You are on page 1of 4

2.

The relation between Group A (Main Topic) with the 3


Information Technologies selected from Group B:

Effects of information privacy, information disclosure on cloud computing and


services in the UAE

In UAE, the privacy landscape has been flourishing in the last ten years with
privacy laws and regulations emerging, there are multifaceted legal structure
with laws made at both the federal and emirate levels. Additionally, the UAE is
home to many free zones that are unique economic zones with their own
legislative bodies. The UAE outside of the Free Zones is referred to as Onshore.
In cases where a Free Zone has not passed legislation addressing data privacy,
the pertinent Onshore law will take precedence. In the Free Zones, regardless of
whether those zones have a data protection law, all Onshore criminal law
remains in effect.

2019 Federal Law No. 2: The use of Information Technology in the healthcare
sector defines health data, prescribes retention periods, contains data
localization requirements, regulates sharing and disclosing of health data and
mandates putting appropriate security in place to protect health data.
The government digital cloud consists of specific data centers connected to the
Internet with knowledge channels, and connected to a set of security controls,
which necessitates providing higher levels of vigilance, and this effort also
coincides with the preparation of highly efficient human resources, and
continuous monitoring of the most important developments in the world of
cybersecurity, hacking and work You have complete control over this system
(Alhosani,2019).
One of the innovative solutions that will make a quantum leap in the field of cloud
security is the Maximum-Security Zone, which operates in a private space within
the client's computing environment, where security compliance is mandatory
and always also, provides a combination of automated tools, preventive and
analytics tools to enforce security controls and practices on customer-defined
settings of Oracle cloud resources. Customers can effectively secure resources,

7
within secure and reliable settings, prevent any changes to these settings
automatically, and constantly monitor and block abnormal activities.

There are multiple initiatives to drive cloud computing adoption within


government, The UAE Telecommunications Regulatory Authority (TRA) has
released its 'TRA Vision,' which focuses on establishing and maintaining the UAE
as a leading global digital economy. The UAE's positioning as a regional data and
cloud hub is critical to this. International cloud service providers have long
regarded the UAE as a key regional market, and they are now expanding their
cloud footprints in UAE datacenters, where the laws state that neither financial
nor public sector data could be exported. Accordingly, to data protection laws,
those governing cloud computing services are constantly being revised to keep
up with global and regional trends.

Effects of information privacy, information disclosure on IOT in the UAE

Privacy right is guaranteed within the UAE Constitution, and this forms the basis
for analyzing data protection issues. Article 31 simply states: “The freedom and
confidentiality of communication by mail, telegram and other means of
communication is guaranteed in accordance with the law. The protection of
personal data was not contemplated in the manner understood in the digital age
in the Constitution of the United Arab Emirates, and privacy was only mentioned
in the context of the privacy of mail and communications.

The rapid developments of emerging technologies, including Cloud Computing,


and Internet of Things, are causing many societies to struggle whilst trying to
keep up with, and adopt them. Therefore, serious concerns and issues are being
raised. The threat to personal information privacy is one of these issues.

In the United Arab Emirates Federal Law No. 5 of 2012 (Crimes Law) aims to
combat cybercrime. A wide range of crimes that can be committed using the
global internet have been codified under the UAE Cybercrime Law. The law aims
to criminalize persons who gain access to a website, computer network, or

8
information technology, as well as those who indulge in deleting, destroying,
modifying, altering, copying or republishing any data.

Dubai issued Law No. 26 of 2015 regulating the dissemination and exchange of
data in the Emirate of Dubai; The Dubai Data Law sets out several objectives. It
primarily aims to ensure that data collected by Dubai government entities is
effectively shared between these entities and with the private sector, in order to
maximize the opportunities to access and benefit from this data for the residents,
visitors and economy of the emirate. The objectives of the Data Law in the
Emirate of Dubai include managing data in accordance with international best
practices, enhancing transparency, setting rules for the dissemination and
exchange of data, increasing the efficiency of services provided by federal
government agencies and local government agencies, and providing the
necessary data to non-governmental agencies in order to support development
in the Emirate of Dubai; Notably, one of the explicit objectives of the Dubai Data
Law is to strike a balance between data dissemination and exchange, data
confidentiality and privacy (ZAWAYA,2016).

The UAE puts in place “further” regulations regarding data management and
protection that apply to the Internet of Things – for example, in relation to the
roaming of IoT devices. The dynamism of legislation, especially in relation to
technology, is a positive step towards achieving the TRA's goal of making the UAE
a leading country in the development of IoT services.

Effects of information privacy, information disclosure on blockchain in the UAE

The Dubai Digital Transaction Strategy 2020 and the UAE Digital Transaction
Strategy 2021 aim to achieve the following: First, maintaining the security of
information and information assets related to the implementation of blockchain
technology applications and solutions in the entities, by ensuring their
confidentiality, integrity and availability. and second, addressing and mitigating
the relevant information security risks. These two goals will be achieved by
establishing new information security controls for blockchain technology that are
not covered in international and national information security standards.

9
Finally, an evaluation has been done for risk handling assessment and evaluation
was conducted in five of the blockchain technology use cases in order to identify
the associated risks with appropriate relevant security controls. Thus, the results
of the analysis/evaluation showed that the proposed security controls contribute
to reducing the risks associated with blockchain technology applications and
solutions and protecting information and information assets from unauthorized
disclosure, modification, or destruction.

In April 2018, the UAE government launched the UAE Blockchain Strategy 2021.
The strategy aims to adapt and employ advanced technologies to transform 50%
of government transactions at the federal level to the Blockchain platform by
2021 (HH Sheikh Mohammed Bin Rashed,2018).

The UAE government aims to employ future technology to serve humanity, by


recording and documenting digital transactions using blockchain technology, and
allocating a distinctive fingerprint for digital data that cannot be penetrated or
changed, in a way that raises the level of digital security of national data, and
reduces operational costs, by reducing paperwork, thus speeding up the
decision-making process.

Figure 3 : shows the transformation of government sectors with blockchain.

10

You might also like