Dissertationen zum Thema „Data protection – Law and legislation – Zimbabwe“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-28 Dissertationen für die Forschung zum Thema "Data protection – Law and legislation – Zimbabwe" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Stoddard, Damon. „A new Canadian intellectual property right : the protection of data submitted for marketing approval of pharmaceutical drugs“. Thesis, McGill University, 2006. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=101828.
Der volle Inhalt der QuelleOn June 17, 2006, the federal government of Canada published a proposed data protection regulation, which would provide an initial applicant with eight years of protection for clinical test results submitted in a new drug submission. This protection would lead to an eight year period of market exclusivity for the drug associated with the clinical test data, regardless of whether that drug was protected by a Canadian patent.
In this thesis, the author first describes what data protection is on a practical level, and distinguishes data protection from other forms of intellectual property rights. Next, the author discusses how various jurisdictions choose to protect clinical test data submitted to their health authorities. Canada's international obligations pursuant to the NAFTA and the TRIPS Agreement are also examined. In this regard, the author argues that Canada is under no obligation to provide initial applicants with eight years of data protection. Furthermore, the author argues that exclusive time-limited property rights in clinical test data are difficult to justify from a theoretical perspective. Finally, the author prescribes certain legislative changes to Canada's proposed data protection regulation.
Lynskey, Orla. „Identifying the objectives of EU data protection regulation and justifying its costs“. Thesis, University of Cambridge, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.608116.
Der volle Inhalt der QuelleChan, Lai-sha, und 陳麗莎. „A study of the copyright protection in the digital environment in HongKong“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46779632.
Der volle Inhalt der QuelleKan, Chi-keung, und 簡志強. „A review of the implementation of the personal data (privacy) ordinance in the Hong Kong Correctional Services Department“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1998. http://hub.hku.hk/bib/B31965507.
Der volle Inhalt der QuelleAmoraal, Lezel. „Internet-regulering in Suid-Afrika : staat of internasionaal?“ Thesis, Stellenbosch : Stellenbosch University, 2003. http://hdl.handle.net/10019.1/53471.
Der volle Inhalt der QuelleENGLISH ABSTRACT: The Internet has become such an integral part of computer users' daily existence that it seems as if it has always been there. The Internet with its unique borders - or lack of borders - places an enormous burden on geographically based legal systems. Regulation, that has specifically been designed for the Internet, is a necessity because virtually every aspect of the law is challenged by the Internet and that many legal frameworks are inadequate to deal with the Internet. The other aspect which complicates the Internet even more, is that there is no specific organisation, business or government to whom the Internet belongs. Individuals and organisations have rights to the web pages that they own on the Internet, but there is no ownership of the Internet in its entirety. The development of the Internet in South Africa took place during a difficult time in the country's history. The apartheid era initially limited the growth of the Internet. Much of the existing legislation in South Africa has been partially adapted to accommodate the Internet, but the government could not envisage what the actual impact of the Internet would be and consequently they reacted when it came to the regulation of the Internet. In 2002 the Electronic Communication and Transaction Act 25 of2002 came into operation. In fact, the physical component of the Internet has already been regulated to a degree by the pure coincidence as a result of its physical presence. This is because the backbone of the Internet had not originally been created by the Internet, but by the telephone. There are a number of legislative Internet-organisations that are, among others, responsible for the technical standards of the Internet, dispute resolutions and in general what is important for the Internet community. Various international conventions regulate specific aspects of the Internet such as copyright, intellectual property rights, domain names, trademarks and cyber crime. The international conventions and agreements are an important step in the direction of standardised regulation. However, the lack of borders creates problems surrounding jurisdiction of the cyber space.
