Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Zimbabwe Data Protection Act“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Zimbabwe Data Protection Act" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Zimbabwe Data Protection Act"
Musiwa, Anthony Shuko. „How Has the Presence of Zimbabwe’s Victim-Friendly Court and Relevant Child Protection Policy and Legal Frameworks Affected the Management of Intrafamilial Child Sexual Abuse in Zimbabwe? The Case of Marondera District“. Journal of Interpersonal Violence 33, Nr. 11 (08.05.2018): 1748–77. http://dx.doi.org/10.1177/0886260517752154.
Der volle Inhalt der QuelleGossman, P., und J. R. Wilkinson. „Data Protection Act.“ BMJ 295, Nr. 6610 (28.11.1987): 1418. http://dx.doi.org/10.1136/bmj.295.6610.1418.
Der volle Inhalt der QuellePriest, R. G. „Data Protection Act“. Psychiatric Bulletin 12, Nr. 5 (01.05.1988): 204. http://dx.doi.org/10.1192/pb.12.5.204.
Der volle Inhalt der QuellePriest, R. G. „Data Protection Act“. Bulletin of the Royal College of Psychiatrists 12, Nr. 5 (Mai 1988): 204. http://dx.doi.org/10.1192/s0140078900020162.
Der volle Inhalt der QuelleLorains, John W. „Data Protection Act 1987“. Practical Diabetes International 6, Nr. 3 (Mai 1989): 140. http://dx.doi.org/10.1002/pdi.1960060316.
Der volle Inhalt der QuelleGripper, J. „Data Protection Act 1984“. Veterinary Record 117, Nr. 23 (07.12.1985): 615. http://dx.doi.org/10.1136/vr.117.23.615.
Der volle Inhalt der QuelleRaymont, Patrick. „The Data Protection Act“. Physics Bulletin 37, Nr. 4 (April 1986): 161–63. http://dx.doi.org/10.1088/0031-9112/37/4/026.
Der volle Inhalt der QuelleChitimira, Howard. „An Analysis of Socio-Economic and Cultural Rights Protection under the Zimbabwe Constitution of 2013“. Journal of African Law 61, Nr. 2 (11.04.2017): 171–96. http://dx.doi.org/10.1017/s0021855317000109.
Der volle Inhalt der QuelleKong, L. „Enacting China's Data Protection Act“. International Journal of Law and Information Technology 18, Nr. 3 (05.03.2010): 197–226. http://dx.doi.org/10.1093/ijlit/eaq003.
Der volle Inhalt der QuellePhair, Lynne, und Julie Lee Winsor. „The new data protection act“. Nursing Older People 12, Nr. 6 (01.09.2000): 32–33. http://dx.doi.org/10.7748/nop.12.6.32.s16.
Der volle Inhalt der QuelleDissertationen zum Thema "Zimbabwe Data Protection Act"
Cheng, Sin Ying. „Health Insurance Portability and Accountability Act (HIPAA)-compliant privacy access control model for Web services /“. View abstract or full-text, 2006. http://library.ust.hk/cgi/db/thesis.pl?COMP%202006%20CHENGS.
Der volle Inhalt der QuelleCoulibaly, Ibrahim. „La protection des données à caractère personnel dans le domaine de la recherche scientifique“. Phd thesis, Université de Grenoble, 2011. http://tel.archives-ouvertes.fr/tel-00798112.
Der volle Inhalt der QuelleČernohorský, Jan. „Řízení provozu IT v modelu MBI se zaměřením na prostředí středních škol“. Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-193928.
Der volle Inhalt der QuelleWells, William Ward. „Information security program development“. CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2585.
Der volle Inhalt der QuelleMaguraushe, Kudakwashe. „Development of a diagnostic instrument and privacy model for student personal information privacy perceptions at a Zimbabwean university“. Thesis, 2021. http://hdl.handle.net/10500/27557.
Der volle Inhalt der QuelleSchool of Computing
Ph. D. (Information Systems)
CHEN, CHIEN-YUN, und 陳倩韻. „The Theory and Practice of Data Protection after the Amendment of the New Data Protection Act“. Thesis, 2017. http://ndltd.ncl.edu.tw/handle/97560954807508456263.
Der volle Inhalt der QuelleMiau-chih, Chou, und 周妙枝. „A Study on Punishment in Personal Data Protection Act“. Thesis, 2014. http://ndltd.ncl.edu.tw/handle/96157410474783054489.
