of July 5, 1994 No. 80/94-BP
About information protection in information and telecommunication systems
This Law governs the relations in the field of information protection in information, telecommunication and information and telecommunication systems (further - system).
In this Law the stated below terms are used in the following value:
blocking of information in system - actions owing to which there is impossible information access in system;
information leakage - result of actions owing to which information in system becomes known or available to the physical persons and/or legal entities which do not have access rights to it;
the owner of information - physical person or legal entity which possesses the rights to information;
the owner of system - physical person or legal entity which possesses the property right to system;
information access in system - receipt by the user of opportunity to process information in system;
information protection in system - the activities directed to warning of unauthorized actions concerning information in system;
destruction of information in system - actions owing to which information in system disappears;
the information (automated) sistemaorganizatsionno-technical system in which the technology of information processing with use technical and software is implemented;
information and telecommunication system - set of information and telecommunication systems which in processing of information are effective as a unit;
end-to-end system of information protection - the interconnected set of organizational and technical actions, means and methods of information protection;
the user of information in system (further - the user) physical person or legal entity which in the procedure established by the legislation acquired right of access to information in system;
cryptographic information protection - the information protection type which is implemented by information transform with use of special (key) data with the purpose of concealment/recovery of contents of information, confirmation of its authenticity, integrity, authorship, etc.;
unauthorized actions concerning information in the sistemedeystviye which are conducted with violation of procedure for the access to this information established according to the legislation;
information processing in system - accomplishment of one or several transactions, in particular: collection, introduction, recording, conversion, reading, preserving, destruction, registration, acceptance, obtaining, transfer, performed in system by means of technical and software;
violation of integrity of information in system - unauthorized actions concerning information in system owing to which its content changes;
procedure for information access in system - conditions of receipt by the user of opportunity to process information in system and processing rules of this information;
telecommunication system - set technical and the software intended for information exchange by transfer, radiations or its acceptance in the form of signals, signs, sounds, mobile or still images or otherwise;
information technical protection - the information protection type aimed at providing by means of technical actions and/or program and technical means of impossibility of leakage, destruction and blocking of information, violation of integrity and access mode to information.
Other terms are used in the value given in the laws of Ukraine "About information" and "About technical regulations and assessment of conformity".
Subjects to protection in system are information processed in it and the software intended for processing of this information.
Subjects of the relations connected with information protection in systems are:
owners of information;
owners of system;
specially authorized central executive body concerning the organization of special communication and information protection and the regional bodies subordinated to it.
The paragraph of the sixth isklbchen according to the Law of Ukraine of 23.02.2014 No. 767-VII
The part two is excluded according to the Law of Ukraine of 27.03.2014 No. 1170-VII
Based on the signed agreement or by proxy the owner of system can grant the right to dispose of system to other physical person or legal entity - the manager of system.
The procedure for information access, the list of users and their power concerning this information are determined by the owner of information.
The procedure for access to the state information resources or information with limited access, requirements for the protection established by the law the list of users and their power concerning this information is determined by the legislation.
In the cases provided by the law, the information access in system can be provided without the permission of her owner according to the procedure, established by the law.
The owner of system provides information protection in system according to the procedure and on the conditions determined in the agreement which is signed by it with the owner of information if other is not provided by the law.
The owner of system upon the demand of the owner of information provides the information on information protection in system.
The owner of system provides to the user the information on rules and operation mode of system and provides him information access in system according to certain procedure for access.
The owner of the system used for information processing from other system provides protection of such information according to the procedure and on the conditions determined by the agreement which is signed between owners of systems if other is not established by the legislation.
The owner of the system used for information processing from other system notifies the owner of the specified system on the elicited facts of unauthorized actions concerning information in system.
Information processing conditions in system are determined by the owner of system according to the agreement with the owner of information if other is not stipulated by the legislation.
Disclaimer! This text was translated by AI translator and is not a valid juridical document. No warranty. No claim. More info
Database include more 50000 documents. You can find needed documents using search system. For effective work you can mix any on documents parameters: country, documents type, date range, teams or tags.
More about search system
If you cannot find the required document, or you do not know where to begin, go to Help section.
In this section, we’ve tried to describe in detail the features and capabilities of the system, as well as the most effective techniques for working with the database.
You also may open the section Frequently asked questions. This section provides answers to questions set by users.