Legal aspects of information security in Ukraine in the conditions of European integration and war
- Details
- Category: Content №5 2025
- Last Updated on 25 October 2025
- Published on 30 November -0001
- Hits: 2347
Authors:
O. Ilyushyk, orcid.org/0000-0002-4619-5785, Danylo Halytsky Lviv National Medical University, Lviv, Ukraine; e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.
R. Skrynkovskyy*, orcid.org/0000-0002-2180-8055, Lviv University of Business and Law, Lviv, Ukraine, e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.
A. Dutko, orcid.org/0000-0002-5062-6947, Lviv State University of Internal Affairs, Lviv, Ukraine; e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.
I. Prots, orcid.org/0000-0002-6483-0121, Lviv State University of Internal Affairs, Lviv, Ukraine; e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.
M. Kropyvnytskyi, orcid.org/0000-0003-0981-0774, Private Entrepreneur, Lviv, Ukraine, e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.
* Corresponding author e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.
Naukovyi Visnyk Natsionalnoho Hirnychoho Universytetu. 2025, (5): 132 - 141
https://doi.org/10.33271/nvngu/2025-5/132
Abstract:
Purpose. To propose improvements in legal norms in the field of information security (IS). To substantiate the need to improve the legal categories IS. To establish the need to coordinate the course towards European integration in the field of information law in wartime conditions, provide legal substantiation for punishment for participation in information warfare on the side of the aggressor.
Methodology. The method of induction and deduction made it possible to indicate that information warfare (IW) necessitates the need to expand the concept of IS and the interpretation of “cybersecurity” as its subcategory. The hermeneutic method allowed proposing the definition of legal categories in the field of IS. The method of comparative analysis allowed proposing improvements in the norms of information law and providing legal substantiation for punishment for participation in information warfare on the side of the aggressor.
Findings. It is indicated that IW necessitates the need to expand the interpretation of the IS category. Security of information, “cybersecurity” should be defined as a component of IS. It is noted that IS is implemented as a balance in the conditions of constant active counteraction, one of the aspects of which is legal counteraction to information aggression. Not only the absence of a holistic national IS-system is indicated, but also the insufficiency of its systemic support. It is noted that the uncertainty of legal norms causes an increase in the discretionary powers of the judicial branch of government in the field of protecting the human right to information, which increases the responsibility for the democracy level in the country.
Originality. The legal expansion of the definition of information as an object of protection to its definition as an instrument of harm is substantiated. It is indicated that the process of integration of legal norms of the EU and Ukraine necessitates the need for counter changes in EU legislation taking into account Ukraine’s experience in countering IW. The definition of legal categories of IS provided.
Practical value. The proposed changes to legal norms and improvement of legal categories will contribute to reducing the level of uncertainty in the field IS.
Keywords: national security, information security, European integration, protection of the right to information
References.
