In this “Information Age” where the technological innovation has enhanced so much that many aspects of the Internet and digital economy has emerged. Today these innovations have led to the development of Artificial Intelligence and Internet of Things. But this transformation in the lifestyle of the individuals has raised many questions as well. As and when the technology is upgrading its repercussions are also increasing, and it is the need of the hour to address the adverse effects of technology.
The Global Data Privacy, Data Protection and Human Rights Report, 2018 focuses on a wide range of issues as to how technology has over powered its users, and how it has made an everlasting impact on every individual’s life. The object of the report is to address “Privacy” and “Protection” which are key concerns in this digital age. New innovations and technological development made in this stint are all user centric. And safeguarding the rights of users is very necessary.
The report evaluates that the direct and indirect cost of losses incurred by the companies due to data breaches in 2017 amounts to 1.6 trillion USD. The report has evaluated total losses due to data breaches by taking various variables including – number of total data records lost in data breaches, probability of being attacked as per the type of industry, and calculated the financial impact on businesses due to a single data record breached.
The report explains the importance of integration among societal, legal and economic aspects of this information age. Along with that it has also explained, that governmental norms and policies play a major role to keep a check on discrepancies like breach of privacy that occur due to technological upgradation. The report has analysed that the word “Privacy” is mentioned in more than 80% of the world’s constitution directly and indirectly.
The report has included 9 countries along with European Union. From Asia it includes Israel, South Korea, China and India, from Eurasia it includes Russia. From Latin America it includes Brazil, from North America it has included Canada and United States of America and from Africa it has included South Africa.
According to the report, more than 35% internet users of EU are not capable of protecting and safeguarding their personal information such as their content on social media platforms, their geographical location and their browsing behaviour.
The problems related to data privacy and protection are not merely problems but it is the part of the journey that has been taken up with the advancement and evolution of technology. Each and every aspect of human life is now in some way or the other related to the internet. And human beings rely more on machines now rather than their own self. According to the report the total number of connected devices will reach up to 40 billion by 2020. The reliance on technology has proved to be heinous in a lot of ways.
Personal information and personal data are not only important to an individual but also for businesses and government. The global economy today runs on data with 3.6 billion GB data produced every day. It is the epicentre of the flow of transactions that occur every second. As per the report more than 52% of the cyber-attacks are targeted to public and health sector.
The scope of making this report is as vast as one can think. Amidst all these crucial important facets of technology, people have forgotten what cost will they have to pay if this technology backfires and create a persona that is harmful to the humankind. Yahoo Data Breach case in which more than 1 Billion data records were stolen, is one of the best examples that proves how technology has started to create a ruckus in this digital age.
Information, big data, Internet of things are terms that are most widely used whenever technological advancements and innovations are discussed. The main point to focus here is that how these data sets are collected and how is it being used. In a world where crime is something as common as breathing these questions often worry individuals, businesses, and government. From surveillance to privacy to protection and safeguarding of privacy all these clashes have evolved with time.
Technology will always be one step ahead of a human being and the gap needs to be bridged as soon as possible because more and more innovation can cause a very antagonistic environment globally.
Many developed and developing nations with 4 Billion internet users have shown concerns regarding the basic human right protection of individual’s privacy which is just a stepping stone in this field. In this technology-driven era, it is very hard to fill in the void between the legislatures and technology. Even though it is a herculean task, but still many economies are continuously working towards the protection of personal data by enacting various laws and rules which are further mentioned in the report.
