Dissertations / Theses on the topic 'Confidential communications'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Confidential communications.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Shaughnessy, Patricia L. "The attorney-client privilege : a comparative study of American, Swedish and EU law /." Stockholm : Stockholm University, Law Dept, 2001. http://bibpurl.oclc.org/web/31292.
Full textFloyd, Kelly. "A content analysis of the use of confidential sources in 2006 by Time and Newsweek." Muncie, Ind. : Ball State University, 2008. http://cardinalscholar.bsu.edu/359.
Full textGonzalez, Laura. "The effects of confidentiality on the working alliance /." Thesis, McGill University, 2002. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=79771.
Full textDahlstrom, Glenda. "Privacy and confidentiality of patient health information." MU has:, 2002. http://wwwlib.umi.com/cr/mo/fullcit?p3052167.
Full textWardlow, Lane Liane Christine. "Not saying what's on your mind how speakers avoid grounding references in privileged information /." Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2007. http://wwwlib.umi.com/cr/ucsd/fullcit?p3258707.
Full textTitle from first page of PDF file (viewed June 5, 2007). Available via ProQuest Digital Dissertations. Vita. Includes bibliographical references.
Sheehy, Michael W. "From Watergate to Lewinsky : unnamed sources in the Washington post, 1970-2000 /." View abstract, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&res_dat=xri:pqdiss&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft_dat=xri:pqdiss:3220619.
Full textBerry-Harris, Traci Aaron. "Examining therapists' perceptions of confidentiality across various therapeutic environments, professional organizations, and client development (an exploratory study) /." Morgantown, W. Va. : [West Virginia University Libraries], 2007. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=4982.
Full textTitle from document title page. Document formatted into pages; contains vi, 149 p. Includes abstract. Includes bibliographical references (p. 117-125).
Chirichiello, Michela. "Confidentiality and public interest in mixed international arbitration." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=19633.
Full textEdvalson, Michael George. "TrustBroker : a defense against identity theft from online transactions /." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1149.pdf.
Full textArslanian, Samuel Thomas. "An implementation of the El Gamal elliptic curve cryptosystem over a finite field of characteristic P." Fogler Library, University of Maine, 1998. http://www.library.umaine.edu/theses/pdf/ArslanianST1998.pdf.
Full textBlackmon, Jason B. "Public key infrastructure utilization to provide an added level of authenticity to transmitted data." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar%5FBlackmon.pdf.
Full textThesis Advisor(s): Buddenberg, Rex. Second Reader: Housel, Thomas. "March 2010." Description based on title screen as viewed on April 27, 2010. Author(s) subject terms: Public key infrastructure, user agent, authenticity, confidentiality, integrity. Includes bibliographical references (p. 47-48). Also available in print.
Carlin, Andrew Philip. "On the linguistic constitution of research practices." Thesis, University of Stirling, 1999. http://hdl.handle.net/1893/26671.
Full textFitzgerald, Michael J. "The sacramental seal of confession in the corpus iuris canonici." Theological Research Exchange Network (TREN), 1988. http://www.tren.com.
Full textHollindale, Janice. "Auditor orientation, strategies and tactics in audit negotiations /." Gold Coast, Australia : Bond University, 2008. http://epublications.bond.edu.au/theses/hollindale.
Full textSchubert, Daniel. "Legal privilege und Nemo tenetur im reformierten europäischen Kartellermittlungsverfahren der VO 1-2003 : eine Untersuchung der Rechtslage im Gemeinschaftsrecht unter Berücksichtigung der Massgaben von EMRK, IPBPR und Grundrechtscharta sowie der aktuellen Rechtsprechung von EuGH, EuG und EGMR /." Berlin : Duncker & Humblot, 2009. http://d-nb.info/995050147/04.
Full textSmith, Bryan. "Responding to policies at runtime in TrustBuilder /." Diss., CLICK HERE for online access, 2004. http://contentdm.lib.byu.edu/ETD/image/etd414.pdf.
Full textWild, Maximiliane-Stephanie. "Die anwaltliche Verschwiegenheitspflicht in Deutschland und Frankreich : unter besonderer Beachtung der sich aus dem grenzüberschreitenden Rechtsverkehr ergebenden Kollisionsfälle /." Frankfurt, M. ; Berlin Bern Bruxelles New York, NY Oxford Wien : Lang, 2008. http://d-nb.info/989697002/04.
