infrastructure of States to the detriment of their security in the civil and military fields. 10 1. Introduction Security guards do not have special powers in South Africa. Security guards have the same powers as ordinary citizens. Security guards need to understand the legal framework within which they operate in order to protect themselves and the company they work for and to provide a service.
In this guide, we will give a general overview and, in some circumstances, a specific overview of what is expected of security guards when faced with certain situations. 2. Human rights Since 1994, there has been a change in the entire ethical and values system in South Africa. For example, the police have moved from a troop to a service. Bodies such as the Independent Complaints Directorate (CIM) have been established to investigate complaints against the police. In the security environment, the Private Security Industry Regulatory Authority (PSIRA) regulates the security industry. Human rights violations are investigated by psira. It is therefore clear how important psira is for its function as regulator of the private security industry, as private security companies and security officials cannot be subject to rules different from those of the SAPS or police officers. The purpose of the Bill of Rights is to protect the individual from abuse of state authority (including the police), and in some cases it imposes on the state the duty to grant citizens certain social and economic rights. It acts as a set of checks and balances that protect citizens from the abuse of state power and impose certain obligations Some examples of rights contained in the Bill of Rights that are relevant to the security services are: 1. The right to life (Article 11) 2.
the right to equality and equality before the law (§ 9) 3. the right to dignity (§ 10) 4. the right to liberty and security of the person (§ 12) 5. the right to privacy (§ 14) 6. the right to freedom of association (§ 18) and freedom of movement (§ 21) 7. the right of access to justice (§ 34) 8. the right to health care, food, water and social security (§ 27) 9. The right to a healthy environment (§ 24) The Constitution of the Republic of South Africa of 1996 (Act 108 of 1996) is the supreme law of our country Section 2 of the Constitution: Primacy of the Constitution This Constitution is the supreme law of the Republic; A law or conduct incompatible with it is invalid and the obligations it imposes must be fulfilled. The Constitution obliges every security guard to respect and protect the fundamental rights of every person in South Africa. The fundamental principle of human rights enshrined in the Constitution is based on international law. This international law is found in international conventions and treaties (these are treaty-like documents that are signed by different countries, including the South African government).
So that is the case; It is also important for security officials to be aware of basic international human rights standards for law enforcement. 10 The information security problems of natural and legal persons were examined in the context of the fundamental research on comparative information technology law of Bainbridge [1], Campbell [2], Rowland and Macdonald [3], Smedinghoff [4] and Black [5]. 13 That restriction should be justified in an open and democratic society based on human dignity, equality and freedom. This means that you should be able to justify your actions retrospectively in court. An open and democratic society means that police officers in other democratic societies will act in the same way in the same circumstances. You must always treat everyone with dignity and respect and you must not discriminate against anyone, no matter who he or she is. Remember that a person is presumed innocent until they are found guilty by a court. As regards points (a) to (e) of Article 36(1), the principle of proportionality should always apply. This means that any violation of the individual`s right to privacy must be proportionate (balanced) to the nature and gravity of the harm caused. There should therefore be a balance between the individual`s right to privacy and the extent of the breach. (For example, if you can summon a person J175 or J534 instead of arresting them, you should do so.
Nor is it necessary to arrest a person for minor offences) 3. Rights in the Bill of Rights The right to equality and equality before the law (Article 9) Everyone is equal before the law and has the right to equal protection and enjoys the law. Equality includes the full and equal enjoyment of all rights and freedoms. In order to promote the achievement of equality, legislative and other measures may be taken to protect or promote individuals or groups of persons disadvantaged by unjust discrimination. The State shall not unjustly discriminate against any person, directly or indirectly, on one or more grounds, including race, sex, sex, pregnancy, marital status, ethnic or social origin, skin colour, sexual orientation, age, disability, religion, conscience, belief, culture, language and birth. No person shall unjustly discriminate against a person, directly or indirectly, for one or more reasons within the meaning of subsection (3). National legislation must be adopted to prevent or prohibit unjust discrimination. Discrimination on one or more of the grounds listed in subsection (3) is unfair unless it is established that the discrimination is fair. The right to dignity (Article 10) Everyone has inherent dignity and the right to have his or her dignity respected and protected. The right to life (Article 11) Everyone has the right to life. The right to liberty and security of person (§ 12 ) ( 1 ) MEMBER STATES ENACT THE Everyone has the right to liberty and security of person, including the right. not be deprived of liberty arbitrarily or without valid reason; b.