Aim and Objectives for Encryption, Privacy and Security in Cyberspace

Security in Cyberspace

Major/Course: LLM in information technology

Topic: “Encryption, Privacy and Security in cyberspace: Legal challenges and an ever inquitable balance”

Citation Style: MLA

No. of Sources/References: Yes

Paper Description: This essay is about the legal challenges faced by the use of encryption methods and its clash with the right to privacy and security. An instance of this clash is when criminals including terrorists use encryption methods and when brought to face the wrath of the law, they argue that dulving encrypted information is a threat to their privacy.(similar example of this is the recent 2015/2016 FBI-Apple encryption dispute. What are the current laws in place regarding encryption, privacy and security? How can this law be amended and what are t he risks inherent in amending these laws? How does this become an ever inequitable balance?

Aim and Objectives For This Research Paper:

The aim of this research is the investigate the legal challenges in cyberspace laws with respect to encryption, privacy, and security. For this purpose, the following objectives are framed:

  • To understand the legal challenges in the use of encryption methods
  • To explore the clash between the right to privacy and security within the context of cyberspace laws
  • To asses how the criminal use of encryption methods and cyberspace is managed by the law
  • To suggest how an equitable legal balance could be maintained between the right to privacy and security

Research Questions:

  1. What are the current laws in place regarding encryption, privacy and security?
  2. How can this law be amended and what are the risks inherent in amending these laws?
  3. How does the clash between the right to privacy and security become an ever inequitable balance?

Revised Aim and Objectives

The aim of this research is the investigate the legal challenges with respect to encryption, privacy, and security. For this purpose, the following objectives are framed:

  1. To understand the legal challenges in the use of encryption methods
  2. To explore the clash between the legal right to privacy and security
  3. To asses how the criminal use of encryption methods is handled by the law
  4. To suggest how an equitable legal balance could be maintained between the right to privacy and security