AFRIKAANSE OPSOMMING: Die Internet het al so deel van rekenaargebruikers se alledaagse bestaan geword dat dit soms wil voorkom asof dit maar nog altyd daar was. Die Internet met sy unieke grense - of sy gebrek aan grense - plaas 'n groot las op geografies gebaseerde regstelsels. Regulering wat spesifiek vir die Internet ontwerp is, is 'n noodsaaklikheid, aangesien byna elke aspek van die reg deur die Internet uitgedaag word en baie regsraamwerke onvoldoende is om die Internet te hanteer. Wat die regulering van die Internet verder kompliseer, is dat daar nie een spesifieke organisasie, onderneming of regering is aan wie die Internet behoort nie. Individue en organisasies het regte tot die webwerwe wat hulle op die Internet besit, maar daar is nie eienaarskap van die Internet in sy geheel nie. Die ontwikkeling van die Internet in Suid-Afirka het tydens 'n moeilike tydperk in die Suid- Afrikaanse geskiedenis plaasgevind. Die apartheidsera het die aanvanklike ontwikkeling en groei van die Internet in Suid-Afrika beperk. Verskeie bestaande Suid-Afrikaanse wetgewing is deels aangepas om die Internet te akkommodeer, maar die regering het nooit besef wat die werklike impak van die Internet sou wees nie en het gevolglik re-aktief te werk gegaan wanneer dit by die regulering van die Internet gekom het. In 2002 het Suid-Afrika se Elektroniese Kommunikasie en Transaksies Wet 25 van 2002 in werking getree. Die regulering van die fisieke komponente van die Internet is tot 'n mate as gevolg van sy fisieke teenwoordigheid deur blote toeval, gereguleer. Dit is omdat die ruggraat van die Internet nie oorspronklik vir die Internet geskep is nie, maar vir die telefoon. Daar bestaan verskeie wetgewende Internet-organisasies wat onder meer verantwoordelik is vir die tegniese standaarde van die Internet, dispuutresolusie en wat oor die algemeen aan die belange van die Internet-gemeenskap wil voldoen. Verskeie internasionale konvensies reguleer spesifieke aspekte van die Internet soos kopiereg, intellektuele eiendomsreg, domeinname en handelsmerke en kubermisdaad. Die internasionale konvensies en verdrae is 'n belangrike stap in die rigting van gestandaardiseerde regulering. Tog skep die grenslose omstandighede van die Internet probleme rondom jurisdiksie in die kuberruim.
Kam, Ka Man. „Reproduction rights in digital environment and copyrights protection : legal issues and challenges“. Thesis, University of Macau, 2011. http://umaclib3.umac.mo/record=b2580191.
Der volle Inhalt der QuelleGamlashe, Thembinkosi. „Freedom of the press, or the infringement of the right to privacy?: media coverage of President Kgalema Motlanthe from October 2008 to April 2009 in three newspapers“. Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1010118.
Der volle Inhalt der QuelleSkolmen, Dayne Edward. „Protection of personal information in the South African cloud computing environment: a framework for cloud computing adoption“. Thesis, Nelson Mandela Metropolitan University, 2016. http://hdl.handle.net/10948/12747.
Der volle Inhalt der QuelleArès, Sébastien. „Le couplage de données et la protection de la vie privée informationnelle sous l'article 8 de la Charte canadienne /“. Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=82651.
Der volle Inhalt der QuelleIn the author's opinion, a governmental data matching program will probably constitute a search or seizure under section 8 when a positive answer is given to two questions. First, is there a use or transfer of information which implicates constitutionally protected information? Generally, section 8 will only protect biographical personal information, as described in the Plant case. Second, one must determine if a reasonable expectation of privacy exists as to the purpose for which the information will be used. In other words, one must determine if the two governmental databanks are separate on the constitutional level.
However, a positive answer to both of theses questions does not mean that the matching program necessarily infringes section 8. It will not be considered unreasonable if it is authorised by law, if the law itself is reasonable, and if the execution of the program is reasonable. Presuming that the program is authorised by law, it is probable that a matching program aimed to detect individuals collecting illegally social benefits will not be considered unreasonable.
