Read this quarter’s Intermedia here
Emerging and evolving technologies put pressure on governmental regulators to safeguard cybersecurity. Where cybersecurity breaches involve the theft and/or release of personal data for potentially nefarious purposes, privacy policies offer a means of mitigating the amount of data collected and held that could be at risk in a breach. Policymakers have various regulatory options at their disposal such as privacy regulations, international and national alliances and forums, and cybersecurity by design and by default guidelines. This paper draws on primary and secondary documents and articles and uses a systems mapping approach to identify the complexity of cybersecurity and data security to ensure a robust security environment amongst countries.
DownloadTop 10 finalist - IIC 2023 Future Leaders Competition
You are seeing this because you are using a browser that is not supported. The International Institute of Communications website is built using modern technology and standards. We recommend upgrading your browser with one of the following to properly view our website:
Windows MacPlease note that this is not an exhaustive list of browsers. We also do not intend to recommend a particular manufacturer's browser over another's; only to suggest upgrading to a browser version that is compliant with current standards to give you the best and most secure browsing experience.