Abstract

The article is devoted to highlighting the current problem of information law, the issue of the system of legal means of ensuring information security. The means of ensuring information security are considered - legal, organizational and technical. The main theoretical provisions regarding legal, organizational and technical means in the context of information security are highlighted; the problems in the researched field are assessed. The legal nature of general legal means of ensuring information security is based on: legislative consolidation of the conceptual apparatus regarding information security; formation of the system of legal support of information security. Information security in the specified aspect is considered as an object of legal protection, regarding the protection of legal rights and interests of the person, society and the state from destructive informational influence and protection of information from illegal transformations. Among the means of ensuring information security, the following are highlighted: forms or methods of recording information; official electronic publication, in particular publication, use of distributed ledger systems, in particular block chain technologies; conducting checks of information in the context of information security; presumption of information security regarding information security. This allows us to specify the directions of legal regulation in the field of information security. One of the legal means of ensuring information security is legal liability, which is provided for by criminal, administrative, civil law, and labor legislation. It is indicated that legal techniques are used to ensure information security: establishment of the right to reliable information; approval of a mandatory form or method of recording information as a means of ensuring information security; implementation of public recognition; monitoring and verification of information in the context of information security; application of the presumption of information protection regarding information security; establishment of legal responsibility.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call