Full textEramo, Beverly Edith, and mikewood@deakin edu au. "Confidentiality and disclosure : assessment and intervention issues." Deakin University. School of Psychology, 2002. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20060706.141546.
Full textLacroix, Mireille 1971. "Genetic information and the family : a challenge to medical confidentiality." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=80935.
Full textLe, Poire Beth Ann 1964. "Communication strategies to restore or preserve informational and psychological privacy; the effects of privacy invasive questions in the health care context." Thesis, The University of Arizona, 1988. http://hdl.handle.net/10150/276798.
Full textMason, Barbara Ann Borgstede. "Ethics, privacy, and confidentiality issues related to the application of information technology in health care /." free to MU campus, to others for purchase, 1999. http://wwwlib.umi.com/cr/mo/fullcit?p9962543.
Full textThompson, A. Keith. "Religious confession privilege at common law : a historical analysis /." Access via Murdoch University Digital Theses Project, 2006. http://wwwlib.murdoch.edu.au/adt/browse/view/adt-MU20070831.94056.
Full textSchenk-Geers, Antonia Cornelia Maria. "Internationale fiscale gegevensuitwisseling en de rechtsbescherming van de belastingplichtige /." Deventer : Kluwer, 2007. http://www.gbv.de/dms/spk/sbb/recht/toc/52713810X.pdf.
Full textSpellerberg, Andrea. "Vertraulichkeit für Informanten des Europäischen Amtes für Betrugsbekämpfung (OLAF) : der Schutz des Informanten nach Art. 287 EG und die Verteidigungsrechte der Betroffenen /." Frankfurt am Main [u.a.] : Lang, 2006. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=014772658&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.
Full textJensen, Carlos. "Designing for Privacy in Interactive Systems." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7588.
Full textFlora, Margarethe. "Das Bankgeheimnis im gerichtlichen Strafverfahren /." Wien [u.a.] : Springer, 2007. http://www.gbv.de/dms/spk/sbb/recht/toc/522910718.pdf.
Full textPorter, Paul A. "Trust Negotiation for Open Database Access Control." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1311.pdf.
Full textMichero, Emily. "Master Therapists' Decision Making Process Concerning Adolescent Confidentiality: A Grounded Theory Approach." Thesis, University of North Texas, 2016. https://digital.library.unt.edu/ark:/67531/metadc849705/.
Full textLeithead, Travis S. "Challenging Policies That Do Not Play Fair: A Credential Relevancy Framework Using Trust Negotiation Ontologies." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd1007.pdf.
Full textMolina-Jimenez, Carlos. "Anonymous and confidential communication using PDAs." Thesis, University of Newcastle Upon Tyne, 2000. http://hdl.handle.net/10443/507.
Full textMorris, Cameron. "Browser-Based Trust Negotiation." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1238.pdf.
Full textCelosia, Guillaume. "Privacy challenges in wireless communications of the Internet of Things." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEI069.
Full textAlso known as the Internet of Things (IoT), the proliferation of connected objects offers unprecedented opportunities to consumers. From fitness trackers to medical assistants, through smarthome appliances, the IoT objects are evolving in a plethora of application fields. However, the benefits that they can bring to our society increase along with their privacy implications. Continuously communicating valuable information via wireless links such as Bluetooth and Wi-Fi, those connected devices support their owners within their activities. Most of the time emitted on open channels, and sometimes in the absence of encryption, those information are then easily accessible to any passive attacker in range. In this thesis, we explore two major privacy concerns resulting from the expansion of the IoT and its wireless communications: physical tracking and inference of users information. Based on two large datasets composed of radio signals from Bluetooth/BLE devices, we first defeat existing anti-tracking features prior to detail several privacy invasive applications. Relying on passive and active attacks, we also demonstrate that broadcasted messages contain cleartext information ranging from the devices technical characteristics to personal data of the users such as e-mail addresses and phone numbers. In a second time, we design practical countermeasures to address the identified privacy issues. In this direction, we provide recommendations to manufacturers, and propose an approach to verify the absence of flaws in the implementation of their protocols. Finally, to further illustrate the investigated privacy threats, we implement two demonstrators. As a result, Venom introduces a visual and experimental physical tracking system, while Himiko proposes a human interface allowing to infer information on IoT devices and their owners
Spinks, Karolyn Annette. "The impact of the introduction of a pilot electronic health record system on general practioners' work practices in the Illawarra." Access electronically, 2006. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20060712.153053/index.html.