Banerjea-Brodeur, Nicolas Paul. „Advance passenger information passenger name record : privacy rights and security awareness“. Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=80909.
Der volle Inhalt der QuellePassenger Name Record access permits authorities to have additional data that could identify individuals requiring more questioning prior to border control clearance. This data does not cause in itself privacy issues other than perhaps the potential retention and manipulation of information that Border Control Authorities may acquire. In essence, bilateral agreements between governments should be sought in order to protect national legislation.
The common goal of the airline industry is to ensure safe and efficient air transport. API and PNR should be viewed as formalities that can facilitate border control clearance and prevent the entrance of potentially high-risk individuals.
劉曉敏. „互聯網上泄露公民個人信息行為的犯罪化探析 : 以 人肉搜索 為視角“. Thesis, University of Macau, 2009. http://umaclib3.umac.mo/record=b2129880.
Der volle Inhalt der QuellePupo, Alvaro de Carvalho Pinto. „Privacidade, liberdade de expressão e proteção dos dados pessoais: uma perspectiva brasileira com base na jurisprudência do Supremo Tribunal Federal“. Pontifícia Universidade Católica de São Paulo, 2017. https://tede2.pucsp.br/handle/handle/20598.
Der volle Inhalt der QuelleMade available in DSpace on 2017-11-14T11:28:30Z (GMT). No. of bitstreams: 1 Alvaro de Carvalho Pinto Pupo.pdf: 993019 bytes, checksum: 3e483a91d657e2658eb8b6b67b0a96f2 (MD5) Previous issue date: 2017-10-31
This study analyzes the concept of intimacy, privacy, free speech and personal data under a brazilian perspective, as well as the protection for each of the itens mentioned. The study makes references to authorities, legislation and case law pertaining to each of the subjects. The study pursues the clarification of what each of these understands as privacy protection and personal data protection, and how these correlates. It also pursues to understand if these understandings are aligned and propose, in the end, some way of uniformization considering the legislative bill proposals being discussed in the Brazilian Congress
O presente trabalho analisa o conceito da intimidade, privacidade, liberdade de expressão e de dados pessoais sob uma perspectiva brasileira, bem como a proteção outorgada a cada um dos itens tratados acima. São analisados os pontos doutrinários, legais e jurisprudenciais associados com cada um deles. A análisa busca averiguar o que cada um desses campos entende como proteção da privacidade e dos dados pessoais e como a privacidade e dados pessoais se relacionam, além verificar se esses entendimentos estão alinhados e propor, ao final, uma forma de uniformização, considerando inclusive propostas legislativas que se encontram em debate no Congresso Nacional
Wells, William Ward. „Information security program development“. CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2585.
Der volle Inhalt der QuelleMaguraushe, Kudakwashe. „Development of a diagnostic instrument and privacy model for student personal information privacy perceptions at a Zimbabwean university“. Thesis, 2021. http://hdl.handle.net/10500/27557.
Der volle Inhalt der QuelleSchool of Computing
Ph. D. (Information Systems)
Laosebikan, Foluke Oyelayo. „Privacy and technological development : a comparative analysis of South African and Nigerian privacy and data protection laws with particular reference to the protection of privacy and data in internet cafes and suggestions for appropriate legislation in Nigeria“. Thesis, 2007. http://hdl.handle.net/10413/9540.
Der volle Inhalt der QuelleLondon, Ray William. „Comparative data protection and security : a critical evaluation of legal standards“. Thesis, 2013. http://hdl.handle.net/10500/13859.
Der volle Inhalt der QuelleLL. D.
London, R. W. „Comparative data protection and security : a critical evealuation of legal standards“. Thesis, 2013. http://hdl.handle.net/10500/13859.
Der volle Inhalt der QuelleLL.D. (Laws)
Roos, Anneliese. „The law of data (privacy) protection: a comparative and theoretical study“. Thesis, 2003. http://hdl.handle.net/10500/1463.
