Russian New Personal Data Regulations: A Step Forward or a Self-Imposed Sanction?
The paper represents one of the first comprehensive analyses of Russian personal data localization regulations, which became effective at September 1, 2015. This work describes in details the main components of the data localization mechanism: triggers of its application, scope, exemptions and enforcement. It also takes into account the official and non-official interpretations of the law by Russian regulators, some of which were developed with the participation of the author. Special consideration is given to the jurisdictional aspects of the Russian data protection legislation and the criteria of its application to foreign data controllers. The author also reveals the rationale behind the adoption of data localization provisions and analyzes their possible impact on foreign companies operating in Russia and implementation of innovative IT-technologies (Cloud computing, Big Data and Internet of Things). The paper concludes that the most of the potential benefits of data localization provisions lay in the area of public law: law enforcement activities and taxation. Nevertheless, data localization provisions may still have mid-term positive impact on privacy, since they force all stakeholders to revisit the basic concepts of existing personal data legislation (the notion of personal data, data controller, processing, etc.), thus serving as a driver for re-shaping existing outdated data privacy regulations and crafting something more suitable for the modern IT-environment.
Widespread acceptance and adoption of cloud computing calls for adaptation and development of existing risk assessment models of information systems. The approach suggested in this article can be used for risk assessment of information systems functioning on the basis of cloud computing technology, and assess the effectiveness of security measures.
The proceedings of the 11th International Conference on Service-Oriented Computing (ICSOC 2013), held in Berlin, Germany, December 2–5, 2013, contain high-quality research papers that represent the latest results, ideas, and positions in the field of service-oriented computing. Since the first meeting more than ten years ago, ICSOC has grown to become the premier international forum for academics, industry researchers, and practitioners to share, report, and discuss their ground-breaking work. ICSOC 2013 continued along this tradition, in particular focusing on emerging trends at the intersection between service-oriented, cloud computing, and big data.
International Science and Technology Conference "Modern Networking Technologies (MoNeTec): SDN&NFV Next Generation of Computational Infrastructure" was dedicated to the Software defined Networks (SDN) and Network Function Virtualization (NFV). These technologies have emerged as the hottest networking trends of the past a few years. The conference proceeding represent the papers where the broad scope of SDN&NFV topics are discussed.
Almost all of the technologies that are now part of the cloud paradigm existed before, but so far the market has not been proposals that bring together emerging technologies in a single commercially attractive solution. However, in the last decade, there were public cloud services, through which these technologies, on the one hand, available to the developer, and on the other - it is clear to the business community. But many of the features that make cloud computing attractive, may be in conflict with traditional models of information security.
Due to the fact that cloud computing bring with them new challenges in the field of information security, it is imperative for organizations to control the process of information risk management in the cloud. In this article on the basis of Common Vulnerability Scoring System, allowing to determine the qualitative indicator of exposure to vulnerabilities of information systems, taking into account environmental factors, we propose a method of risk assessment for different types of cloud deployment environments.
Information Risk Management, determine the applicability of cloud services for the organization is impossible without understanding the context in which the organization operates and the consequences of the possible types of threats that it may face as a result of their activities. This paper proposes a risk assessment approach used in the selection of the most appropriate configuration options cloud computing environment from the point of view of safety requirements. Application of risk assessment for different types of deployment of cloud environments will reveal the ratio counter possible attacks and to correlate the amount of damage to the total cost of ownership of the entire IT infrastructure of the organization.
The building and computer developing of the mathematical model of detecting of the crises modes in the non-linear dynamic systems that simulate the price formation in steel market, using big market real time data inflows. The exploring and the analysis of market risks in a sense of a loss of system’s stability (system crisis) and sharp fluctuations of the price with a large amplitude as the subject of the research.
The use of cloud computing to ensure interaction between the state and citizens allows to speed up information interaction, to realize state services, to reduce the costs of providing such interaction, but at the same time this interaction raises important questions about the reliability of the cloud provider and security of interaction. Providers of the cloud can be both public authorities and private organizations. In the event that the cloud provider is a government agency, it can be assumed that all the requirements for security will be met. However, if the cloud provider is a private person, then we cannot be sure of security, if these requirements for security are not mandatory. It should be noted that Russian legislation does not require the mandatory application of information security standards. In this regard, the security of stored information in the clouds and its legislative support, the responsibility of providers providing cloud access services are very significant for the use of this technology in Russia.
Cloud-based technologies proliferated in the past few years, while the manufacturing industry moved towards digitization and network. Therefore, cloud-based technologies have been adopted in the development of new generation manufacturing systems which orchestrate different activities, including product design, process and task planning, production, customer service, etc. These new cloud-ingrained technologies have the potential to change the collaboration of product development partners, the processing and sharing of information as well as utilization rates of critical equipment. Cloud-based technologies affect many aspects of manufacturing activities, and they therefore have the power to enable new or change existing business models of the manufacturing industry. Based on the literature review, this paper analyzes the latest requirements, challenges, and trends of the manufacturing industry. It structures the findings in the coherent manner and further hypothesizes how cloud computing may address identified requirements and challenges as well as realize or support new concepts in manufacturing.
The article is devoted to a particular form of freedom of assembly — the right to counter-demonstrate. The author underlines the value of this right as an element of democratic society, but also acknowledges the risk of violent actions among participants of opposing demonstrations. Due to this risk, the government may adopt adequate measures restricting the right to counter-demonstrate, certain types of which are analyzed in this paper.
Development of standards of international controllability is reviewed in the article. Institutional approach is applied to development of international legal regime of Energy Charter. Definition of controllability is connected to development of international standards of dispute settlement, which are described in the article in detail. In connection with controllability, Russian interest, defense of investment in European Union and ecological investment encouragement, is reviewed in the article.
мировое управление и управляемость, Мировая экономика, международное экономическое право, энергетическая хартия, International control and controllability, International economics, international economic law, Energy Charter
международное частное право; недвижимость; ; школа бартолистов; бартолисты; теория статутов; статуарная теория/