"Beyond Compliance: Crafting A Holistic Approach To Data Privacy In The Modern Age”

Main Article Content

Dr. Abhishek Kumar Singh
Akshaya Kishor

Abstract

Data privacy and protection are becoming more than just legal requirements; they are becoming a comprehensive strategy that is necessary to successfully navigate the challenges of the contemporary world. In order to maintain long-term viability and foster stakeholder trust, organisations need to go above and beyond the requirements of regulations in protecting sensitive information.Developing an awareness culture within the workforce, incorporating strong security protocols, and adopting innovative technologies such as encryption and anonymization are all essential components of an all-encompassing data privacy plan. Encouraging user confidence through transparent data practices can help an organisation reaffirm its commitment to information ethics.In addition, the constantly changing environment necessitates constant adjustment to new risks and modifications to laws. Every step of the data processing process, from collection to disposal, must take privacy into account when privacy by design principles are put into practice.Essentially, an all-encompassing strategy for data privacy goes beyond compliance checklists and integrates itself into the core principles and functions of the company. In the digital age, firms which take this approach not only reduce risks but also establish themselves as responsible data stewards.


 

Downloads

Download data is not yet available.

Article Details

How to Cite
Dr. Abhishek Kumar Singh, & Akshaya Kishor. (2024). "Beyond Compliance: Crafting A Holistic Approach To Data Privacy In The Modern Age”. Journal of Advanced Zoology, 45(1), 1030–1035. https://doi.org/10.53555/jaz.v45i1.3577
Section
Articles
Author Biographies

Dr. Abhishek Kumar Singh

Associate Professor, Faculty of Law, Integral University, Dasauli, Lucknow 226026

Akshaya Kishor

Assistant Professor, Faculty of Law, Manipal University, Jaipur

References

Abomhara, M., & Koien, G. M. (2014, May). Security and privacy in the Internet of Things: Current status and open issues. In 2014 international conference on privacy and security in mobile systems (PRISMS) (pp. 1-8). IEEE.

Abouelmehdi, K., Beni-Hessane, A., & Khaloufi, H. (2018). Big healthcare data: preserving security and privacy. Journal of big data, 5(1), 1-18.

Bhimani, A., & Willcocks, L. (2014). Digitisation,‘Big Data’and the transformation of accounting information. Accounting and business research, 44(4), 469-490.

De Montjoye, Y. A., Shmueli, E., Wang, S. S., & Pentland, A. S. (2014). openpds: Protecting the privacy of metadata through safeanswers. PloS one, 9(7), e98790.

Frustaci, M., Pace, P., Aloi, G., & Fortino, G. (2017). Evaluating critical security issues of the IoT world: Present and future challenges. IEEE Internet of things journal, 5(4), 2483-2495.

Gharaibeh, A., Salahuddin, M. A., Hussini, S. J., Khreishah, A., Khalil, I., Guizani, M., & Al-Fuqaha, A. (2017). Smart cities: A survey on data management, security, and enabling technologies. IEEE Communications Surveys & Tutorials, 19(4), 2456-2501.

Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information systems, 47, 98-115.

Hilbert, M. (2016). Big data for development: A review of promises and challenges. Development Policy Review, 34(1), 135-174.

Jain, P., Gyanchandani, M., & Khare, N. (2016). Big data privacy: a technological perspective and review. Journal of Big Data, 3, 1-25.

Kumar, S., Tiwari, P., & Zymbler, M. (2019). Internet of Things is a revolutionary approach for future technology enhancement: a review. Journal of Big data, 6(1), 1-21.

Martin, K. D., & Murphy, P. E. (2017). The role of data privacy in marketing. Journal of the Academy of Marketing Science, 45, 135-155.

Price, W. N., & Cohen, I. G. (2019). Privacy in the age of medical big data. Nature medicine, 25(1), 37-43.

Rose, K., Eldridge, S., & Chapin, L. (2015). The internet of things: An overview. The internet society (ISOC), 80, 1-50.

Salman, T., Zolanvari, M., Erbad, A., Jain, R., & Samaka, M. (2018). Security services using blockchains: A state of the art survey. IEEE communications surveys & tutorials, 21(1), 858-880.

Sun, Y., Zhang, J., Xiong, Y., & Zhu, G. (2014). Data security and privacy in cloud computing. International Journal of Distributed Sensor Networks, 10(7), 190903.

Verma, S., & Bhattacharyya, S. S. (2017). Perceived strategic value-based adoption of Big Data Analytics in emerging economy: A qualitative approach for Indian firms. Journal of Enterprise Information Management, 30(3), 354-382.

West, S. M. (2019). Data capitalism: Redefining the logics of surveillance and privacy. Business & society, 58(1), 20-41.

Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in Internet-of-Things. IEEE Internet of things Journal, 4(5), 1250-1258.