Emerging and evolving technologies put pressure on governmental regulators to safeguard cybersecurity. Where cybersecurity breaches involve the theft and/or release of personal data for potentially nefarious purposes, privacy policies offer a means of mitigating the amount of data collected and held that could be at risk in a breach. Policymakers have various regulatory options at their disposal such as privacy regulations, international and national alliances and forums, and cybersecurity by design and by default guidelines. This paper draws on primary and secondary documents and articles and uses a systems mapping approach to identify the complexity of cybersecurity and data security to ensure a robust security environment amongst countries.Download
Top 10 finalist - IIC 2023 Future Leaders Competition
We give innovators and regulators a forum in which to explore, debate and agree the best policies and regulatory frameworks for widest societal benefit.
Insight: Exchange: Influence
We give members a voice through conferences, symposiums and private meetings, as well as broad exposure of their differing viewpoints through articles, reports and interviews.
The new website will make it easier for you to gather fresh insights, exchange views with others and have a voice in the debateTake a look Learn more about our updates
You are seeing this because you are using a browser that is not supported. The International Institute of Communications website is built using modern technology and standards. We recommend upgrading your browser with one of the following to properly view our website:Windows
Please note that this is not an exhaustive list of browsers. We also do not intend to recommend a particular manufacturer's browser over another's; only to suggest upgrading to a browser version that is compliant with current standards to give you the best and most secure browsing experience.