Auswahl der wissenschaftlichen Literatur zum Thema „Zimbabwe Data Protection Act“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Zimbabwe Data Protection Act" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Zimbabwe Data Protection Act"

1

Musiwa, Anthony Shuko. „How Has the Presence of Zimbabwe’s Victim-Friendly Court and Relevant Child Protection Policy and Legal Frameworks Affected the Management of Intrafamilial Child Sexual Abuse in Zimbabwe? The Case of Marondera District“. Journal of Interpersonal Violence 33, Nr. 11 (08.05.2018): 1748–77. http://dx.doi.org/10.1177/0886260517752154.

Der volle Inhalt der Quelle
Annotation:
The study intended to assess, based on the perceptions of Victim-Friendly Court (VFC) professionals in Marondera District in Zimbabwe, how the presence of the VFC and relevant child protection policy and legal frameworks has affected the management of Intrafamilial Child Sexual Abuse (ICSA) in Zimbabwe. Sem-istructured questionnaires were administered to 25 professionals from 13 VFC agencies in Marondera, while one-on-one semi-structured interviews were conducted with 15 key informants who included five ICSA survivors and their respective five caregivers as well as five key community child protection committee members. All 40 participants were selected using purposive sampling. Data were analyzed manually using thematic analysis, descriptive analysis, and document analysis. The study showed that the VFC manages ICSA through prevention, protection, treatment, and support interventions, and that its mandate is guided by key child protection policy and legal frameworks, particularly the National Action Plan for Orphaned and Vulnerable Children and the Children’s Act (Chapter 5:06). The presence of these mechanisms is perceived to have resulted in increased awareness of ICSA, realization of effective results, increased reporting of ICSA, and enhanced coordination among VFC agencies. However, the same frameworks are perceived to be fraught with gaps and inconsistencies, too prescriptive, incoherent with some key aspects of the National Constitution and international child rights standards, and poorly resourced for effective implementation. All this has negatively affected the management of ICSA. Therefore, the Government of Zimbabwe should consistently review these systems to make them responsive to the ever-evolving factors associated with ICSA. Also, alignment with the National Constitution, full domestication of global child rights instruments, and routine collection of better statistics for evidence-based policy- and decision-making, and for better monitoring of progress and evaluation of outcomes, are necessary for positive results. Non-governmental stakeholders too should chip in with human, technical, and financial resources to enhance effective management of the social problem.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Gossman, P., und J. R. Wilkinson. „Data Protection Act.“ BMJ 295, Nr. 6610 (28.11.1987): 1418. http://dx.doi.org/10.1136/bmj.295.6610.1418.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Priest, R. G. „Data Protection Act“. Psychiatric Bulletin 12, Nr. 5 (01.05.1988): 204. http://dx.doi.org/10.1192/pb.12.5.204.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Priest, R. G. „Data Protection Act“. Bulletin of the Royal College of Psychiatrists 12, Nr. 5 (Mai 1988): 204. http://dx.doi.org/10.1192/s0140078900020162.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Lorains, John W. „Data Protection Act 1987“. Practical Diabetes International 6, Nr. 3 (Mai 1989): 140. http://dx.doi.org/10.1002/pdi.1960060316.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Gripper, J. „Data Protection Act 1984“. Veterinary Record 117, Nr. 23 (07.12.1985): 615. http://dx.doi.org/10.1136/vr.117.23.615.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Raymont, Patrick. „The Data Protection Act“. Physics Bulletin 37, Nr. 4 (April 1986): 161–63. http://dx.doi.org/10.1088/0031-9112/37/4/026.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Chitimira, Howard. „An Analysis of Socio-Economic and Cultural Rights Protection under the Zimbabwe Constitution of 2013“. Journal of African Law 61, Nr. 2 (11.04.2017): 171–96. http://dx.doi.org/10.1017/s0021855317000109.

