CYBERSECURITY LAW AND LEGAL RESPONSES TO DATA BREACHES IN GOVERNMENT INSTITUTIONS
DOI:
https://doi.org/10.47353/bj.v6i2.655Keywords:
Cyber Security, Data Breaches, Cyber Law, Government Institutions, Data ProtectionAbstract
This study aims to analyze the cybersecurity legal framework and legal responses to data breach incidents in government institutions. As the digitalization of public services increases, threats to data security are becoming increasingly complex and have a broad impact on public trust and the stability of state administration. The method used in this study is a literature review, examining various academic sources, regulations, and policy reports related to cybersecurity and data protection in the public sector. This approach allows for the identification of regulatory patterns, legal weaknesses, and best practices in handling data breaches across various jurisdictions. The results of the study indicate that although many countries have developed regulations related to cybersecurity and data protection, gaps remain in their implementation, inter-agency coordination, and law enforcement mechanisms. Legal responses to data breaches in government institutions are often reactive and do not fully prioritize the principles of prevention and risk mitigation. Furthermore, the lack of uniform security standards and limited human resources are major challenges in strengthening government information security systems. Therefore, this study emphasizes the importance of regulatory harmonization, institutional capacity building, and the adoption of a proactive approach to cyber risk management to improve the effectiveness of data protection in the public sector.
Downloads
References
Chukwudi Tabitha Aghaunor, Patience Eshua, Tawo Obah, & Oluwatoyin Aromokeye. (2023). Data security strategies to avoid data breaches in modern information systems. World Journal of Advanced Research and Reviews, 20(3), 2122–2144. https://doi.org/10.30574/wjarr.2023.20.3.2515
Dumanska, I. Y., Guseva, O. Y., Kazarova, I. O., Gorodetskyy, M., Melnichuk, L. V., & Saienko, V. H. (2022). Personal Data Protection Policy Impact on the Company Development. https://elar.khmnu.edu.ua/handle/123456789/12535
Fan, J. (2023a). Legal Policies Failing on Data Breaches?–An Empirical Study of U.S. Information Security Law Implementations. Procedia Computer Science, Tenth International Conference on Information Technology and Quantitative Management (ITQM 2023), 221, 971–978. https://doi.org/10.1016/j.procs.2023.08.076
Fan, J. (2023b). Legal Policies Failing on Data Breaches?–An Empirical Study of U.S. Information Security Law Implementations. Procedia Computer Science, Tenth International Conference on Information Technology and Quantitative Management (ITQM 2023), 221, 971–978. https://doi.org/10.1016/j.procs.2023.08.076
Gudepu, B. K., & Jaladi, D. S. (2022). Data Discovery and Security: Protecting Sensitive Information. International Journal of Acta Informatica, 1(1), 176–187.
Hafiz Abdul Rehman Saleem, Ali Bukhtiar, Babar Zaheer, & Muhammad Asad Ullah Farooq. (2025). Challenges Faced by the Judiciary in Implementing Cybersecurity Laws in Pakistan. The Critical Review of Social Sciences Studies, 3(1), 1052–1066. https://doi.org/10.59075/1wyx0v30
Jha, R. K., & Jha, M. (2024). Optimizing E-Government Cybersecurity through Artificial Intelligence Integration. Journal of Trends in Computer Science and Smart Technology, 6(1), 67–87. https://doi.org/10.36548/jtcsst.2024.1.005
Lawal Qudus. (2025). Cybersecurity governance: Strengthening policy frameworks to address global cybercrime and data privacy challenges. International Journal of Science and Research Archive, 14(1), 1146–1163. https://doi.org/10.30574/ijsra.2025.14.1.0225
Li, W. W., Leung, A. C. M., & Yue, W. T. (n.d.). Where is IT in Information Security? The Interrelationship among IT Investment, Security Awareness, and Data Breaches1. Retrieved April 24, 2026, from https://dx.doi.org/10.25300/MISQ/2022/15713
Mariam, S. (2024). Legal and Ethical Challenges in International Cybersecurity: Addressing Cross-Border Data Breaches. Journal of Advances in Cybersecurity Science, Threat Intelligence, and Countermeasures, 8(12), 22–32.