Full textBoucher, Duane Eric. "An information privacy model for primary health care facilities." Thesis, University of Fort Hare, 2013. http://hdl.handle.net/10353/d1007181.
Full textWerly, Stéphane. "La protection du secret rédactionnel /." Genève [u.a.] : Schulthess, 2005. http://www.gbv.de/dms/spk/sbb/recht/toc/502310243.pdf.
Full textGondwe, Mimmy. "The Protection of Privacy in the Workplace: A Comparative Study." Stellenbosch : Stellenbosch University, 2011. http://hdl.handle.net/10019.1/17849.
Full textENGLISH ABSTRACT: The importance of privacy lies in the fact that it represents the very idea of human dignity or the preservation of the ‘inner sanctum’. Not surprisingly, however, operational concerns of employers and technological developments combine continuously to challenge the preservation of privacy in the workplace. Employees the world over are exposed to numerous privacy invasive measures, including drug testing, psychological testing, polygraph testing, genetic testing, psychological testing, electronic monitoring and background checks. Hence, the issue at the heart of this dissertation is to determine to what extent privacy is protected in the South African workplace given advancements in technology and the implications (if any) for the right to privacy as such. A secondary aim of the dissertation is to attempt to provide a realistic balance between the privacy concerns of employees and the operational needs of employers in this technological age. As such the main focus of dissertation falls within the sphere of employment law. In order to provide an answer to the research issue discussed above, the dissertation addresses five ancillary or interrelated issues. First, the broad historical development of the legal protection of privacy is traced and examined. Second, a workable definition of privacy is identified with reference to academic debate and comparative legislative and judicial developments. Third, those policies and practices, which would typically threaten privacy in the employment sphere are identified and briefly discussed. Fourth, a detailed evaluation of the tension between privacy and a number of selected policies and practices in selected countries is provided. More specifically, the dissertation considers how these policies and practices challenge privacy, the rationale for their existence and, if applicable, how these policies and practices – if necessary through appropriate regulation – may be accommodated while simultaneously accommodating both privacy and the legitimate concerns of employers. The selection of these practices and policies is guided by two considerations. At the first level the emphasis is on those challenges to privacy, which can be traced back to technological developments and which, as such, foster new and unique demands to the accommodation of privacy in the workplace. The secondary emphasis is on those policies, which are representative of the fundamental challenges created by new technologies to privacy. To effectively address the above issues the dissertation uses the traditional legal methodology associated with comparative legal research, which includes a literature review of applicable law and legal frame work and a review of relevant case law and a comparative study of selected foreign jurisdictions.
AFRIKAANSE OPSOMMING: Geen opsomming
Fulbright Foundation
Stellenbosch University
Mellon Foundation
NFR
Henshaw, James Presley. "Phishing Warden : enhancing content-triggered trust negotiation to prevent phishing attacks /." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd840.pdf.
Full textMkosi, Barbara Nomsa. "Confidentiality as value in the management of HIV/AIDS in South Africa." Thesis, Stellenbosch : Stellenbosch University, 2000. http://hdl.handle.net/10019.1/51663.
