The Legal Regulation of Cybersecurity
##plugins.themes.bootstrap3.article.main##
Abstract
Cybercrime has become a global phenomenon, which is causing more harm to individual citizens, organizations, society and the state. Most countries in the world compare cybercrime with offences such as terrorism and drug trafficking due to its risks and profitability. Cybersecurity is the central category to fight cybercrime in cyberspace. Therefore, the strategic legal regulation of cybersecurity is one of the most relevant problems in EU, including Lithuania. So far cybersecurity legal regulation analysis in scientific literature has been rather limited.
The European Commission, together with the High Representative of the Union for Foreign Affairs and Security Policy, has published a cybersecurity strategy alongside a Commission proposed directive on network and information security (NIS). The cybersecurity strategy – “An Open, Safe and Secure Cyberspace” - represents the EU’s comprehensive vision on how best to prevent and respond to cyber disruptions and attacks. The purpose of its is to further European values of freedom and democracy and ensure the digital economy can safely grow. Specific actions are aimed at enhancing cyber resilience of information systems, reducing cybercrime and strengthening EU international cyber-security policy and cyber defence.
The main goal of the paper is to analyze and compare the EU cybersecurity strategy and experience of several foreign countries with the strategic legal regulation of cybersecurity in Lithuania.
The article consists of four parts. The first part dealt with the EU cybersecurity strategy. The second part of the article examines the comparative aspect of foreign cybersecurity strategic legal regulation. The third part deals with attempts in Lithuania to draft cybersecurity law and the holistic approach of cybersecurity legal regulation. The fourth part examines Lithuanian cybersecurity strategy and comments on the main probleas related with the strategy.
Several different approaches have been used in the research. The author have used a comparative method to investigate the EU cybersecurity strategy as well a, Lithuanian and foreign situations. The empirical analysis of legal documents was used to determine the legal regulation of the cybersecurity in Lithuania. In addition, Legal acts of the Republic of Lithuania have been analyzed. Having analyzed the official documents, the method allows identifying and describing the relationship between the valid legal regulations accurately. Using literature resources, the author has used the deductive method which allows drawing sufficiently reliable conclusions.
The European Commission, together with the High Representative of the Union for Foreign Affairs and Security Policy, has published a cybersecurity strategy alongside a Commission proposed directive on network and information security (NIS). The cybersecurity strategy – “An Open, Safe and Secure Cyberspace” - represents the EU’s comprehensive vision on how best to prevent and respond to cyber disruptions and attacks. The purpose of its is to further European values of freedom and democracy and ensure the digital economy can safely grow. Specific actions are aimed at enhancing cyber resilience of information systems, reducing cybercrime and strengthening EU international cyber-security policy and cyber defence.
The main goal of the paper is to analyze and compare the EU cybersecurity strategy and experience of several foreign countries with the strategic legal regulation of cybersecurity in Lithuania.
The article consists of four parts. The first part dealt with the EU cybersecurity strategy. The second part of the article examines the comparative aspect of foreign cybersecurity strategic legal regulation. The third part deals with attempts in Lithuania to draft cybersecurity law and the holistic approach of cybersecurity legal regulation. The fourth part examines Lithuanian cybersecurity strategy and comments on the main probleas related with the strategy.
Several different approaches have been used in the research. The author have used a comparative method to investigate the EU cybersecurity strategy as well a, Lithuanian and foreign situations. The empirical analysis of legal documents was used to determine the legal regulation of the cybersecurity in Lithuania. In addition, Legal acts of the Republic of Lithuania have been analyzed. Having analyzed the official documents, the method allows identifying and describing the relationship between the valid legal regulations accurately. Using literature resources, the author has used the deductive method which allows drawing sufficiently reliable conclusions.
##plugins.themes.bootstrap3.article.details##
Section
Articles
- The Author grants to the Publisher the exclusive right and licence to publish this Article without remuneration until the expiry of the economic rights: to reproduce the article in print and digital form, including its publication; to disseminate the original version of the Article or its copies in Lithuania and foreign countries; to translate the Article; to publish the article, including making it publicly available via computer networks; to reproduce and publish the Article in Lithuanian and foreign databases; to licence usage of the Article in ways described in this paragraph.
- The Author warrants that the economic rights of the Author have not been assigned or granted to third parties, that the Article has not been published so far and is not under consideration of being published elsewhere.
- The Author warrants that the Article does not violate intellectual property rights of others.
- After the Article is published in Social Technologies the Author shall have a right to make it public on personal website or on a website of an institution of affiliation, to reproduce it for non-commercial teaching or scholarly research purposes, clearly indicating that the primary source of its publication is Social Technologies.
- This consent shall be considered invalid if the Editorial Board of the Social Technologies decides not to publish the Article.
Authors contributing to Social Technologies agree to publish their articles under a Creative Commons Attribution 3.0 Unported (CC BY 3.0) Licence, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit, and that in the event of reuse or distribution, the terms of this licence are made clear.