The Implications and Effects of Data Leaks
In the following article we will present how data theft can have serious effects on the personal life of citizens and users of certain applications, and in general on public institutions and countries. In the following we will find out how these data can end up in the hands of hackers, for what purpose they are used and what are the legal implications. In the end we will analyze how the authorities try to limit this phenomenon and how each of us can take protective measures for this purpose.
Information Commissioner’s Office ‘Personal data breaches’. Available at: https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-the-general-data-protection-regulation-gdpr/personal-data-breaches/.
Glossary ‘What Is a Data Leak? How They Happen and How To Prevent Them’ [Online] Available: https://abnormalsecurity.com/glossary/data-leak.
Wesley Chai and Linda Rosencrance, “What is a hacker“. May 2021 [Online]. Available: https://www.techtarget.com/searchsecurity/definition/hacker.
Ron Samson Jr. “Data Stealing; What Information is a Priority for Hackers?”. 2022 [Online]: https://www.clearnetwork.com/why-do-hackers-keep-stealing-the-same-consumer-data/.
International cybercrime. 20 June 2022. Wikipedia. Available at: https://en.wikipedia.org/wiki/International_cybercrime.
Intersoft consulting: https://gdpr-info.eu/.
The legal ramifications of a data breach: https://www.ironmountain.com/resources/general-articles/t/the-legal-ramifications-of-a-data- breach.
Clive Mackintosh, “Legal consequences of a cyber-attack”: Date: 9 March 2022. Available at: https://harperjames.co.uk/article/legal-consequences-of-a-cyber-attack/.
‘30 ways to love yourself online – A beginner‘s guide to Personal Data Privacy’. Available at: https://www.privacy.gov.ph/30-ways/.