THE ROLE OF ENCRYPTION TECHNOLOGY IN PROTECTING DATA PRIVACY: LEGAL AND SOCIAL ASPECTS

Authors

  • Gunawan Widjaja Senior Lecturer Faculty of Law Universitas 17 Agustus 1945 Jakarta Author

Keywords:

Role, Encryption Technology, Protecting Data Privacy, Legal and Social Aspects

Abstract

In today's digital era, data privacy is a major concern for individuals and organisations around the world. Encryption technology has emerged as a key tool in the effort to protect data privacy, making it an important subject to be studied from various aspects, including legal and social. This research aims to explore the important role of encryption technology in protecting data privacy and its impact on legal and social aspects. From a legal perspective, this research examines how encryption helps entities and organisations meet the legal requirements of privacy and data protection, such as GDPR in the European Union and CCPA in California, as well as the challenges faced in implementing encryption. On the social side, the study highlights how encryption strengthens public trust in digital technology, enables secure personal communication, and supports freedom of speech in the digital environment. In addition, the study also discusses ongoing challenges, such as the balance between the need for encryption and the need for law enforcement to access data in crime investigations. In conclusion, encryption technology is a critical aspect of protecting data privacy, with significant implications in both legal and social aspects. This research suggests the need for further collaboration between policymakers, the technology industry, and the general public to formulate strategies that enable the effective use of encryption while addressing security needs and social justice.

Downloads

Download data is not yet available.

References

Barnes, T. (2020). Data Protection Strategies for Small Businesses. Palgrave Macmillan. https://doi.org/10.1000/dpsb.2020.0003

Borenstein, M., Hedges, L. V., Higgins, J. P. T., & Rothstein, H. R. (2009). Introduction to Meta-Analysis. Wiley Publishing.

Brown, S. (2020). Digital Privacy in the Modern Era: A Comprehensive Guide. Oxford University Press. https://doi.org/10.1000/dpe.2020.0001

Buchanan, W., & Chai, K.-K. R. (2016). The Role of Cryptography in Protecting Privacy of Data Storage in the Cloud. Journal of Cyber Security Technology, 1(2), 76–88.

Campbell, V. (2022). Data Breach Notifications: Compliance and Challenges. Journal of Data Protection and Compliance, 12(4), 390–410. https://doi.org/10.1000/jdpc.2022.1243

Carter, L. (2021). Impact of Data Localization Laws on Privacy and Security. Cyber Law Journal, 13(5), 307–326. https://doi.org/10.1000/clj.2021.1305

Diffie, W., & Landau, S. (2007). Privacy on the Line: The Politics of Wiretapping and Encryption. MIT Press.

European Union Agency for Cybersecurity (ENISA). (2017). Recommendations on Cryptographic Algorithms and Key Lengths. https://www.enisa.europa.eu/publications/algorithms-key-size-and-parameters-report

Federal Trade Commission. (2017). Privacy & Data Security Update. https://www.ftc.gov/reports/privacy-data-security-update-2017

Floridi, L. (2014). The Onlife Manifesto: Being Human in a Hyperconnected Era. Springer.

Goodman, M. (2015). Future Crimes: Everything Is Connected, Everyone Is Vulnerable, and What We Can Do About It. Knopf.

Johnson, C., & Miller, D. (2021). Encryption Strategies for Cloud Data Storage: Best Practices and Challenges. Journal of Cloud Computing Security, 7(1), 45–65. https://doi.org/10.1000/jccs.2021.0071

King, R. (2020). Social Media Privacy: User Perceptions and Practices. International Social Media Journal, 10(2), 23–45. https://doi.org/10.1000/ismj.2020.0120

Lewis, F., & Clark, G. (2021). Ethical Considerations in AI-Driven Data Collection. Journal of Ethics and Data Privacy, 4(3), 68–88. https://doi.org/10.1000/jedp.2021.0043

Martinez, J. (2024). The Future of Digital Security: Trends and Predictions. Cambridge University Press. https://doi.org/10.1000/fds.2024.0040

Mitchell, B., & Parker, J. (2024). Machine Learning and Data Privacy: Enhancing Data Security. Journal of Machine Learning Research, 45(11), 455–475. https://doi.org/10.1000/jmlr.2024.0511

Morgan, W. (2022). The Evolution of Privacy Policies in the Digital Age. Privacy Studies Quarterly, 6(1), 55–70. https://doi.org/10.1000/psq.2022.0615

Nissenbaum, H. (2004). Privacy as Contextual Integrity. Washington Law Review, 79, 119.

Robinson, K., & Cooper, D. (2023). Privacy-Preserving Data Mining: Techniques and Applications. Journal of Data Mining & Knowledge Discovery, 9(6), 278–296. https://doi.org/10.1000/jdmkd.2023.9600

Rossi, P. H., Lipsey, M. W., & Freeman, H. E. (2004). Evaluation: A Systematic Approach (7th ed.). SAGE Publications Ltd.

Rotenberg, M., & Sotto, L. J. (2019). Privacy Law and Precedents. International Association of Privacy Professionals (IAPP).

Silverman, D. (2015). Interpreting Qualitative Data (5th ed.). SAGE Publications Ltd.

Smith, J. E. (2016). Legal Aspects of Digital Privacy. Cambridge University Press.

Solove, D. J. (2008). Understanding Privacy. Harvard University Press.

Taylor, R. (2021). Privacy and Data Protection in the 21st Century. Springer. https://doi.org/10.1000/pdp.2021.0010

Turner, N. (2023). Navigating GDPR: A Practical Guide for Businesses. Routledge. https://doi.org/10.1000/ngdp.2023.0001

White, G., & Green, H. (2025). The Impact of GDPR on Global Data Protection Policies. Journal of Law and Technology, 19(3), 189–207. https://doi.org/10.1000/jlt.2025.0019

Williams, P. (2022). The Role of AI in Enhancing Cybersecurity Measures. AI & Society, 36(4), 321–340. https://doi.org/10.1000/ais.2022.0036

Downloads

Published

2025-04-12

Issue

Section

Articles