Der volle Inhalt der Quelle
Annotation:
AbstractThis article discusses certain provisions of the Zimbabwe Constitution Amendment Act 20 of 2013 that deal with the protection of socio-economic and cultural rights in Zimbabwe. The purpose of the article is to investigate the adequacy, flaws, challenges and prospects of these provisions in relation to the protection and affording of basic socio-economic and cultural rights to all citizens of Zimbabwe.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Kong, L. „Enacting China's Data Protection Act“. International Journal of Law and Information Technology 18, Nr. 3 (05.03.2010): 197–226. http://dx.doi.org/10.1093/ijlit/eaq003.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Phair, Lynne, und Julie Lee Winsor. „The new data protection act“. Nursing Older People 12, Nr. 6 (01.09.2000): 32–33. http://dx.doi.org/10.7748/nop.12.6.32.s16.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Zimbabwe Data Protection Act"

1

Cheng, Sin Ying. „Health Insurance Portability and Accountability Act (HIPAA)-compliant privacy access control model for Web services /“. View abstract or full-text, 2006. http://library.ust.hk/cgi/db/thesis.pl?COMP%202006%20CHENGS.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Coulibaly, Ibrahim. „La protection des données à caractère personnel dans le domaine de la recherche scientifique“. Phd thesis, Université de Grenoble, 2011. http://tel.archives-ouvertes.fr/tel-00798112.

Der volle Inhalt der Quelle
Annotation:
Comment devrait être assurée, de façon efficiente, la protection des données à caractère personnel dans le domaine de la recherche scientifique ? Telle est la problématique de cette thèse. Question cruciale à l'heure où les traitements de données sont appelés à multiplier à l'avenir dans tous les domaines de recherche, et dont les finalités ne sont pas toujours clairement définies ni perçues. A cette question, l'application de la loi Informatique et Libertés, loi à vocation généraliste pour l'encadrement des traitements de données à caractère personnel, a laissé apparaître, dès son adoption, de nombreuses difficultés dans le domaine de la recherche scientifique. Diverses modifications et adaptations sont intervenues - 1986, 1994, 2004 - à l'aune desquelles, il fallait déterminer l'encadrement des traitements de données personnelles à des fins de recherche scientifique. De cette investigation, il résulte que la loi Informatique et Libertés pose les principes de base de la protection des données traitées dans le domaine de la recherche scientifique en prévoyant un encadrement a priori de la collecte des données et un suivi et un contrôle a posteriori de la mise en œuvre du traitement. L'encadrement a priori vise principalement à la garantie de la qualité scientifique des projets de recherches. Inhérent à la finalité scientifique du traitement des données, le suivi a posteriori tend, quant à lui, à garantir le respect de certaines règles comme la compatibilité des réutilisations des données, la présentation et l'utilisation des résultats de la recherche dans des conditions ne devant pas porter atteinte aux personnes. Parce que ne pouvant pas relever de la seule intervention du responsable du traitement, le suivi a posteriori se complète d'un contrôle a posteriori opéré autant par la personne concernée, la CNIL, les juridictions. Dans le domaine de la recherche scientifique, ces différents contrôles pourraient opportunément se compléter par une intervention de la communauté des chercheurs en question. Il s'agit de l'autorégulation. En définitive, une protection efficiente des données à caractère personnel résultera d'un système de régulation à plusieurs niveaux et acteurs dont chacun doit effectivement utiliser les moyens d'action qui lui sont reconnus.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Černohorský, Jan. „Řízení provozu IT v modelu MBI se zaměřením na prostředí středních škol“. Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-193928.

Der volle Inhalt der Quelle
Annotation:
The aim of my thesis is to elucitade MBI model to primary and secondary educational system, it means to schools and their elected IT processes from practical point of view. The reference model of Management Business Information is developed at the Department of Information at the Faculty of Information and Statistics at the School of Economics in Prague. The theoretical part of my thesis deals with elucitading of the reference MBI model to a reader. It briefly summarizes IT processes at educational system and refers to sources used while defining new MBI objects. This chapter also defines elected IT processes at educational system for which there are made MBI objects in a practical part of my thesis. In practical part of my thesis there are made proposals of defined objects including samples of documentation patterns. These objects are presented in charts that correspond with a format of MBI objects. In the last part of my thesis there is an example of applying the defined objects in practice while solving the process of installation the safety (camera) system with recording -- personal data processing. The proposals of defined objects are also published on MBI portal.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Wells, William Ward. „Information security program development“. CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2585.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Maguraushe, Kudakwashe. „Development of a diagnostic instrument and privacy model for student personal information privacy perceptions at a Zimbabwean university“. Thesis, 2021. http://hdl.handle.net/10500/27557.