Der volle Inhalt der QuelleJurisprudence
LL. D. (Jurisprudence)
Mukwindidza, Enock. „The implementation of environmental legislation in the Mutasa district of Zimbabwe“. Diss., 2008. http://hdl.handle.net/10500/2295.
Der volle Inhalt der QuellePublic Administration
MPA (Public Administration)
Conroy, Marlize. „A comparative study of technological protection measures in copyright law“. Thesis, 2006. http://hdl.handle.net/10500/2217.
Der volle Inhalt der QuelleJurisprudence
LL.D.
Allotey, Asuquo Kofi Essien. „Data protection and transborder data flows : implications for Nigeria's integration into the global network economy“. Thesis, 2014. http://hdl.handle.net/10500/13903.
Der volle Inhalt der QuellePublic, Constitutional, & International
LLD
Nxokweni, Unathi Pearl. „Legal principles regulating the processing of personal information in the workplace“. Diss., 2018. http://hdl.handle.net/10500/25762.
Der volle Inhalt der QuellePrivate Law
LL. M.
„An empirical study of the impact of the Personal Data (Privacy) Ordinance on human resource management“. 1998. http://library.cuhk.edu.hk/record=b5889382.
Der volle Inhalt der QuelleThesis (M.B.A.)--Chinese University of Hong Kong, 1998.
Includes bibliographical references (leaves 87-89).
ABSTRACT --- p.ii
TABLE OF CONTENTS --- p.iii
LIST OF TABLES --- p.vi
LIST OF ABBREVIATIONS --- p.vii
ACKNOWLEDGMENT --- p.viii
Chapter
Chapter I. --- INTRODUCTION --- p.1
Chapter II. --- LITERATURE REVIEW --- p.4
Privacy Protection Act --- p.4
A Survey of Privacy in the Workplace --- p.5
Chapter III. --- PERSONAL DATA (PRIVACY) ORDINANCE --- p.8
Events that led to the Enactment of the Ordinance --- p.8
An Overview of the Ordinance --- p.10
Chapter IV. --- METHODOLOGY --- p.14
Chapter V. --- RESULTS --- p.17
Privacy Commissioner's Office (PCO) --- p.17
The Hong Kong Institute of Human Resource Management (IHRM) --- p.23
Bank A --- p.26
Recruitment and Selection --- p.26
References --- p.27
Employee Records --- p.28
Data Relating to Ex-employees --- p.28
Training and Development --- p.29
Compensation and Benefits --- p.30
Data Storage and Security --- p.30
Data Transfer and Transmission --- p.30
Appraisal and Potential Assessment --- p.30
Disciplinary Records --- p.31
Exit Interview --- p.31
Others --- p.32
Bank B --- p.33
Recruitment and Selection --- p.33
References --- p.34
Employee Records --- p.34
Data Relating to Ex-employees --- p.35
Training and Development --- p.35
Compensation and Benefits --- p.35
Data Storage and Security --- p.35
Data Transfer and Transmission --- p.36
Appraisal and Potential Assessment/Disciplinary Records --- p.36
Exit Interview --- p.36
Others --- p.36
Bank C --- p.37
Recruitment and Selection --- p.38
References --- p.38
Employee Records --- p.38
Data Relating to Ex-employees --- p.39
Training and Development --- p.39
Compensation and Benefits --- p.39
Data Storage and Security --- p.39
Data Transfer and Transmission --- p.40
Appraisal and Potential Assessment --- p.40
Disciplinary Records --- p.40
Exit Interview --- p.40
Others --- p.41
Chapter VI. --- ANALYSIS OF RESULTS --- p.43
"Overview of Bank A, B and C's Interview Results" --- p.43
Evaluation on Compliance Level --- p.45
Recruitment and Selection --- p.46
References --- p.47
Employee Records --- p.48
Data Relating to Ex-employees --- p.48
Training and Development --- p.49
Compensation and Benefits --- p.49
Data Storage and Security --- p.50
Data Transfer and Transmission --- p.50
Appraisal and Potential Assessment/Disciplinary Records --- p.50
Exit Interview --- p.50
General --- p.50
Dynamics Between the PCO and Human Resource Practitioners --- p.51
Dynamics Between the PCO and IHRM --- p.53
Dynamics Between IHRM and Human Resource Practitioners --- p.53
Comparison with Linowes' Survey Results --- p.54
Chapter VII. --- RECOMMENDATIONS --- p.56
Privacy Commissioner's Office (PCO) --- p.56
The Hong Kong Institute of Human Resource Management (IHRM) --- p.57
"Bank A, B and C" --- p.57
Chapter VIII. --- LIMITATIONS --- p.59
IX. CONCLUSIONS --- p.60
APPENDIX --- p.62
BIBLIOGRAPHY --- p.87
Donald, Katherine Faye. „Names, pseudonyms and anonymity in online interactions: a study of name policy on news24, the daily Maverick, and 4chan“. Thesis, 2017. https://hdl.handle.net/10539/24442.
