Search citation statements
Paper Sections
Citation Types
Year Published
Publication Types
Relationship
Authors
Journals
Research discusses one of the constitutional amendments of 2020. In accordance with the new version of paragraph “m” of Part 1 of Article 71 of the Constitution of the Russian Federation, the exclusive powers of the Russian Federation include issues of ensuring the security of the individual, society and the state when applying information technologies, and digital data turnover. The consolidation of the problem of information security at the constitutional level determines the need for a partial modernization of its theoretical model. Modification and revision of some of its components will lead to higher effectiveness of constitutional regulation and improve the quality of application of industry legislation in the field of information technology and information protection. The purpose of the research is to investigate the main directions of enhancing the theoretical model of information security in terms of constitutional changes. The employed research methods are formal-legal, logical, system, statistical, structural-functional, modeling, and forecasting. The outcome of the study can be outlined as follows. The research clarifies the concept of information security, proposes to generalize the range of basic subjects of public relations related to information security, expand their rights and obligations, highlight the constitutional and sectoral legal regimes of information protection, and strengthen responsibility for offenses in the information sphere. In conclusion the study argues that updating the theoretical model of information security of the Russian Federation should be carried out in the following key areas: firstly, developing information security targets expressed in strategic and program documents of the state; secondly, clarifying classification of information security threats; thirdly, expanding legal regulation density; fourth, strengthening the law-enforcement mechanisms of information security; fifth, establising and maintening optimal balance between legal, technical and ethical regulation of information technologies, primarily digital technologies; and finally, definiing acceptable and unacceptable boundaries of application of information technology and digital data in people's lives.
Research discusses one of the constitutional amendments of 2020. In accordance with the new version of paragraph “m” of Part 1 of Article 71 of the Constitution of the Russian Federation, the exclusive powers of the Russian Federation include issues of ensuring the security of the individual, society and the state when applying information technologies, and digital data turnover. The consolidation of the problem of information security at the constitutional level determines the need for a partial modernization of its theoretical model. Modification and revision of some of its components will lead to higher effectiveness of constitutional regulation and improve the quality of application of industry legislation in the field of information technology and information protection. The purpose of the research is to investigate the main directions of enhancing the theoretical model of information security in terms of constitutional changes. The employed research methods are formal-legal, logical, system, statistical, structural-functional, modeling, and forecasting. The outcome of the study can be outlined as follows. The research clarifies the concept of information security, proposes to generalize the range of basic subjects of public relations related to information security, expand their rights and obligations, highlight the constitutional and sectoral legal regimes of information protection, and strengthen responsibility for offenses in the information sphere. In conclusion the study argues that updating the theoretical model of information security of the Russian Federation should be carried out in the following key areas: firstly, developing information security targets expressed in strategic and program documents of the state; secondly, clarifying classification of information security threats; thirdly, expanding legal regulation density; fourth, strengthening the law-enforcement mechanisms of information security; fifth, establising and maintening optimal balance between legal, technical and ethical regulation of information technologies, primarily digital technologies; and finally, definiing acceptable and unacceptable boundaries of application of information technology and digital data in people's lives.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.