1. Bondarenko, R., & Mykhalchuk, V. (2021). Information security of the state. Investments: practice and experience, 5, 95-101. https://doi.org/10.32702/2306 6814.2021.5.95
2. Horulko, V. V. (2022). The role and place of information security in the overall system of the state’s national security. The Journal of V. N. Karazin Kharkiv National University, Series “Law”, 34, 104-109. https://doi.org/10.26565/2075-1834-2022-34-12
3. Shemchuk, V. (2020). Information security threats: problems of determination and troubleshooting. Expert: paradigms of legal sciences and public administration, 1(7), 285-296. https://doi.org/10.32689/2617-9660-2020-1(7)-285-296
4. Nitsenko, V., Mardani, A., Streimikis, J., Ishchenko, M., Chaikovsky, M., Stoyanova-Koval, S., & Arutiunian, R. (2019). Automatic Information System of Risk Assessment for Agricultural Enterprises of Ukraine. Montenegrin Journal of Economics, 15(2), 139-152. https://doi.org/10.14254/1800-5845/2019.15-2.11
5. Onopriienko, S. (2022). Classification of the types of the information security as a legal category. Newsletter of Taras Shevchenko National University of Kyiv, 1(49), 60-62. https://doi.org/10.17721/1728-2217.2022.49.60-62
6. Pilipchuk, V. (2025). Theoretical and legal problems of the development of legislation in the sphere of national and information security of Ukraine. Information and law, 2(53), 9-22. https://doi.org/10.37750/2616-6798.2025.2(53).334015
7. Miniailuk, V. (2024). On the problem of ensuring information security under the conditions of the legal regime of martial law. Law & Border, 4(2), 108-129. https://doi.org/10.32453/law_border/t1b33x66
8. Kaplia, О. М. (2023). Legal regulation of citizen’s information security during martial law. Expert: paradigms of legal sciences and public administration, 6(24), 16-20. https://doi.org/10.32689/2617-9660-2022-6(24)-16-20
9. Moroz, V. (2021). Features of information security in martial law. Scientific Works of Kyiv Aviation Institute. Series Law Journal “Air and Space Law”, 2(59), 94-101. https://doi.org/10.18372/2307-9061.59.15600
10. Shynkar, T. (2023). Application of the “Necessity” Category in Justifying Restrictions on the Right to Information in the Interests of National Security: General Principles and Practice of the European Court of Human Rights. Academic Visions. Section “Law”, 18. https://doi.org/10.5281/zenodo.8343591
11. Halipchak, V. (2023). State-legal mechanism of information security in Ukraine in the context of Russian aggression. Scientific journal “Politikus”, 5, 19-24. https://doi.org/10.24195/2414-9616.2023-5.3
12. Koterlin, I. B. (2022). Information security in martial law in terms of ensuring information rights and freedoms. Actual problems of domestic jurisprudence, 1, 150-155. https://doi.org/10.32782/392257
13. Kudinov, S. S., & Shynkar, T. I. (2021). Criminal law mechanisms of limiting information activities characterized by collaboration sign. South Ukrainian Law Journal, 2(3), 23-29. https://doi.org/10.32850/sulj.2021.3.2.4
14. Kunev, Yu. (2021). Legal provision of information security as a subject of legal investigation. Scientific Works of Kyiv Aviation Institute. Series Law Journal “Air and Space Law”, 1(58), 95-102. https://doi.org/10.18372/2307-9061.58.1531
15. Voitsikhovskyi, A. (2020). Information security as component national security systems (international and foreign experience). The Journal of V. N. Karazin Kharkiv National University. Series Law, 29, 281-288. https://doi.org/10.26565/2075-1834-2020-29-38
16. Oliinyk, N., & Petroie, I. (2025). Volution of European legal standards and mechanisms for information security governance in public authorities amidst digital tranformations. Bulletin of Postgraduate education: Ser. “Social and Behavioral Sciences; Management and Administration”. Updated, 32(61), 328-346. https://doi.org/10.58442/3041-1858-2025-32(61)-328-346
17. Skrynkovskyy, R., Petkov, S., Koretskyi, O., Hudyma, V., Koziar, R., Chorniy, B., …, & Chubenko, A. (2024). Interaction between the Armed Forces of Ukraine, other components of the defense forces and representatives of the mass media under martial law. International scientific journal “Internauka”. Series: “Legal Sciences”, 3(73), 130-143. https://doi.org/10.25313/2520-2308-2024-3-9682