Der volle Inhalt der Quelle
Annotation:
Orientation: The safety of any natural being with respect to the processing of their personal information is an essential human right as specified in the Zimbabwe Data Protection Act (ZDPA) bill. Once enacted, the ZDPA bill will affect universities as public entities. It will directly impact how personal information is collected and processed. The bill will be fundamental in understanding the privacy perceptions of students in relation to privacy awareness, privacy expectations and confidence within university. These need to be understood to give guidelines to universities on the implementation of the ZPDA. Problem Statement: The current constitution and the ZDPA are not sufficient to give organisations guidelines on ensuring personal information privacy. There is need for guidelines to help organisations and institutions to implement and comply with the provisions of the ZDPA in the context of Zimbabwe. The privacy regulations, regarded as the three concepts (awareness, expectations and confidence), were used to determine the student perceptions. These three concepts have not been researched before in the privacy context and the relationship between the three concepts has not as yet been established. Research purpose: The main aim of the study was to develop and validate an Information Privacy Perception Survey (IPPS) diagnostic tool and a Student Personal Information Privacy Perception (SPIPP) model to give guidelines to universities on how they can implement the ZDPA and aid universities in comprehending student privacy perceptions to safeguard personal information and assist in giving effect to their privacy constitutional right. Research Methodology: A quantitative research method was used in a deductive research approach where a survey research strategy was applied using the IPPS instrument for data collection. The IPPS instrument was designed with 54 items that were developed from the literature. The preliminary instrument was taken through both the expert review and pilot study. Using the non-probability convenience sampling method, 287 students participated in the final survey. SPSS version 25 was used for data analysis. Both descriptive and inferential statistics were done. Exploratory factor analysis (EFA) was used to validate the instrument while confirmatory factor analysis (CFA) and the structural equation modelling (SEM) were used to validate the model. Main findings: diagnostic instrument was validated and resulted in seven new factors, namely university confidence (UC), privacy expectations (PE), individual awareness (IA), external awareness (EA), privacy awareness (PA), practice confidence (PC) and correctness expectations (CE). Students indicated that they had high expectations of the university on privacy. The new factors showed a high level of awareness of privacy and had low confidence in the university safeguarding their personal information privacy. A SPIPP empirical model was also validated using structural equation modelling (SEM) and it indicated an average overall good fit between the proposed SPIPP conceptual model and the empirically derived SPIPP model Contribution: A diagnostic instrument that measures the perceptions (privacy awareness, expectations and confidence of students) was developed and validated. This study further contributed a model for information privacy perceptions that illustrates the relationship between the three concepts (awareness, expectations and confidence). Other universities can use the model to ascertain the perceptions of students on privacy. This research also contributes to improvement in the personal information protection of students processed by universities. The results will aid university management and information regulators to implement measures to create a culture of privacy and to protect student data in line with regulatory requirements and best practice.
School of Computing
Ph. D. (Information Systems)
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

CHEN, CHIEN-YUN, und 陳倩韻. „The Theory and Practice of Data Protection after the Amendment of the New Data Protection Act“. Thesis, 2017. http://ndltd.ncl.edu.tw/handle/97560954807508456263.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Miau-chih, Chou, und 周妙枝. „A Study on Punishment in Personal Data Protection Act“. Thesis, 2014. http://ndltd.ncl.edu.tw/handle/96157410474783054489.

Der volle Inhalt der Quelle
Annotation:
碩士
東吳大學
法律學系
102
"Personal Data Protection Act," revised from "Computer Processing of Personal Data Protection Act," amended and promulgated on May 26, 2010, was announced October 1, 2012. Its focus on amending the law on criminal responsibility, the main object is to extend the penalty-profit and non-violation of norms intent crime, and violations of intent for profit, increase criminal liability to five years imprisonment, and a NT $ 1 million fines will also intent on profit and public agencies committed the crime of obstruction of a lawsuit to recover assets correctness requirements to non-telling is on. The new law provides for a penalty of about funding, in addition to the violation of the criminal law seems clear Elements of the basic requirements, there is also the main crime problem is unknown and in criminal and non-exploitative degree of blame were treated in other countries. With regard to those points, in this paper asserts: (a) to avoiding implicated too broad, should be deleted non-exploitative criminal violation of Personal Data Protection this Act, instead of torts damages or administrative penalties; (b) to avoid to conflict with The Freedom of Government Information Law and contrary to the original intention of the legislation, public schools, public hospitals, social education institutions and other non-exercise of public authority of local or central authorities should be included in the scope of official authority specification; (c) for the avoidance of too general to expand the definition of personal data, should be added "can recognize the individual's data" after the exemplified regulations, and too difficult to distinguish the sensitivity of personal information, can be used the "health" instead of "medical", "health" and "health check"; (d) the statistical or scholarly study of the individual to whom the information collection, processing, use, or outside Objective , should have a higher public nature, and should then set certain provisions in the program party terribly.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Liang, Yi-Fang, und 梁憶芳. „A Personal Data Risk Management System Based on Personal Data Protection Act“. Thesis, 2015. http://ndltd.ncl.edu.tw/handle/8ttrz8.

