Exploring the Personal Data Protection Methods through Programs

Keywords: personal data; protection; software; technical task; SDN.


The paper highlights the personal data and the stages of its protection. Some provisions of the Law of the Republic of Azerbaijan on the personal data are reviewed. The protection of personal data through programs is explored. The studies in this area are reviewed. Data protection methods through programs are studied and analyzed. Some recommendations for the further developments in this field are provided.

Author Biography

Shafagat Jabrayil Mahmudova, Institute of Information Technology of ANAS
PhD, associate Professor


(1). Protection of personal information, 25 мая 2018, retrieved from
https://ru.wikipedia.org/wiki/ Protection of personal information
(2). Law of the Republic of Azerbaijan on personal data, 11.05.2010, retrieved from
(3). Software Information Protection, 2000-2019, retrieved from
(4). Maglinets, YU.A. (2008) Analysis of requirements for automated information systems, Moscow: Бином.
(5). A new law on the protection of personal information, 08.10.2013, retrieved from
(6). Ferreira, G., Sousa, M., Silva, B.S., Antunes, L., Frade, S., Beale, T. and Correia, C. (2019) Open EHR and General Data Protection Regulation: Evaluation of Principles and Requirements, JMIR medical informatics, vol. 7, no. 1, retrieved from
(7). Hui-Lien, C. and Jerry, S. (2017) The moderating roles of gender and social norms on the relationship between protection motivation and risky online behavior among in-service teachers, Computers & education, , vol. 112, pp. 83-96.
(8). Joshua, A., Scott, M., Edward, C. (2017) SDN Data Path Confidence Analysis, IEEE Conference on dependable and secure computing, pp. 209-216.
(9). Joshua, A., Scott, M. and Edward, C. (2017) A Framework for SDN Network Evaluation, 47th annual ieee/ifip international conference on dependable systems and networks workshops (DSN-W 2017), pp. 111-112.
(10). Andres, E., Dahiana, M. and Laura, G. (2015) Monitoring and Enforcing Data Protection Laws within an E-government Interoperability Platform, XLI Latin American computing conference (CLEI), pp. 548-559, 2015.
(11). Bazhenov, I.O. (2018) Lubkin Methodology of software code decomposition analysis, 2018 12th international IEEE Scientific and technical conference on dynamics of systems, mechanisms and machines (dynamics).
(12). Anna, K. and Lidia, O. (2018) Data Security in Cognitive Information Systems, Proceedings 2018 IEEE 32nd international conference on advanced information networking and applications (AINA), pp. 631-635.
(13). Pawel, K. (2017) Digital image integrity a survey of protection and verification techniques, Digital signal processing, vol. 71, pp. 1-26.
(14). Syeda Umema, H. and Abu Turab, A. (2017) Software Development for Information System Achieving Optimum Quality with Security, International journal of information system modeling and design, vol: 8, no. 4, pp. 1-20.
(15). Rui, C., Liehui, J., Wenzhi, C., Yang, X., Yuxia C. and Alelaiwi, A. (2017) MIPE: a practical memory integrity protection method in a trusted execution environment, Cluster computing-the journal of networks software tools and applications, , vol. 20, no. 2, pp. 1075-1087.
(16). Pascal, B., Erik, K., Paul Georg, W. and Juergen, B. (2017) Identity Management and Protection Motivated by the General Data Protection Regulation of the European Union-A Conceptual Framework Based on State-of-the-Art Software Technologies, Technologies, vol. 6, no. 4, pp. 1-14.
(17). Hui-Lien, C. and Jerry Chih-Yuan, S. (2017) The moderating roles of gender and social norms on the relationship between protection motivation and risky online behavior among in-service teachers, Computers & Education, vol. 112, pp. 83-96.
(18). Radi, R., and Irina, N. (2017) Architecture of Combined e-Learning Environment and Investigation of Secure Access and Privacy Protection, International journal of human capital and information technology professionals, vol. 7, no. 3, pp. 89-106.
(19). Peter, K. and Glenn, D. (2007) Practical uses of virtual machines for protection of sensitive user data, Information security practice and experience, proceedings, vol. 4464, 145 p.