Full textENGLISH ABSTRACT: AIDS is the most important threat to world health. Recent years have seen a dramatic spread of HIVand AIDS in South Africa. Health education directed at modifying risk behaviour appears to be the only way in which the disease can be contained. Controlling AIDS is not only by controlling the virus, but also involves tackling social, economic and political issues and putting AIDS into the broader context of sexuality and gender roles. This requires a broader understanding of this aspect of HIV-AIDS ranging from population dynamics, through to research on individual behaviour and its socio-economic impact; so that we can dispel the myths and rumours that surround AIDS and answer searching questions that will be asked by the community. In South Africa, HIV-AIDS remains a stigmatized disease. There have been calls from courageous and influential people for those who are living with HIV-AIDS to be open about their status and to destigmatise the disease. Institutions too have been drawn into the controversy about whether to remain silent or speak out. Southern African Anglican bishops, as well as some politicians declared their intention to undergo testing for HIV status in order to sensitise the public to the seriousness of the epidemic. Were AIDS not regarded as intolerable, the entire issue of confidentiality would fall away. Calls to destigmatise the disease through openness cannot stand alone. Government must put effective treatment programmes in place. In the absence of treatment, AIDS may represent only frustration and hopelessness to those who test positive; and fear, danger and resultant animosity to those who are HIV negative. The text is in four chapters. Chapter 1 focuses on confidentiality as an important principle in the management of disease. In HIV -AIDS, confidentiality is a more sensitive issue as AIDS is particularly viewed as a social stigma, accompanied by discrimination and harassment. The chapter also addresses HIV infection, transmission, counseling and screemng. Chapter 2 deals with the principles of biomedical ethics namely, autonomy, to enable the patient to determine his/her course of treatment; informed consent, designed to protect the interests of patients from exploitation and harm, and encourage health professionals to act responsibly; beneficence and nonmaleficence, to protect the welfare of others; and justice, to ensure access to health care for all. It also highlights the aspects of and limitations to confidentiality. Chapter 3 discusses broadly the ethical dilemmas pertammg to professional-patient relationships, women and HIV-AIDS, religion, prisoners and employer-employee relationships. When the AIDS epidemic started, very few people suffered from the disease, and the disease was treated with great caution and confidentiality. Today, AIDS is a pandemic and emphasis should shift from the ethic of autonomy and confidentiality, to a social ethic, which emphasizes the responsibility of minimizing the risk of spread of infection. The chapter also examines the role of the Department of Health, the participation of health professional bodies and the legal aspects relating to confidentiality in HIV-AIDS. Chapter 4 attempts to construct an argument to destigmatise HIV-AIDS by arguing the responsibility of the government to make sufficient resources available for the treatment and control of the pandemic. Health professionals are challenged to engage their expertise and skills in the service of the sick with dignity and respect. The community is encouraged to support the drive towards controlling the spread of HIV infection and enable people living with AIDS to disclose their status without fear of harassment.
AFRIKAANSE OPSOMMING: Vigs is die gevaarlikste bedreiging van wéreldgesondheid. Die afgelope paar jaar het 'n dramatiese verspreiding van mv en VIGS in Suid-Afrika plaasgevind. Gesondheidsopvoeding wat gemik is op die verandering van risiko-gedrag is skynbaar die enigste metode wat die siekte kan beheer. Die kontrolering van VIGS is nie net die kontrolering van die virus nie, maar dit betref ook herbesinning oor sosiale, ekonomiese en politiese en geslagsrolle. Dit vereis 'n omvattender verstaan van hierdie aspek van HIV-VIGS, wat strek vanaf van bevolkingspatrone tot by die navorsing oor individuele gedrag en die sosio-ekonomiese impak van 19. So kan ons hopelik help om die mites rondom VIGS te besweer. In Suid-Afrika bly mV-VIGS 'n gestigmatiseerde siekte. Daar rus 'n veranbtwoordelikheid op invloedryke mense wat met mV-VIGS leef en wat as rolmodelle sou kon dien, om hul mv -status te openbaar en sodoeonde te help om die siekte te destigmatiseer. Instansies is ook by hierdie twispunt betrek om vas te stelof die mense moet praat of swyg. Suider-Afrikaanse Anglikaanse Biskoppe, asook somige politici het hulle intensies aangekondig om die mv -toets te ondergaan om sodoende die publiek te help opvoed oor die gevaar van hierdie epidemie. Oproepe om die siekte te destigmatiseer deur openbaarheid kan nie in isolasie funksioneer nie. Die staat moet effektiewe kuratiewe en voorkomingsprogramme hier rondom loods en kontinueer. In die afwesigheid van 'n geneesmiddel, sal VIGS slegs frustrasie, hopeloosheid, en vrees skep by diegene wat positief getoets