Der volle Inhalt der Quelle
Annotation:
碩士
國立中興大學
資訊科學與工程學系
103
In order to catch up with international trends on regulating privacy protection, Taiwan government revised the Personal Information Protection Act in 2010. Since then, the national universities and colleges started actively to implement the Personal Information Management System (PIMS) for complying with the law. In the universities of Taiwan, most of the personal information records are stored in the information systems that are developed and maintained by the computer centers. Therefore, the computer centers are usually assigned to take charge of developing the Personal Information Management System. Even though, the computer centers have the experience on deploying the Information Security Management System (ISMS), they still face the challenges on developing a good PIMS due to lack of life cycle management of personal information in ISMS. In this thesis, based on the lessons learned from developing PIMS systems by National Chung Hsing University and Feng Chia University, we design and develop a personal data risk management system based on Personal Data Protection Act by adding version control and risk management modules to the PIMS system. The developed PIMS has been installed in Chung Shan Medical University, and it can be used as a demo site for the PIMS system.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Nai-Kang, Huang, und 黃迺康. „A Study of Management Mechanism for Enterprise Privacy Protection Based on Personal Data Protection Act“. Thesis, 2011. http://ndltd.ncl.edu.tw/handle/97067221936394110771.

Der volle Inhalt der Quelle
Annotation:
碩士
國立中正大學
會計與資訊科技研究所
99
The Legislative Yuan passed the Personal Data Protection Act on April 27th, 2010, and it let the personal data protection issues call the public's attention. In the future organization, regardless of their size or the amount of personal data, will be subject to the Personal Data Protection Act. It affect the data collection and processing way and the marketing practices, and it also increase criminal penalties and compensation that is up to $200 million when the enterprise is against the law. Therefore, the enterprise should engage in planning and implement information security protection of personal data at this stage in quickly. ISO 27001 is an international standard of information security management system. But this is not representative for the integrity of personal data protection in the enterprise when they follow ISO 27001. The enterprise’s information security is focus on the confidential information and less to the customer's personal data. As a result, it make inadequate on personal data protection and enhance the possibility of conflict with the law. In this situation, the enterprise must adjust and build the appropriate security structure to control personal data processes to meet compliance requirements. So they require a complete set of standards to follow to ensure the enterprise adjust properly, comply with regulations, and fulfill the obligation of protecting personal data. This study applies the Gowin's Vee research strategy. In the conceptual side, we sorted out 4 control domains, 15 control objectives, and 75 control measures which develop the Enterprise Privacy Protection Management Mechanism by literature review about Personal Information Management System and Personal Data Protection Act. Then we apply the Delphi Expert Questionnaires to fix this mechanism and add a new control measure. In the methodological side, we use the case study to verify and assessment the practicality and availability of this mechanism. This research shows that the research outcome, the Enterprise Privacy Protection Management Mechanism, provides organizations a reference and compliance purpose to help them obey the law, reduce the risk of litigation, and fulfill the responsibilities of protect personal data.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

WEI-CHU, LUO, und 羅偉助. „A study of the information free act and the protection of personal data act in Japan“. Thesis, 2003. http://ndltd.ncl.edu.tw/handle/91241137043285248940.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "Zimbabwe Data Protection Act"

1

Evans, Alistair. The data protection act. [s.l.]: Institue of Supervisory Management, 1985.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Hely, Michael H. M. Data Protection Act 1984. [Abingdon]: [TaskComputer Services], 1985.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Oppenheim, Charles. The Data Protection Act 1988. [Loughborough]: SCONUL, 2000.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Congress, Trades Union. Data Protection Act: TUC briefing. London: Trades Union Congress, 2000.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Holton, Andrew. The Data Protection Act 1998. London: ABG Professional Information, 2000.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

McNally & co. [from old catalog] Rand. The 1988 Data Protection Act. 2. Aufl. London: Stationery Office, 2000.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Registrar, Data protection. The Data Protection Act 1984. Springfiled House: Wilmslow, 1985.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

