International Journal of Frontiers in Sociology, 2025, 7(3); doi: 10.25236/IJFS.2025.070310.
Yuan Li
Faculty of Law & Justice, University of New South Wales, Sydney, New South Wales 2052, Australia
This essay will argue that the European Union’s General Data Protection Regulation is effective in strengthening the protection of personal data, especially in the context of increasing globalization and digitalization. Since the birth of Internet technology, electronic data and network information flow rapidly, and personal information security problems are gradually exposed. Therefore, the European Union to implement the General Data Protection Regulation came into being. Through the analysis of three key legal cases, This essay demonstrates how GDPR effectively protects the security of personal information in specific cases. GDPR still faces the contradiction between the inherent lag of laws and institutions and technological progress in the digital realm. The GDPR needs to be constantly adjusted to keep pace with technological innovation.
Personal Privacy Data Protection, GDPR, Information Security
Yuan Li. The Role of GDPR in Strengthening Personal Data Security. International Journal of Frontiers in Sociology (2025), Vol. 7, Issue 3: 67-73. https://doi.org/10.25236/IJFS.2025.070310.
[1] A. Roos, “The European Union’s General Data Protection Regulation (GDPR) and its Implications for South African Data Privacy Law: An Evaluation of Selected ‘Content Principles.’ ” The Comparative and International Law Journal of Southern Africa,2020, pp. 3-30.
[2] C. Kuner, “International Organizations and the EU General Data Protection Regulation” International organizations law review, 2019, pp.183.
[3] C. Laybats and J Davies, “GDPR: Implementing the Regulations” Business information review , 2018, pp. 82.
[4] C. Ryngaert, and T. Mistale, “The GDPR as Global Data Protection Regulation?” AJIL unbound 5, 2020, pp. 8.
[5] D. Reynolds, “Decisions, Decisions: An Analysis of Identity Theft Victims Reporting to Police, Financial Institutions, and Credit Bureaus” Victims & offenders, 2023,pp. 1394.
[6] Google LLC v. CNIL, Case C-507/17, ECLI:EU:C:2019:772 (Court of Justice of the European Union, September,2019,24.
[7] K. B. Anderson, D. Erik and S.A. Michael A, “Identity Theft,” The Journal of economic perspectives, 2008, pp. 181.
[8] M.N. Lintvedt, “Putting a Price on Data Protection Infringement” International data privacy law, 2022, pp.12.
[9] P.Q. Brady, R. Ryan and B.W. Reyns, “From WWII to the World Wide Web: A Research Note on Social Changes, Online “Places,” and a New Online Activity Ratio for Routine Activity Theory” Journal of contemporary criminal justice , 2016,pp. 130.
[10] S. Romanosky, T. Rahul and A. Alessandro, “Do Data Breach Disclosure Laws Reduce Identity Theft?” Journal of policy analysis and management,2011, pp. 262.
[11] S. Sharma and M. Pranav, “Data Privacy and GDPR Handbook,” John Wiley & Sons, 1st edition, 2020, pp. 45.
[12] T.F. Walree and P.T.J Wolters, “The Right to Compensation of a Competitor for a Violation of the GDPR” International data privacy law, 2020, pp. 351.
[13] T. Tony Ke and K. Sudhir, “Privacy Rights and Data Security: GDPR and Personal Data Markets.” Management Science,2023, pp. 4389.