REFERENCES Algarni, A.M., Malaiya, Y.K., 2016. A Consolidated Approach for Estimation of Data Security Breach Costs . Proceedings of 2016 2nd International Conference on Information Management (ICIM2016), IEEE. Ando, R., Shima, S., Takemura, T., 2016. Analysis of Privacy and Security Affecting the Intention of Use in PersonalData Collection in an IoT Environment . IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, Volume E 99D, Issue 8, 1974-1981. DOI: 10.1587/transinf.2015INI0002 Bishop, M., 2003. What is computer security ? IEEE Security and Privacy, Volume 1
.do?uri=CELEX:32000D0520:EN:HTML, 2000.  Clint Gibler, Jonathan Crussell, Jeremy Erickson, and Hao Chen. AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale. Springer, 2012.  Google. Monkey Tool. http://developer.android.com/tools/ help/monkey.html, 2015.  Ben Gruver. Smali/Baksmali Tool. https://github.com/JesusFreke/smali/wiki, 2015.  Dominik Herrmann and Jens Lindemann. Obtaining personaldata and asking for erasure: Do app vendors and website owners honour your privacy rights? CoRR, abs/1602.01804, 2016. [24
The article highlights the importance of information and the need to manage its security. The importance of information requires a systemic approach, which is why the standards of conduct for managing information security have been approximated. The results of research on information security management in the field of personal data protection have been presented. The research was carried out on a sample of 110 enterprises. The survey was extended to include an analysis of one of the companies subject to the survey. In the following, the case study regarding the production enterprise was also presented.
Do you remember the times when the copyright or a patent had no economic value? Neither do I, because this happened more than 300 years ago when the printing activity took place completely free. It was the eighteenth century, when France, England, Germany and the United Kingdom realized that the author was pretty important for the state and the first regulations appeared. Exactly like the intellectual property, in the new era of technology, dynamic change and growing e-commerce, the data with personal character is the newest economic good. More and more studies and journals show that in the near future the personal information will also have an economic value since databases are so important for businesses, but also for other institutions like the police or even intelligence agencies. The current article is the first in a row of a complex research regarding the importance of the personal data in the current economy and its actual value in an organization. Further studies will be needed in order to conclude and create a model for measuring the value of personal data. This first step is a research and a detailed analysis of the current status-quo. The changes that appeared after the entry of the European directives regarding General Data Protection Regulation will be analyzed. Another significant section of the article is a close review of the personal data black market. In order to submit this aspect as clear and objective as possible, further research on the dark internet (Onion) was conducted and prices for clones of credit cards, Amazon or PayPal accounts and cloned personal documents were examined and charted.
References LEGAL SOURCES : The Council of Europe’s Treaty no. 108 – the Convention for the Protection of Individuals with regard to Automatic Processing of PersonalData, [Dz.U. z 2003 r. Nr 3, poz. 25 / J.L. of 2003, no. 3, item 25]. Konstytucja Rzeczypospolitej Polskiej z dnia 2 kwietnia 1997 r., Dz. U. z 1997 r. Nr 78, poz. 483 [The Constitution of the Republic of Poland, J.L. of 1997, No. 78, item 483]. The Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of
References Abdulrauf, L. A., & Fombad, C. M. (2017). Personaldata protection in Nigeria: Reflections on opportunities, options and challenges to legal reforms. The Liverpool Law Review , 38(2), 105-134. doi:10.1007/s10991-016-9189-8 Carugati, C. (2018). The 2017 Facebook saga: a competition, consumer and data protection story. European Competition and Regulatory Law Review , 2(1), 4-10. doi:10.21552/core/2018/1/4. Crabtree, A., Lodge, T., Colley, J., Greenhalgh, C., Mortier, R., & Haddadi, H. (2016). Enabling the new economic actor: Data protection, the
The article presents results of research on the information flow between the client and the company, inside the company, and the problems encountered by both parties in the data exchange process. Also included are methods of securing information through unauthorized disclosure, disclosing ideas to other clients. The basis of the study was a survey directed to 75 customers ordering in the examined enterprise and a survey among 40 employees of that enterprise. The study was also based on an in-depth conversation with employees of the examined company employed at various levels. The survey shows that the clients and employees of the surveyed company are aware of the high value of information, and its security is considered one of the priorities. The survey clearly shows that customers praise data protection activities, they treat it as an element used to care for the interests of the customer, as a further environment of the product or service they purchase. However, there are often errors due to customer ignorance, communication problems, and lack of knowledge of employees. The study covered the importance of information in an enterprise as part of its competitive advantage, the reasons for investing in information protection, the occurrence of incidents, the degree of information security, and actions taken to protect information in an enterprise.
References 1. “An international survey of privacy laws and developments. Privacy & Human Rights 2002” // http://www.privacyinternational.org/survey/phr2002/phr2002-part1.pdf (accessed April 29, 2011). 2. Civilka, Mindaugas. Asmens duomenų apsauga Tarptautinėje ir EB teisėje(The protection of personaldata in the international and EU law) . Vilnius: Vilniaus universiteto Teisės fakultetas, 2001 // http://www.teisininkas.lt/downloads/ADA_1.12.pdf (accessed April 20, 2011). 3. Jočienė, Danutė, and Kęstutis Čilinskas. Žmogaus teisių apsaugos problemostarptautinėje
References European Parliament. (2016). Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personaldata and on the free movement of such data, and repealing Directive 95/46/EC (General Da. Official Journal of the European Union , 59 , 1–88. Retrieved from https://eur-lex.europa.eu/eli/reg/2016/679/oj Information privacy law. (2019). Retrieved from https://en.wikipedia.org/wiki/Information_privacy_law Malgieri, G., & Custers, B. (2018). Pricing privacy
-89).  Komisja Europejska: Wniosek Rozporządzenie Parlamentu Europejskiego i Rady w sprawie ochrony osób fizycznych w związku z przetwarzaniem danych osobowych i swobodnym przepływem takich danych (ogólne rozporządzenie o ochronie danych) COM(2012) 11 final 2012/0011 (COD).  IATA Recommended Practice 1774 - Protection of privacy and transborder data flows of personaldata used in international air transport of passengers and cargo (IATA RP 1774), 2012, IATA Passenger Services Conference Resolutions Manual, 32nd Edition.  WP 49 Working Document on IATA