McNally & co. [from old catalog] Rand. The 1998 Data Protection Act. London: Stationery Office, 1999.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Office, Home. Protecting personal data: The Data Protection Act 1984. London: Home Office, 1985.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Veale, Sarah. Data Protection Act 1998: TUC briefing. London: Trades Union Congress, 1998.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Zimbabwe Data Protection Act"

1

Ncube, Caroline B. „Data Protection in Zimbabwe“. In African Data Privacy Laws, 99–116. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47317-8_5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Nahler, Gerhard. „data protection act“. In Dictionary of Pharmaceutical Medicine, 47. Vienna: Springer Vienna, 2009. http://dx.doi.org/10.1007/978-3-211-89836-9_351.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Manton, Kevin. „The 1984 Data Protection Act“. In Population Registers and Privacy in Britain, 1936—1984, 193–216. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02753-7_9.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Jeffree, Pauline. „The Data Protection Act 1984“. In The Practice Nurse, 6–8. Boston, MA: Springer US, 1994. http://dx.doi.org/10.1007/978-1-4899-6874-6_2.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Cieh, Edwin Lee Yong. „Personal Data Protection Act 2010: An Overview Analysis“. In Beyond Data Protection, 31–64. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33081-0_3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Zarsky, Tal Z. „The Data Mining Balancing Act“. In European Data Protection: In Good Health?, 79–101. Dordrecht: Springer Netherlands, 2012. http://dx.doi.org/10.1007/978-94-007-2903-2_5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Cieh, Edwin Lee Yong. „Limitations of the Personal Data Protection Act 2010 and Personal Data Protection in Selected Sectors“. In Beyond Data Protection, 65–98. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33081-0_4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Rajadorai, Kesava Pillai, Vazeerudeen Abdul Hameed und Selvakumar Samuel. „Data Protection and Data Privacy Act for BIG DATA Governance“. In Services and Business Process Reengineering, 189–211. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1007-3_11.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Kohnstamm, Jacob. „Getting Our Act Together: European Data Protection Authorities Face Up to Silicon Valley“. In Law, Governance and Technology Series, 455–72. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-25047-2_19.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Alunge, Rogers. „Consolidating the Right to Data Protection in the Information Age: A Comparative Appraisal of the Adoption of the OECD (Revised) Guidelines into the EU GDPR, the Ghanaian Data Protection Act 2012 and the Kenyan Data Protection Act 2019“. In Innovations and Interdisciplinary Solutions for Underserved Areas, 192–207. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51051-0_14.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Zimbabwe Data Protection Act"

1

Room, S., und R. Cohen. „The requirements of the Data Protection Act 1998“. In IET Conference on Crime and Security. IEE, 2006. http://dx.doi.org/10.1049/ic:20060318.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Baskaran, Hasventhran, Salman Yussof, Fiza Abdul Rahim und Asmidar Abu Bakar. „Blockchain and the Personal Data Protection Act 2010 (PDPA) in Malaysia“. In 2020 8th International Conference on Information Technology and Multimedia (ICIMU). IEEE, 2020. http://dx.doi.org/10.1109/icimu49871.2020.9243493.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Srinivasan, S. „Privacy Protection and Data Breaches“. In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2261.

Der volle Inhalt der Quelle
Annotation:
Data breach is the act of accessing a central data repository without the consent of the data owner. Data breaches are occurring frequently and involve millions of records. Major breaches have been reported since 2005. Often data breaches occur due to someone with malicious intent accessing the stored data. In this paper we look at the types of data breaches and how they impact people’s privacy, we introduce a data protection model with the goal of protecting people’s privacy. Given today’s mobile information needs it is essential to have access to personal data. Social networks are making it difficult to keep personal information private. We provide several different summaries to show the effect of data breaches and data losses on people. We conclude this paper with a set of recommendations to protect people’s privacy.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Apriyanti, Ira. „The Urgency of Establishing Personal Data Protection Act and Financial Technology Act in Digital Era in order to Protect and Control the Privacy in Indonesia“. In 3rd International Conference on Law and Governance (ICLAVE 2019). Paris, France: Atlantis Press, 2020. http://dx.doi.org/10.2991/aebmr.k.200321.045.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Amini, Elham, Ruslan Muydinov, Bernd Szyszka und Christian Boit. „Backside Protection Structure for Security Sensitive ICs“. In ISTFA 2017. ASM International, 2017. http://dx.doi.org/10.31399/asm.cp.istfa2017p0279.