Der volle Inhalt der Quelle東吳大學
法律學系
102
"Personal Data Protection Act," revised from "Computer Processing of Personal Data Protection Act," amended and promulgated on May 26, 2010, was announced October 1, 2012. Its focus on amending the law on criminal responsibility, the main object is to extend the penalty-profit and non-violation of norms intent crime, and violations of intent for profit, increase criminal liability to five years imprisonment, and a NT $ 1 million fines will also intent on profit and public agencies committed the crime of obstruction of a lawsuit to recover assets correctness requirements to non-telling is on. The new law provides for a penalty of about funding, in addition to the violation of the criminal law seems clear Elements of the basic requirements, there is also the main crime problem is unknown and in criminal and non-exploitative degree of blame were treated in other countries. With regard to those points, in this paper asserts: (a) to avoiding implicated too broad, should be deleted non-exploitative criminal violation of Personal Data Protection this Act, instead of torts damages or administrative penalties; (b) to avoid to conflict with The Freedom of Government Information Law and contrary to the original intention of the legislation, public schools, public hospitals, social education institutions and other non-exercise of public authority of local or central authorities should be included in the scope of official authority specification; (c) for the avoidance of too general to expand the definition of personal data, should be added "can recognize the individual's data" after the exemplified regulations, and too difficult to distinguish the sensitivity of personal information, can be used the "health" instead of "medical", "health" and "health check"; (d) the statistical or scholarly study of the individual to whom the information collection, processing, use, or outside Objective , should have a higher public nature, and should then set certain provisions in the program party terribly.
Liang, Yi-Fang, und 梁憶芳. „A Personal Data Risk Management System Based on Personal Data Protection Act“. Thesis, 2015. http://ndltd.ncl.edu.tw/handle/8ttrz8.
Der volle Inhalt der Quelle國立中興大學
資訊科學與工程學系
103
In order to catch up with international trends on regulating privacy protection, Taiwan government revised the Personal Information Protection Act in 2010. Since then, the national universities and colleges started actively to implement the Personal Information Management System (PIMS) for complying with the law. In the universities of Taiwan, most of the personal information records are stored in the information systems that are developed and maintained by the computer centers. Therefore, the computer centers are usually assigned to take charge of developing the Personal Information Management System. Even though, the computer centers have the experience on deploying the Information Security Management System (ISMS), they still face the challenges on developing a good PIMS due to lack of life cycle management of personal information in ISMS. In this thesis, based on the lessons learned from developing PIMS systems by National Chung Hsing University and Feng Chia University, we design and develop a personal data risk management system based on Personal Data Protection Act by adding version control and risk management modules to the PIMS system. The developed PIMS has been installed in Chung Shan Medical University, and it can be used as a demo site for the PIMS system.
Nai-Kang, Huang, und 黃迺康. „A Study of Management Mechanism for Enterprise Privacy Protection Based on Personal Data Protection Act“. Thesis, 2011. http://ndltd.ncl.edu.tw/handle/97067221936394110771.
Der volle Inhalt der Quelle國立中正大學
會計與資訊科技研究所
99
The Legislative Yuan passed the Personal Data Protection Act on April 27th, 2010, and it let the personal data protection issues call the public's attention. In the future organization, regardless of their size or the amount of personal data, will be subject to the Personal Data Protection Act. It affect the data collection and processing way and the marketing practices, and it also increase criminal penalties and compensation that is up to $200 million when the enterprise is against the law. Therefore, the enterprise should engage in planning and implement information security protection of personal data at this stage in quickly. ISO 27001 is an international standard of information security management system. But this is not representative for the integrity of personal data protection in the enterprise when they follow ISO 27001. The enterprise’s information security is focus on the confidential information and less to the customer's personal data. As a result, it make inadequate on personal data protection and enhance the possibility of conflict with the law. In this situation, the enterprise must adjust and build the appropriate security structure to control personal data processes to meet compliance requirements. So they require a complete set of standards to follow to ensure the enterprise adjust properly, comply with regulations, and fulfill the obligation of protecting personal data. This study applies the Gowin's Vee research strategy. In the conceptual side, we sorted out 4 control domains, 15 control objectives, and 75 control measures which develop the Enterprise Privacy Protection Management Mechanism by literature review about Personal Information Management System and Personal Data Protection Act. Then we apply the Delphi Expert Questionnaires to fix this mechanism and add a new control measure. In the methodological side, we use the case study to verify and assessment the practicality and availability of this mechanism. This research shows that the research outcome, the Enterprise Privacy Protection Management Mechanism, provides organizations a reference and compliance purpose to help them obey the law, reduce the risk of litigation, and fulfill the responsibilities of protect personal data.
