Abstract
These days it is common to hear public employees threaten privacy in the name of “Procedure Established by Law” or “Public Duty,” two concepts that are perhaps the most important to human life on this planet. Let's imagine for a moment what a person would be like without privacy rights, which include all of the private rights associated with family, employment, relationships, etc. Simply said, privacy is essential to human health and is the means by which a tranquil existence with dignity and freedom is genuinely guaranteed. With the rise in social media use and the gradual digitalization of our country, it is fair to say that we are in a “Cyber Era”. Data protection and privacy are inextricably interwoven, and they now occupy a highly important and delicate area in the legal system. In order to acquire material and further refine it into a precise piece of information, the review paper uses secondary sources. It is reviewed using the analogical technique of research. Cyber security is a crucial modern-era prerequisite for a safe digital and cyber ecosystem. Since most business processes now take place online, data and resources are at risk from various cyber threats. Since data and system resources serve as the bedrock of the organization, any threat to these components automatically poses a hazard to the organization as a whole.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bertino E (2016) Data security and privacy: concepts, approaches, and research directions. In: 2016 IEEE 40th annual computer software and applications conference (COMPSAC), pp 400–407. https://doi.org/10.1109/COMPSAC.2016.89
Panjwani M, Jäntti M (2017) Data protection & security challenges in digital & it services: a case study. In: International conference on computer and applications (ICCA), pp 379–383. https://doi.org/10.1109/COMAPP.2017.8079790
Khandare A, Pawar R (2021) Data Clustering Algorithms: Experimentation and Comparison. In: Intelligent computing and networking: proceedings of IC-ICN 2022, pp 86–99
Albugmi A, Alassafi MO, Walters R, Wills G (2016) Data security in cloud computing. In: Fifth international conference on future generation communication technologies (FGCT), pp 55–59. https://doi.org/10.1109/FGCT.2016.7605062
Ring M, Wunderlich S, Scheuring D, Landes D, Hotho A (2019) A survey of network-based intrusion detection data sets, Comput Secur 86:147–167, ISSN 0167-4048, https://doi.org/10.1016/j.cose.2019.06.005
Fernandes DAB, Soares LFB, Gomes JV et al (2014) Security issues in cloud environments: a survey. Int J Inf Secur 13:113–170. https://doi.org/10.1007/s10207-013-0208-7
Shrikant K, Gupta V, Khandare A, Furia P (2022) A comparative study of clustering algorithm. In: Intelligent computing and networking: proceedings of IC-ICN 2021, pp 219–235. Springer Nature Singapore, Singapore
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Ethics declarations
Conflict of Interest
The researchers confirm that no commercial or financial ties that might be seen as a potential conflict of interest existed during the course of the research.
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Khandare, S.V., Herlekar, V.P., Hanwate, V.S., Shirale, G.M., Sirbhate, D.D. (2023). A Global Overview of Data Security, Safety, Corporate Data Privacy, and Data Protection. In: Balas, V.E., Semwal, V.B., Khandare, A. (eds) Intelligent Computing and Networking. IC-ICN 2023. Lecture Notes in Networks and Systems, vol 699. Springer, Singapore. https://doi.org/10.1007/978-981-99-3177-4_32
Download citation
DOI: https://doi.org/10.1007/978-981-99-3177-4_32
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-3176-7
Online ISBN: 978-981-99-3177-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)