Der volle Inhalt der Quelle
Annotation:
Abstract Modern integrated circuits (ICs) are in permanent risk of hardware attacks on sensitive data. But, proper and affordable protection of the IC backside against Focused Ion Beam (FIB) and optical fault injection attacks is missing. In this work, we investigate a patent [1] that uses p-n junctions as light emitters (forward bias) and detectors. We improved the backside detection mechanism presented in the patent by developing a test structure and adding an optically active layer on the backside as protective element to detect an attacked backside with electrical signals in the IC. The angle dependent reflection provided by the layer acts as the protective function. We demonstrate how the light emission and detection concept is quantitatively working and how the active layer produces a backside layer integrity related signal in the IC which can act as attack indicator. We also show that, due to the weak light emission intensity of silicon and the high excitation current, influences such as multi-angle reflection and stray current are reducing the angle-dependent effect on the signal and have to be taken into account in practical use.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Panteleeva, Vanya. „Transposition of Directive (EU) 2016/680 of the European Parliament and of the Council of 27 April 2016 in Personal Data Protection Act in Republic of Bulgaria“. In The 7th International Scientific Conference of the Faculty of Law of the University of Latvia. University of Latvia, 2020. http://dx.doi.org/10.22364/iscflul.7.2.17.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Kelmere, Laila. „Protection of employees in insolvency proceedings“. In 21st International Scientific Conference "Economic Science for Rural Development 2020". Latvia University of Life Sciences and Technologies. Faculty of Economics and Social Development, 2020. http://dx.doi.org/10.22616/esrd.2020.53.010.

Der volle Inhalt der Quelle
Annotation:
When an enterprise becomes insolvent, it affects the partners (suppliers) of the company, the State and has a significant impact on the employees. The issue of the protection of workers' rights is one of the most important aspects in situations where the employer is declared insolvent. The country can develop its own employee protection system in case of company’s insolvency. In this article, based on the statistical data for the period 2003 – 2019, the author analyses the situation in Latvia. The aim of the study is to analyse the existing employee protection mechanism in Latvia, which the State implements with the help of state entrepreneurial risk fee. Two ways of protecting the rights of employees or satisfying claims are distinguished: a privilege system and a guarantee system. Latvia chooses the guarantee system. In this article, based on the statistical data obtained, it is proved that the model chosen by Latvia is financially successful although creates a negligible burden for entrepreneurs, and its benefits are significant because, in line with the situation of Latvia, sufficient financial resources are accumulated each year and employees' claims are covered to a certain amount according to regulations in enactments, as well as the Income Tax and Mandatory State Social Insurance Contributions are paid from these requirements covered by the guarantee fund. The author considers that the State may act as an intermediary or insurer in the insolvency situations of an undertaking in order to protect employees and, in particular, the State budget from covering unforeseeable costs.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Mitrović, Ljubinko, und Predrag Raosavljević. „HUMAN RIGHTS OMBUDSMEN IN THE PANDEMIC: CHALLENGES IN PROTECTION OF VULNERABLE GROUPS“. In EU 2021 – The future of the EU in and after the pandemic. Faculty of Law, Josip Juraj Strossmayer University of Osijek, 2021. http://dx.doi.org/10.25234/eclic/18353.