WEI-CHU, LUO, und 羅偉助. „A study of the information free act and the protection of personal data act in Japan“. Thesis, 2003. http://ndltd.ncl.edu.tw/handle/91241137043285248940.
Der volle Inhalt der QuelleBücher zum Thema "Zimbabwe Data Protection Act"
Evans, Alistair. The data protection act. [s.l.]: Institue of Supervisory Management, 1985.
Den vollen Inhalt der Quelle findenHely, Michael H. M. Data Protection Act 1984. [Abingdon]: [TaskComputer Services], 1985.
Den vollen Inhalt der Quelle findenOppenheim, Charles. The Data Protection Act 1988. [Loughborough]: SCONUL, 2000.
Den vollen Inhalt der Quelle findenCongress, Trades Union. Data Protection Act: TUC briefing. London: Trades Union Congress, 2000.
Den vollen Inhalt der Quelle findenHolton, Andrew. The Data Protection Act 1998. London: ABG Professional Information, 2000.
Den vollen Inhalt der Quelle findenMcNally & co. [from old catalog] Rand. The 1988 Data Protection Act. 2. Aufl. London: Stationery Office, 2000.
Den vollen Inhalt der Quelle findenRegistrar, Data protection. The Data Protection Act 1984. Springfiled House: Wilmslow, 1985.
Den vollen Inhalt der Quelle findenMcNally & co. [from old catalog] Rand. The 1998 Data Protection Act. London: Stationery Office, 1999.
Den vollen Inhalt der Quelle findenOffice, Home. Protecting personal data: The Data Protection Act 1984. London: Home Office, 1985.
Den vollen Inhalt der Quelle findenVeale, Sarah. Data Protection Act 1998: TUC briefing. London: Trades Union Congress, 1998.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Zimbabwe Data Protection Act"
Ncube, Caroline B. „Data Protection in Zimbabwe“. In African Data Privacy Laws, 99–116. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47317-8_5.
Der volle Inhalt der QuelleNahler, Gerhard. „data protection act“. In Dictionary of Pharmaceutical Medicine, 47. Vienna: Springer Vienna, 2009. http://dx.doi.org/10.1007/978-3-211-89836-9_351.
Der volle Inhalt der QuelleManton, Kevin. „The 1984 Data Protection Act“. In Population Registers and Privacy in Britain, 1936—1984, 193–216. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02753-7_9.
Der volle Inhalt der QuelleJeffree, Pauline. „The Data Protection Act 1984“. In The Practice Nurse, 6–8. Boston, MA: Springer US, 1994. http://dx.doi.org/10.1007/978-1-4899-6874-6_2.
Der volle Inhalt der QuelleCieh, Edwin Lee Yong. „Personal Data Protection Act 2010: An Overview Analysis“. In Beyond Data Protection, 31–64. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33081-0_3.
Der volle Inhalt der QuelleZarsky, Tal Z. „The Data Mining Balancing Act“. In European Data Protection: In Good Health?, 79–101. Dordrecht: Springer Netherlands, 2012. http://dx.doi.org/10.1007/978-94-007-2903-2_5.
Der volle Inhalt der QuelleCieh, Edwin Lee Yong. „Limitations of the Personal Data Protection Act 2010 and Personal Data Protection in Selected Sectors“. In Beyond Data Protection, 65–98. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33081-0_4.
Der volle Inhalt der QuelleRajadorai, Kesava Pillai, Vazeerudeen Abdul Hameed und Selvakumar Samuel. „Data Protection and Data Privacy Act for BIG DATA Governance“. In Services and Business Process Reengineering, 189–211. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1007-3_11.
Der volle Inhalt der QuelleKohnstamm, Jacob. „Getting Our Act Together: European Data Protection Authorities Face Up to Silicon Valley“. In Law, Governance and Technology Series, 455–72. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-25047-2_19.
Der volle Inhalt der QuelleAlunge, Rogers. „Consolidating the Right to Data Protection in the Information Age: A Comparative Appraisal of the Adoption of the OECD (Revised) Guidelines into the EU GDPR, the Ghanaian Data Protection Act 2012 and the Kenyan Data Protection Act 2019“. In Innovations and Interdisciplinary Solutions for Underserved Areas, 192–207. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51051-0_14.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Zimbabwe Data Protection Act"
Room, S., und R. Cohen. „The requirements of the Data Protection Act 1998“. In IET Conference on Crime and Security. IEE, 2006. http://dx.doi.org/10.1049/ic:20060318.