18. Yarema, O. G., & Ilyushyk, O. M. (2022). System of legal remedies for ensuring information security. Analytical and Comparative Law, 1, 237-241. https://doi.org/10.24144/2788-6018.2022.04.43
19. Prots, I. (2023). Legal regulation of information security in public administration. Information and analytical support for the activities of the security and defense sector bodies of Ukraine: materials of the Scientific and Practical Conference. (Lviv, December 22, 2023. Lviv: Lviv State University of Internal Affairs). Retrieved from https://dspace.lvduvs.edu.ua/bitstream/1234567890/6900/1/22_12_2023.pdf#page=138
20. Perun, T. S. (2018). Ways to improve cooperation between Ukraine and the EU in the field of information security. Scientific Papers of the Legislation Institute of the Verkhovna Rada of Ukraine, 1(5), 26-31. Retrieved from https://www.researchgate.net/publication/329604665_Slahi_pokrasenna_vzaemodii_miz_Ukrainou_ta_ES_u_sferi_zabezpecenna_informacijnoi_bezpeki
21. European Parliament (2024). Artificial intelligence act. Retrieved from https://www.europarl.europa.eu/RegData/etudes/BRIE/2021/698792/EPRS_BRI(2021)698792_EN.pdf
22. Kelman, M. S., Tokarska, A. S., Yarmol, L. V., Tsebenko, S. B., & Dutko, A. O. (2020). Modern mechanisms for the protection of human rights: a collective monograph. Lviv: Galician Publishing Union. Retrieved from https://lpnu.ua/sites/default/files/2023/6/19/paragraphs/50930/monografiyakelmantokarskayarmolcebenko.pdf
23. Constitutional Court of Ukraine (2019). Separate opinion of the judge of the Constitutional Court of Ukraine Lemak Vasyl Vasyliovych regarding the Opinion of the Constitutional Court of Ukraine dated November 13, 2019 No. 5-в/2019 dated 11/13/2019. Retrieved from https://zakon.rada.gov.ua/laws/show/nd05d710-19#Text
24. Horielova, V. Y., & Vikhryst, S. M. (2024). Legal support and prospects for the development of state policy in the field of information security. Legal Bulletin, 13, 79-85. https://doi.org/10.31732/2708-339X-2024-13-A11
Newer news items:
- Innovative determinants of postwar socialization of the Ukrainian economy - 25/10/2025 01:31
- Transformation of soft and hard skills of shipping specialists and improvement of the educational process - 25/10/2025 01:30
- Job satisfaction of employees working remotely: the role of organisational support - 25/10/2025 01:30
- Pareto improvement of global inclusive growth: the “Belt and road” model - 25/10/2025 01:30
- Innovation and technological unemployment in Ricardo’s theory of economic growth - 25/10/2025 01:30
- Education 4.0: innovative approaches to competence development in digital organizations - 25/10/2025 01:30
- Post-industrial transformations of society and their impact on the employment structure - 25/10/2025 01:30
- Methodological principles of forming a marketing GTM strategy for an IT product in the digital economy - 25/10/2025 01:30
- Sustainable development strategies for the construction industry of Ukraine: problems and prospects - 25/10/2025 01:30
- The role of the institutional environment in regulating innovative activities in the industry - 25/10/2025 01:30
Older news items:
- Empirical comparison of five deep learning architectures for GNSS time-series data forecasting - 25/10/2025 01:30
- Quantum machine learning for fusion of multichannel optical satellite images - 25/10/2025 01:30
- Minimizing the impact of motor vehicles on the environment and the health of the population of agglomerations - 25/10/2025 01:30
- Improving the algorithm for determining the competence of employees in terms of labor safety - 25/10/2025 01:30
- The right of employees of mining and metallurgical enterprises to legal assis-tance under martial law - 25/10/2025 01:30
- Impact of topographic data on electric vehicle energy prediction - 25/10/2025 01:30
- Influence of deformation parameters on mechanical behaviour of aluminium-magnesium roll-bonded composites with kirigami-structured inlays - 25/10/2025 01:30
- Assessment of the fatigue strength of a tank wagon car boiler taking into account corrosive wear - 25/10/2025 01:30
- DECARBUST: decarbonization and dust technologies for sustainable mining operations - 25/10/2025 01:30
- Selection of an aggregate quarry mining technology with variable depth and productivity based on cost price - 25/10/2025 01:30