Der volle Inhalt der Quelle
Annotation:
Pandemic of virus COVID-19 posed numerous and unprecedented challenges to citizens and authorities which required shift in behavior and actions of all segments of society. Representing Ombudsmen Institution of Bosnia and Herzegovina, authors shared their experience in monitoring implementation of the decisions of all levels of government and presented challenges in striking the right balance between interests of public health and protection of rights of vulnerable groups. Public authorities in Bosnia and Herzegovina have passed emergency measures aimed at containing the spread of virus, but some of them failed to maintain human rights standards. Following the decisions of crisis centers to limit the freedom of movement, it was necessary to secure rights of children to education, protection from domestic violence and neglect in the family context. In introducing online education, authorities were asked to adapt recognition and grading system to the children in different conditions and circumstances, especially to the children with difficulties in development, children living in poverty and on margins of society such as Roma children or those living in institutions. Ombudsmen Institution registered increase in the number of domestic violence cases because measures limiting freedom of movement had impact on victims' ability to seek help from trusted sources, usually members of immediate family or representatives of law enforcement agencies. Having in mind that large number of citizens could not afford access to the official gazettes in any form, Ombudsmen requested that all enacted legislation be accessible online recommended that the decision banning reporters from conferences be reconsidered, guided by the right of citizens to be informed of their government actions. Examining the practice of placing COVID stickers on mail by the Post Office, Ombudsmen issued recommendation to stop such practice as it was deemed disproportional to the right to privacy and protection of personal data, while the protection of postal workers could have been ensured by other protective measures. It also became evident that national budgetary capacities had to be increased in order to prevent deterioration in provision of basic public services such as health and social protection, since economic consequences of the pandemic were disproportionally felt by the groups exposed to poverty, such as Roma, refugees or migrants. Drawing conclusion from concrete cases, authors offer review of particular emergency measures, analyze their adequacy, justifiability and timeliness, while presenting authorities’ response to Ombudsmen’s findings in formulating more adequate and efficient but, at the same time, least intrusive measures taken in response to the disaster. In search of common response to such widespread phenomenon, governments should recognize the intention of Ombudsmen Institutions to be in „permanent session“ over protection of vulnerable groups and should more actively involve it in discussions on emergency measures and their effect on human rights and freedoms. It proved to be better suited to act quickly, to apply more effective remedies and to correct government actions thanks to its knowledge of the local context than traditional institutions for protection of human rights, such as constitutional courts, international courts or treaty bodies.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Olsen, Daniel B., und Bryan D. Willson. „The Effect of Parametric Variations on Formaldehyde Emissions From a Large Bore Natural Gas Engine“. In ASME 2002 Internal Combustion Engine Division Spring Technical Conference. ASMEDC, 2002. http://dx.doi.org/10.1115/ices2002-446.

Der volle Inhalt der Quelle
Annotation:
Formaldehyde is a hazardous air pollutant (HAP) that is typically emitted from natural gas-fired internal combustion engines as a product of incomplete combustion. The US Environmental Protection Agency (EPA) is currently developing national emission standards to regulate HAP emissions, including formaldehyde, from stationary reciprocating internal combustion engines under Title III of the 1990 Clean Air Act Amendments. This work investigates the effect that variations of engine operating parameters have on formaldehyde emissions from a large bore natural gas engine. The subject engine is a Cooper-Bessemer GMV-4TF two-stroke cycle engine with a 14″ (36 cm) bore and a 14″ (36 cm) stroke. Engine parameter variations investigated include load, boost, ignition timing, inlet air humidity ratio, air manifold temperature, jacket water temperature, prechamber fuel supply pressure, exhaust backpressure, and speed. The data analysis and interpretation is performed with reference to possible formaldehyde formation mechanisms and in-cylinder phenomena.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Araujo, Paulo, José Carlos Teixeira, Dionisio Silveira, Elisabete Silva, Delfim Soares, Raul Fangueiro und Maria Cândida Vilarinho. „Development of Fiber Structures for High Performance Heat Resistant Curtains“. In ASME 2020 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/imece2020-24016.

Der volle Inhalt der Quelle
Annotation:
Abstract The protection of human life and goods assumes a growing concern in all forms of activities. The fire and smoke curtains have as main role to act as a physical barrier to prevent the fire from spreading between spaces as well as to staunch the smoke and heat transfer to adjacent areas. They can also be easily operated (opening and closing) causing a minimal interference with the flow of materials and humans within confines spaces, such as warehouses and industries, while providing adequate protection. Thus, there are a set of characteristics that these products must exhibit high fire protection, thermal resistance and gas impermeability. The classification of the heat resistance, described in the European Standard BS EN 1634-1: Fire resistance and smoke control tests for door, shutter and, openable window assemblies and elements of building hardware — fire resistance tests for doors, shutters and openable windows, is the procedure that allows determining the response of a product in contributing by its decomposition to a fire to which it is exposed, being according to three criteria: (i) integrity, (ii) insulation and (iii) radiation. Usually curtains are based on fiber-based structures which can be coated to enhance their protective capabilities. In addition, the fibrous structure can be tailored to optimize its behaviour using 2D and 3D complex architectures, with single or multiple materials. The performance assessment of the curtains regarding the aforementioned parameters is performed resorting to several experimental procedures that are detailed in the specific standards. The present paper reports the development of novel fibrous structures used for heat protection curtains. They are based on the various combinations of hybrid structures combining 2 or 3 different yarn materials. The tests are carried out in a purpose built oven that induces a steep temperature rate (approximately 600 °C in 5 min) on one side of the sample followed by a slower rate up to 950 °C in 60 min. The sample is placed under stress during the test in order to mimic that caused by its own weight. Thermocouples monitor the temperature on both sides of the sample and its integrity is assessed by both the occurrence of fabric rupture and smoke release due to ignition. Both the fabric integrity and the temperature on the back side of the sample are an indicator of its performance which follows the European Standard BS EN 13501-2: Fire classification of construction products and building elements. Classification using data from fire resistance tests, excluding ventilation services. From the results one can conclude that hybrid structures, including either basalt and glass fibers, are the most suitable.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Berichte der Organisationen zum Thema "Zimbabwe Data Protection Act"

