• A
  • A
  • A
  • ABC
  • ABC
  • ABC
  • А
  • А
  • А
  • А
  • А
Regular version of the site

The Problem of Personal Data Security in IT Projects

Student: Massovets Kseniya

Supervisor: Anna Konstantinovna Zharova

Faculty: Graduate School of Business

Educational Programme: Business Administration (Bachelor)

Year of Graduation: 2021

Keywords: information security, IT projects, personal data protection, law and technical regulation of personal data protection, methods of personal data protection, general data protection regulations, problems of personal data protection, architecture of the personal data protection system, Plan-Do-Check-Act The subject of the research is the legal and technological aspects of protecting users' personal data in IT projects. The purpose of the study is to analyze the legal and technological aspects of personal data protection in IT projects. Research objectives: to analyze the concept of personal data and the main Russian regulatory legal acts regulating their protection, to provide a comparative description of the requirements and concepts of personal data protection in European and Russian law, to highlight the main global trends in the processing of personal data, to describe existing approaches to the protection of personal data and their compliance with the nature of the project or business, determine the role of the degree of protection of personal data in the success of an IT project, to analyze the problems and solutions of protecting personal data. As a result of the research, the research hypothesis was proved: the level of protection of personal data directly affects the success of an IT project. The main global trends in the field of personal data protection are identified, a comparative analysis of the Russian and European regulatory framework is carried out, and the key differences necessary for the entry of Russian IT projects into the European market are identified. The current methods of personal data protection are analyzed, the architecture of the protection system based on the Plan-Do-Check-Act approach is proposed. The effectiveness of the proposed methods of information protection has been proven on the example of a large player in the IT-development market - Intek Global LLC. Contents: 52 pages, 8 figures, 1 table, list of literature sources - 28.

Student Theses at HSE must be completed in accordance with the University Rules and regulations specified by each educational programme.

Summaries of all theses must be published and made freely available on the HSE website.

The full text of a thesis can be published in open access on the HSE website only if the authoring student (copyright holder) agrees, or, if the thesis was written by a team of students, if all the co-authors (copyright holders) agree. After a thesis is published on the HSE website, it obtains the status of an online publication.

Student theses are objects of copyright and their use is subject to limitations in accordance with the Russian Federation’s law on intellectual property.

In the event that a thesis is quoted or otherwise used, reference to the author’s name and the source of quotation is required.

Search all student theses