Der volle Inhalt der QuelleThis research investigates real names, pseudonyms, and anonymity online. From its small beginning as a research tool, the internet has grown radically and been increasingly incorporated into people’s daily lives. Simultaneously, as the internet has grown and changed, so have its uses, and perceptions of the naming practices used on it. Attitudes towards acceptable name use online have changed over time. Social networking sites have had a strong influence on name usage policies. This research examines how these attitudes have changed, and the implications of real names, pseudonyms and anonymity for behaviour on the internet and privacy. The radically disembodied nature of online communication lends itself to disinhibition, which in turn has resulted in online communications’ reputation for trolls and abusers. Contrary to the common assumption that the use of real names offline indicates the legitimacy of using real names online, online and offline communications are radically different. Online communications have very different considerations regarding privacy, identity theft, the digital footprint, and collapsed context, many of which are not present in offline communications. This paper examines naming policies and site structure through two case studies. The first case focuses on News24 and the Daily Maverick, both of which are South African news sites. Due to the need for rational and polite discourse, these implemented real name policies in order to enforce good behaviour amongst their users. In both cases, the real name policies failed. The second case study is that of 4chan, the American image board site. 4chan does not require any login process, and its users are typically anonymous. Despite being notorious for trolls, illegal content, and its image board /b/, the site’s architecture, along with the way that posts are created and then kept alive, mean that the site can be effective at moderating the kinds of content that it deems appropriate for each of its boards. Despite the contrasting nature and purposes of the news sites and 4chan, there are lessons to be learnt from the failure of real name policies, and the architecture and set up of sites which can be used to enforce particular behaviours. Furthermore, despite the ephemeral and shifting nature of 4chan, identity and a sense of belonging remain important to its users, hinting at the importance of a sense of identity to site members and the role of this identity in ensuring that users adhere to the norms.
XL2018
Dagada, Rabelani. „Legal and policy aspects to consider when providing information security in the corporate environment“. Thesis, 2014. http://hdl.handle.net/10500/18839.
Der volle Inhalt der QuelleSchool of Computing
D. Phil. (Information Systems)
Skosana, Milton Themba. „The right to privacy and identity on social network sites : a comparative legal perspective“. Diss., 2016. http://hdl.handle.net/10500/23772.
Der volle Inhalt der QuellePrivate Law
LL. M.
Nienaber, Catharina Wilhelmina. „Strafregtelike beskerming van inligting“. Thesis, 2005. http://hdl.handle.net/10500/1682.
Der volle Inhalt der QuelleJurisprudence
LL. D.
Saurombe, Nampombe Pearson. „Public programming of public archives in the East and Southern Africa regional branch of the International Council on Archives (ESARBICA):“. Thesis, 2016. http://hdl.handle.net/10500/20084.
Der volle Inhalt der QuelleInformation Science
D. Litt. et Phil. (Information Science)