1

Arends, J., und William F. Sandusky. American Recovery and Reinvestment Act Federal Energy Management Program Technical Assistance Project 184 U.S. Customs and Border Protection Data Center, Springfield, Virginia. Office of Scientific and Technical Information (OSTI), September 2010. http://dx.doi.org/10.2172/1000147.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Kennedy, Alan, David Moore und Taylor Rycroft. Field survey to prioritize needs for modernizing dredged material evaluation guidance. Engineer Research and Development Center (U.S.), Mai 2021. http://dx.doi.org/10.21079/11681/40701.

Der volle Inhalt der Quelle
Annotation:
This technical note synthesizes and disseminates results of a 2020 survey of USACE dredging program and project managers to identify and prioritize needs related to the modernization and streamlining of the dredged material assessment decision guidance pursuant to Section 404 of the Clean Water Act (CWA) and Section 103 of the Marine Protection Research and Sanctuaries Act (MPRSA). Priorities identified through the survey and subsequent follow-on interviews—together with advances in science and technology—will facilitate development of an electronic decision guidance tool to enable consistent, timely, and cost-effective dredged material management decisions. This tool will also facilitate a standardized database for ready access to historical data.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Bedford, Philip, Alexis Long, Thomas Long, Erin Milliken, Lauren Thomas und Alexis Yelvington. Legal Mechanisms for Mitigating Flood Impacts in Texas Coastal Communities. Herausgegeben von Gabriel Eckstein. Texas A&M University School of Law Program in Natural Resources Systems, Mai 2019. http://dx.doi.org/10.37419/eenrs.mitigatingfloodimpactstx.

Der volle Inhalt der Quelle
Annotation:
Flooding is a major source of concern for Texas’ coastal communities. It affects the quality of infrastructure, the lives of citizens, and the ecological systems upon which coastal communities in Texas rely. To plan for and mitigate the impacts of flooding, Texas coastal communities may implement land use tools such as zoning, drainage utility systems, eminent domain, exactions, and easements. Additionally, these communities can benefit from understanding how flooding affects water quality and the tools available to restore water bodies to healthy water quality levels. Finally, implementing additional programs for education and ecotourism will help citizens develop knowledge of the impacts of flooding and ways to plan and mitigate for coastal flooding. Land use tools can help communities plan for and mitigate flooding. Section III addresses zoning, a land use tool that most municipalities already utilize to organize development. Zoning can help mitigate flooding, drainage, and water quality issues, which, Texas coastal communities continually battle. Section IV discusses municipal drainage utility systems, which are a mechanism available to municipalities to generate dedicated funds that can help offset costs associated with providing stormwater management. Section V addresses land use and revenue-building tools such as easements, eminent domain, and exactions, which are vital for maintaining existing and new developments in Texas coastal communities. Additionally, Section VI addresses conservation easements, which are a flexible tool that can enhance community resilience through increasing purchase power, establishing protected legal rights, and minimizing hazardous flood impacts. Maintaining good water quality is important for sustaining the diverse ecosystems located within and around Texas coastal communities. Water quality is regulated at the federal level through the Clean Water Act. As discussed in Section VII, the state of Texas is authorized to implement and enforce these regulations by implementing point source and nonpoint source pollutants programs, issuing permits, implementing stormwater discharge programs, collecting water quality data, and setting water quality standards. The state of Texas also assists local communities with implementing restorative programs, such as Watershed Protection Programs, to help local stakeholders restore impaired water bodies. Section VIII addresses ecotourism and how these distinct economic initiatives can help highlight the importance of ecosystem services to local communities. Section VIX discusses the role of education in improving awareness within the community and among visitors, and how making conscious decisions can allow coastal communities to protect their ecosystem and protect against flooding.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie