CYBERSECURITY LAW AND LEGAL RESPONSES TO DATA BREACHES IN GOVERNMENT INSTITUTIONS

Authors

  • Yeni Santi Universitas Terbuka
  • Rahmatiyah Rahmatiyah Universitas Terbuka
  • Agus Prasetyo Universitas Terbuka

DOI:

https://doi.org/10.47353/bj.v6i2.655

Keywords:

Cyber Security, Data Breaches, Cyber Law, Government Institutions, Data Protection

Abstract

This study aims to analyze the cybersecurity legal framework and legal responses to data breach incidents in government institutions. As the digitalization of public services increases, threats to data security are becoming increasingly complex and have a broad impact on public trust and the stability of state administration. The method used in this study is a literature review, examining various academic sources, regulations, and policy reports related to cybersecurity and data protection in the public sector. This approach allows for the identification of regulatory patterns, legal weaknesses, and best practices in handling data breaches across various jurisdictions. The results of the study indicate that although many countries have developed regulations related to cybersecurity and data protection, gaps remain in their implementation, inter-agency coordination, and law enforcement mechanisms. Legal responses to data breaches in government institutions are often reactive and do not fully prioritize the principles of prevention and risk mitigation. Furthermore, the lack of uniform security standards and limited human resources are major challenges in strengthening government information security systems. Therefore, this study emphasizes the importance of regulatory harmonization, institutional capacity building, and the adoption of a proactive approach to cyber risk management to improve the effectiveness of data protection in the public sector.

Downloads

Download data is not yet available.

References

Chukwudi Tabitha Aghaunor, Patience Eshua, Tawo Obah, & Oluwatoyin Aromokeye. (2023). Data security strategies to avoid data breaches in modern information systems. World Journal of Advanced Research and Reviews, 20(3), 2122–2144. https://doi.org/10.30574/wjarr.2023.20.3.2515

Dumanska, I. Y., Guseva, O. Y., Kazarova, I. O., Gorodetskyy, M., Melnichuk, L. V., & Saienko, V. H. (2022). Personal Data Protection Policy Impact on the Company Development. https://elar.khmnu.edu.ua/handle/123456789/12535

Fan, J. (2023a). Legal Policies Failing on Data Breaches?–An Empirical Study of U.S. Information Security Law Implementations. Procedia Computer Science, Tenth International Conference on Information Technology and Quantitative Management (ITQM 2023), 221, 971–978. https://doi.org/10.1016/j.procs.2023.08.076

Fan, J. (2023b). Legal Policies Failing on Data Breaches?–An Empirical Study of U.S. Information Security Law Implementations. Procedia Computer Science, Tenth International Conference on Information Technology and Quantitative Management (ITQM 2023), 221, 971–978. https://doi.org/10.1016/j.procs.2023.08.076

Gudepu, B. K., & Jaladi, D. S. (2022). Data Discovery and Security: Protecting Sensitive Information. International Journal of Acta Informatica, 1(1), 176–187.

Hafiz Abdul Rehman Saleem, Ali Bukhtiar, Babar Zaheer, & Muhammad Asad Ullah Farooq. (2025). Challenges Faced by the Judiciary in Implementing Cybersecurity Laws in Pakistan. The Critical Review of Social Sciences Studies, 3(1), 1052–1066. https://doi.org/10.59075/1wyx0v30

Jha, R. K., & Jha, M. (2024). Optimizing E-Government Cybersecurity through Artificial Intelligence Integration. Journal of Trends in Computer Science and Smart Technology, 6(1), 67–87. https://doi.org/10.36548/jtcsst.2024.1.005

Lawal Qudus. (2025). Cybersecurity governance: Strengthening policy frameworks to address global cybercrime and data privacy challenges. International Journal of Science and Research Archive, 14(1), 1146–1163. https://doi.org/10.30574/ijsra.2025.14.1.0225

Li, W. W., Leung, A. C. M., & Yue, W. T. (n.d.). Where is IT in Information Security? The Interrelationship among IT Investment, Security Awareness, and Data Breaches1. Retrieved April 24, 2026, from https://dx.doi.org/10.25300/MISQ/2022/15713

Mariam, S. (2024). Legal and Ethical Challenges in International Cybersecurity: Addressing Cross-Border Data Breaches. Journal of Advances in Cybersecurity Science, Threat Intelligence, and Countermeasures, 8(12), 22–32.

Marwenny, E., Syafwar, R., & Yani, P. (2024). Personal Data Protection in Public Services. Jurnal Ilmiah Ekotrans & Erudisi, 4(2), 74–85. https://doi.org/10.69989/yjew5p90

Mishra, A., Alzoubi, Y. I., Gill, A. Q., & Anwar, M. J. (2022). Cybersecurity Enterprises Policies: A Comparative Study. Sensors, 22(2), 538. https://doi.org/10.3390/s22020538

Mugamba, E. (2025a). GLOBAL DATA GOVERNANCE IN DIGITAL LAW: A COMPARATIVE ANALYSIS OF EU AND GLOBAL APPROACHES TO CYBERSECURITY LEGISLATION. Journal of Smart Computing and Quantum Technologies, 1(1), 10–28. https://doi.org/10.63456/jscqt-1-1-39

Mugamba, E. (2025b). GLOBAL DATA GOVERNANCE IN DIGITAL LAW: A COMPARATIVE ANALYSIS OF EU AND GLOBAL APPROACHES TO CYBERSECURITY LEGISLATION. Journal of Smart Computing and Quantum Technologies, 1(1), 10–28. https://doi.org/10.63456/jscqt-1-1-39

Ngozi Samuel Uzougbo, Chinonso Gladys Ikegwu, & Adefolake Olachi Adewusi. (2024a). Cybersecurity compliance in financial institutions: A comparative analysis of global standards and regulations. International Journal of Science and Research Archive, 12(1), 533–548. https://doi.org/10.30574/ijsra.2024.12.1.0802

Ngozi Samuel Uzougbo, Chinonso Gladys Ikegwu, & Adefolake Olachi Adewusi. (2024b). Cybersecurity compliance in financial institutions: A comparative analysis of global standards and regulations. International Journal of Science and Research Archive, 12(1), 533–548. https://doi.org/10.30574/ijsra.2024.12.1.0802

Odebade, A. T., & Benkhelifa, E. (2023). A Comparative Study of National Cyber Security Strategies of ten nations (arXiv:2303.13938). arXiv. https://doi.org/10.48550/arXiv.2303.13938

Pimenta Rodrigues, G. A., Marques Serrano, A. L., Lopes Espiñeira Lemos, A. N., Canedo, E. D., Mendonça, F. L. L. de, de Oliveira Albuquerque, R., Sandoval Orozco, A. L., & García Villalba, L. J. (2024). Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review. Data, 9(2), 27. https://doi.org/10.3390/data9020027

Rahman, F. (2025). SAFEGUARDING PERSONAL DATA IN THE PUBLIC SECTOR: UNVEILING THE IMPACT OF THE NEW PERSONAL DATA PROTECTION ACT IN INDONESIA. UUM Journal of Legal Studies, 16(1), 1–18. https://doi.org/10.32890/uumjls2025.16.1.1

Raza, D. A. (2024). A REVIEW OF CYBERSECURITY THREATS IN E-GOVERNMENT SYSTEMS: TOWARDS SECURE DIGITAL GOVERNANCE. Multidisciplinary Research in Computing Information Systems, 4(3), 131–142. https://doi.org/10.71465/mrcis74

Saleem, B., Ahmed, M., Zahra, M., Hassan, F., Iqbal, M. A., & Muhammad, Z. (2024). A survey of cybersecurity laws, regulations, and policies in technologically advanced nations: A case study of Pakistan to bridge the gap. International Cybersecurity Law Review, 5(4), 533–561. https://doi.org/10.1365/s43439-024-00128-y

Savaş, S., & Karataş, S. (2022). Cyber governance studies in ensuring cybersecurity: An overview of cybersecurity governance. International Cybersecurity Law Review, 3(1), 7–34. https://doi.org/10.1365/s43439-021-00045-4

Shah, I. A., Habeeb, R. A. A., Rajper, S., & Laraib, A. (2022). The Influence of Cybersecurity Attacks on E-Governance. In Cybersecurity Measures for E-Government Frameworks (pp. 77–95). IGI Global Scientific Publishing. https://doi.org/10.4018/978-1-7998-9624-1.ch005

Shaik, N., Chandana, B. H., Chitralingappa, P., & Sasikala, C. (2025). Protecting in the Digital Age. In Next-Generation Systems and Secure Computing (pp. 105–135). John Wiley & Sons, Ltd. https://doi.org/10.1002/9781394228522.ch6

Supriya Dhananjay Paigude. (2024). A Review of Cybersecurity Policies in the Public Sector: Challenges and Solutions. Computer Fraud and Security, 07–12. https://doi.org/10.52710/cfs.28

Xhixho, E., Pazylov, N., Savchenko, V., Patiev, N., & Pazylova, M. (2025). Digital transformation in the legal sector: Challenges and opportunities for cybersecurity and data protection. Law, State and Telecommunications Review, 17(1). https://ora.ox.ac.uk/objects/uuid:417c3c66-ff7c-49da-88a1-f5ee46574da7

Downloads

Published

2026-04-25

How to Cite

Yeni Santi, Rahmatiyah Rahmatiyah, & Agus Prasetyo. (2026). CYBERSECURITY LAW AND LEGAL RESPONSES TO DATA BREACHES IN GOVERNMENT INSTITUTIONS. Berajah Journal, 6(2), 488–498. https://doi.org/10.47353/bj.v6i2.655