Marwenny, E., Syafwar, R., & Yani, P. (2024). Personal Data Protection in Public Services. Jurnal Ilmiah Ekotrans & Erudisi, 4(2), 74–85. https://doi.org/10.69989/yjew5p90
Mishra, A., Alzoubi, Y. I., Gill, A. Q., & Anwar, M. J. (2022). Cybersecurity Enterprises Policies: A Comparative Study. Sensors, 22(2), 538. https://doi.org/10.3390/s22020538
Mugamba, E. (2025a). GLOBAL DATA GOVERNANCE IN DIGITAL LAW: A COMPARATIVE ANALYSIS OF EU AND GLOBAL APPROACHES TO CYBERSECURITY LEGISLATION. Journal of Smart Computing and Quantum Technologies, 1(1), 10–28. https://doi.org/10.63456/jscqt-1-1-39
Mugamba, E. (2025b). GLOBAL DATA GOVERNANCE IN DIGITAL LAW: A COMPARATIVE ANALYSIS OF EU AND GLOBAL APPROACHES TO CYBERSECURITY LEGISLATION. Journal of Smart Computing and Quantum Technologies, 1(1), 10–28. https://doi.org/10.63456/jscqt-1-1-39
Ngozi Samuel Uzougbo, Chinonso Gladys Ikegwu, & Adefolake Olachi Adewusi. (2024a). Cybersecurity compliance in financial institutions: A comparative analysis of global standards and regulations. International Journal of Science and Research Archive, 12(1), 533–548. https://doi.org/10.30574/ijsra.2024.12.1.0802
Ngozi Samuel Uzougbo, Chinonso Gladys Ikegwu, & Adefolake Olachi Adewusi. (2024b). Cybersecurity compliance in financial institutions: A comparative analysis of global standards and regulations. International Journal of Science and Research Archive, 12(1), 533–548. https://doi.org/10.30574/ijsra.2024.12.1.0802
Odebade, A. T., & Benkhelifa, E. (2023). A Comparative Study of National Cyber Security Strategies of ten nations (arXiv:2303.13938). arXiv. https://doi.org/10.48550/arXiv.2303.13938
Pimenta Rodrigues, G. A., Marques Serrano, A. L., Lopes Espiñeira Lemos, A. N., Canedo, E. D., Mendonça, F. L. L. de, de Oliveira Albuquerque, R., Sandoval Orozco, A. L., & García Villalba, L. J. (2024). Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review. Data, 9(2), 27. https://doi.org/10.3390/data9020027
Rahman, F. (2025). SAFEGUARDING PERSONAL DATA IN THE PUBLIC SECTOR: UNVEILING THE IMPACT OF THE NEW PERSONAL DATA PROTECTION ACT IN INDONESIA. UUM Journal of Legal Studies, 16(1), 1–18. https://doi.org/10.32890/uumjls2025.16.1.1
Raza, D. A. (2024). A REVIEW OF CYBERSECURITY THREATS IN E-GOVERNMENT SYSTEMS: TOWARDS SECURE DIGITAL GOVERNANCE. Multidisciplinary Research in Computing Information Systems, 4(3), 131–142. https://doi.org/10.71465/mrcis74
Saleem, B., Ahmed, M., Zahra, M., Hassan, F., Iqbal, M. A., & Muhammad, Z. (2024). A survey of cybersecurity laws, regulations, and policies in technologically advanced nations: A case study of Pakistan to bridge the gap. International Cybersecurity Law Review, 5(4), 533–561. https://doi.org/10.1365/s43439-024-00128-y
Savaş, S., & Karataş, S. (2022). Cyber governance studies in ensuring cybersecurity: An overview of cybersecurity governance. International Cybersecurity Law Review, 3(1), 7–34. https://doi.org/10.1365/s43439-021-00045-4
Shah, I. A., Habeeb, R. A. A., Rajper, S., & Laraib, A. (2022). The Influence of Cybersecurity Attacks on E-Governance. In Cybersecurity Measures for E-Government Frameworks (pp. 77–95). IGI Global Scientific Publishing. https://doi.org/10.4018/978-1-7998-9624-1.ch005
Shaik, N., Chandana, B. H., Chitralingappa, P., & Sasikala, C. (2025). Protecting in the Digital Age. In Next-Generation Systems and Secure Computing (pp. 105–135). John Wiley & Sons, Ltd. https://doi.org/10.1002/9781394228522.ch6
Supriya Dhananjay Paigude. (2024). A Review of Cybersecurity Policies in the Public Sector: Challenges and Solutions. Computer Fraud and Security, 07–12. https://doi.org/10.52710/cfs.28
Xhixho, E., Pazylov, N., Savchenko, V., Patiev, N., & Pazylova, M. (2025). Digital transformation in the legal sector: Challenges and opportunities for cybersecurity and data protection. Law, State and Telecommunications Review, 17(1). https://ora.ox.ac.uk/objects/uuid:417c3c66-ff7c-49da-88a1-f5ee46574da7
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Yeni Santi, Rahmatiyah Rahmatiyah, Agus Prasetyo

This work is licensed under a Creative Commons Attribution 4.0 International License.