1. Executive Summary
2. Scope and Approach
3. Definitions & Approach
Section 1 – Data the New Oil
4.1. An Era of Transition towards Data
4.2. Data Privacy & Smartphone Apps
4.3. Non-State Actors - Dark Web & Need for Data Protection
5. Governance & Enforcement
5.1. The Advent of Privacy
5.2. The Moral Hazard
Section 2 – The Peril of Connectedness
5.3. Economics of Data Losses
5.3.1. The Butterfly Effect
5.3.2. Data Breaches - Privacy infringement of businesses & Users
5.4. Data – An Asset under threat
5.4.1. Distribution of Cyber Attacks by Industry
5.4.2. Records lost & Compromised by Major Companies
5.5. Stock Market & Response to Data Breaches, Data Theft & Espionage
Section 3 – User Safety – A humane Need
6. Global Privacy Perception Index
6.1. Perception by Age Group, Sex & Internet Usage
6.1.1. Personal Information
6.1.2. Legal Rights
6.2. Perception by Region
6.2.1. North America
6.2.2. European Union
7. The User Response – Facebook & Cambridge Analytica
Section 4 – Jurisdictions & Governance on Data Privacy & Protection
8. Legal - International laws on Data Privacy
8.1.1. Universal Declaration of Human Rights,1948
8.1.2. UN guidelines for the regulation of Computerized Personal data files
8.1.3. international Covenant on Civil and Political Rights
8.2. Multinational Agreements on Data Privacy, Data Transfer & Data Protection
8.2.1. APEC Privacy Framework
8.2.2. OECD Privacy Framework
8.2.3. EU-US Privacy Shield
9. Brazil - Data its impact on Society & Governments Response
9.1. Legal Frameworks on Data Privacy & Data Protection in Brazil
9.2. Digital Transformation – Harnessing Data for Inclusion
9.3. Tipping Point – Surveillance from Global Power
10. Canada – Data its impact on Society & Governments Response
10.1. Legal Frameworks on Data Privacy & Data Protection in Canada
10.2. Digital Transformation – Politics & Social Media
10.3. Threat – Privacy infringement publicly
11. China - Data its impact on Society & Governments Response
11.1. Legal Frameworks on Data Privacy & Data Protection
11.2. Digital Transformation – The m-commerce Revolution
11.3. Threat – Breach of online behaviour, activity & private data
12. European Union - Data its impact on Society & Governments Response
12.1. Legal Frameworks on Data Privacy & Data Protection
12.2. Transformation – Health Services for an ageing population
12.3. Threat – The Right to be forgotten
13. India - Data its impact on Society & Governments Response
13.1. Legal Frameworks on Data Privacy & Data Protection
13.2. Digital Transformation – More Governance & less Government
13.3. Threat – Biometrics, Identities & access to data
14. Israel - Data its impact on Society & Governments Response
14.1. Legal Frameworks on Data Privacy & Data Protection
14.2. Digital Transformation – Cyber Security & Cyber Intelligence
14.3. Threat – The Power of External forces
15. Russian Federation - Data its impact on Society & Governments Response
15.1. Legal Frameworks on Data Privacy & Data Protection
15.2. Digital Transformation – Using Data to harness SMEs and mitigate Sanctions
15.3. Threat – Eyeing the blogger
16. South Africa - Data its impact on Society & Governments Response
16.1. Legal Frameworks on Data Privacy & Data Protection
16.2. Digital Transformation – Technology for Women Safety
16.3. Threat – Social Media & its impact on Family life
17. South Korea - Data its impact on Society & Governments Response
17.1. Legal Frameworks on Data Privacy & Data Protection
17.2. Digital Transformation – Chats, Messaging, Shopping & Apps
17.3. Threat – Data Breach of critical health information
18. United States - Data its impact on Society & Governments Response
18.1. Legal Frameworks on Data Privacy & Data Protection
18.2. Digital Transformation – Revolutionizing Transportation & Commute
18.3. Threat – Businesses in Target for consumer data
Section 5 – Insights for Sustainable Business Growth
19. Strategic Insights
19.1. The Indispensable Technology: Of the People, by the People & For the People
19.2. User: The Irreplaceable
19.3. Internet of Things, Smart Cities & Privacy
Multinational Agreements and Framework
United States of America
What do I do if I have a query on a specific product?
When you have found a product that you are interested in there is an option on the right-hand side to "Email Us". If you have any queries regarding content of this product you can contact our Customer Service Dept. by filling in this form with the relevant details and sending your inquiry. A member of our Customer Service Dept. will respond to you via our Customer Service System.
Please note that we are unable to answer questions related to markets or industry sectors, but only questions related to our site and the product for sale on our site.
How can I ensure I will receive R Strategics’ response to my correspondence?
Our Customer Service Department aim to respond to all queries sent through to us within 1 business day. If you do not receive our reply then most likely it is being blocked by a Spam filter or similar on your email program.
Where can I get a Proforma Invoice?
If you require a proforma invoice, you can generate this (along with an order form) from each product page on our website by clicking the "Request Proforma Invoice" option underneath the "Add to Basket" option at the right-hand side of the product page, and entering the requested details. Once generated, the proforma invoice and order form will be emailed to you. You can then complete and return the order form to place your order.