Der volle Inhalt der QuelleBaskaran, Hasventhran, Salman Yussof, Fiza Abdul Rahim und Asmidar Abu Bakar. „Blockchain and the Personal Data Protection Act 2010 (PDPA) in Malaysia“. In 2020 8th International Conference on Information Technology and Multimedia (ICIMU). IEEE, 2020. http://dx.doi.org/10.1109/icimu49871.2020.9243493.
Der volle Inhalt der QuelleSrinivasan, S. „Privacy Protection and Data Breaches“. In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2261.
Der volle Inhalt der QuelleApriyanti, Ira. „The Urgency of Establishing Personal Data Protection Act and Financial Technology Act in Digital Era in order to Protect and Control the Privacy in Indonesia“. In 3rd International Conference on Law and Governance (ICLAVE 2019). Paris, France: Atlantis Press, 2020. http://dx.doi.org/10.2991/aebmr.k.200321.045.
Der volle Inhalt der QuelleAmini, Elham, Ruslan Muydinov, Bernd Szyszka und Christian Boit. „Backside Protection Structure for Security Sensitive ICs“. In ISTFA 2017. ASM International, 2017. http://dx.doi.org/10.31399/asm.cp.istfa2017p0279.
Der volle Inhalt der QuellePanteleeva, Vanya. „Transposition of Directive (EU) 2016/680 of the European Parliament and of the Council of 27 April 2016 in Personal Data Protection Act in Republic of Bulgaria“. In The 7th International Scientific Conference of the Faculty of Law of the University of Latvia. University of Latvia, 2020. http://dx.doi.org/10.22364/iscflul.7.2.17.
Der volle Inhalt der QuelleKelmere, Laila. „Protection of employees in insolvency proceedings“. In 21st International Scientific Conference "Economic Science for Rural Development 2020". Latvia University of Life Sciences and Technologies. Faculty of Economics and Social Development, 2020. http://dx.doi.org/10.22616/esrd.2020.53.010.
Der volle Inhalt der QuelleMitrović, Ljubinko, und Predrag Raosavljević. „HUMAN RIGHTS OMBUDSMEN IN THE PANDEMIC: CHALLENGES IN PROTECTION OF VULNERABLE GROUPS“. In EU 2021 – The future of the EU in and after the pandemic. Faculty of Law, Josip Juraj Strossmayer University of Osijek, 2021. http://dx.doi.org/10.25234/eclic/18353.
Der volle Inhalt der QuelleOlsen, Daniel B., und Bryan D. Willson. „The Effect of Parametric Variations on Formaldehyde Emissions From a Large Bore Natural Gas Engine“. In ASME 2002 Internal Combustion Engine Division Spring Technical Conference. ASMEDC, 2002. http://dx.doi.org/10.1115/ices2002-446.
Der volle Inhalt der QuelleAraujo, Paulo, José Carlos Teixeira, Dionisio Silveira, Elisabete Silva, Delfim Soares, Raul Fangueiro und Maria Cândida Vilarinho. „Development of Fiber Structures for High Performance Heat Resistant Curtains“. In ASME 2020 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/imece2020-24016.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Zimbabwe Data Protection Act"
Arends, J., und William F. Sandusky. American Recovery and Reinvestment Act Federal Energy Management Program Technical Assistance Project 184 U.S. Customs and Border Protection Data Center, Springfield, Virginia. Office of Scientific and Technical Information (OSTI), September 2010. http://dx.doi.org/10.2172/1000147.
Der volle Inhalt der QuelleKennedy, Alan, David Moore und Taylor Rycroft. Field survey to prioritize needs for modernizing dredged material evaluation guidance. Engineer Research and Development Center (U.S.), Mai 2021. http://dx.doi.org/10.21079/11681/40701.
Der volle Inhalt der QuelleBedford, Philip, Alexis Long, Thomas Long, Erin Milliken, Lauren Thomas und Alexis Yelvington. Legal Mechanisms for Mitigating Flood Impacts in Texas Coastal Communities. Herausgegeben von Gabriel Eckstein. Texas A&M University School of Law Program in Natural Resources Systems, Mai 2019. http://dx.doi.org/10.37419/eenrs.mitigatingfloodimpactstx.
Der volle Inhalt der Quelle