is, sowel as vyandigheid onder diegene wat nie mv positief is nie. Die teks het vier hoofstukke. Hoofstuk 1 fokus op vertroulikheid as 'n belangrike beginsel in die bestuur van die siekte. In mV-VIGS is vertroulikheid 'n meer sensitiewe beginsel aangesien VIGS in die besonder as 'n sosiale skandvlek, aangevreet deur diskriminasie, gesien word. Die hoofstuk bespreek ook mv -infeksie, transmissie, raadgewing en toetsing. Hoofstuk 2 gaan oor die beginsels van die biomediese etiek, naamlik, outonomie, waaronder ingeligte toetstemming, ontwerp om die belange van die pasiente te beskerm teen eksploitasie en gevaar: om gesondheids professionele aan te moedig om hulle op 'n verantwoordelike manier te gedra. Ander beginsels is goedwilligheid en niekwaadwiligheid om die welsyn van ander te beskerm, asook geregtigheid, om toegang tot gesondheidshulp vir almal te verseker. Dit beklemtoon ook die aspekte verwant aan beperkinge tot vertroulikheid. Hoofstuk 3 bespreek breedweg die etiese dilemmas met betrekking tot die verhouding tussen pasiënye en professionele gesondheidswerkers, vrouens en mV-VIGS, godsdiens, gevangenes en werkgewer-werker verhoudings. Toe die VIGS-epidemie begin het, het min mense aan die siekte gely, en die siekte is met groot sorg en vertroulikheid behandel. Vandag is VIGS 'n pandemie en die klem moet geskuif word vanaf outonomie en vetrouilikheid na 'n sosiale etos wat verantwoordlikheid en die vermindering van die risiko van die verspreiding van die infeksie beklemtoon. Die hoofstuk kyk ook na die rolle van gesondheidsdepartmente, deelname van gesondheids professionele organisasies en die juridiese aspekte met betrekking tot vertroulikheid van HIV-VIGS. Hoofstuk 4 poog om 'n argument te ontwikkel wat daartoe sou kon bydra dat HIV-VIGS gedestigmatiseer sal word. Klem word gelê op die verabtwoordelikheid van die staat om soveel moontlike bronne beskikbaar te stel vir die behandeling van en beheer oor hierdie pandemie. Gesondheids professionele word uitgedaag om hulle deskundigheid en bekwaamheid in die diens van die siekes met waardigheid en respek te gebruik. Die gemeenskap word aangemoedig om die poging tot die beheer van die verspreiding van die HIV -infeksie te ondersteun en om die mense wat met VIGS leef in staat te stelom hul status sonder die dreigement van stigmatisering bekend te maak.
Mousa, Hayam Abdalla. "Management of selfish and malicious behaviors in distributed collaborative systems." Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEI036.
Full textParticipatory sensing is an emerging paradigm in which citizens voluntarily use their mobile phones to capture and share sensed data from their surrounding environment in order to monitor and analyze some phenomenon. Various reputation systems have been proposed to monitor participants' behavior in participatory sensing applications in order to identify those who provide bad contributions. However, the existing reputation systems do not provide privacy guarantees to the contributors. Thus, users usually hesitate to join participatory sensing campaigns since they are asked to provide their sensed data including time, location, etc. It has been shown in different works that up to 95% of participants’ identities can be re-identified through sharing four contributions containing multi-sensor data. Due to this reason, the integration between privacy preserving systems and reputation systems is a crucial need for building secure and reliable participatory sensing applications. This integration requires the assurance of seemingly conflicting objectives. Indeed, reputation systems monitor participants’ behaviors along subsequent interactions. Whereas, the objective of privacy preserving systems is to in fact detach the link between subsequent interactions. In this thesis, we study possible strategies to integrate privacy preserving systems within reputation-aware systems. This integration raises a new privacy challenge because of the contradiction between their objectives. Then, a new attack has been defined (RR attack). RR attack exploits this contradiction in order to detect the succession of contributions provided by the same participant. Next, a new privacy preserving reputation-aware protocol (PrivaSense) is proposed. PrivaSense defines a method that ensures both privacy and reputation and simultaneously solves their contradiction. Finally, we propose a novel reputation system DTSRS, which depends on a set of the most trusted participants in order to assess the reputation of participants. DTSRS introduces new measures to evaluate the trust of participants' contributions. DTSRS has the ability to defend more strongly against a set of attacks that was not considered in the literature (e.g. Collision, On-off, etc.). DTSRS enables the application server to aggregate the data more accurately. Moreover, DTSRS assesses both trust and reputation correctly even if a large number of adversaries are included in the sensing campaign
Gewald, Rieka Susan. "The possibility of psychotherapeutic privilege in South Africa." Thesis, Rhodes University, 2009. http://hdl.handle.net/10962/d1008208.
Full textJarvis, Ryan D. "Protecting Sensitive Credential Content during Trust Negotiation." Diss., CLICK HERE for online access, 2003. http://contentdm.lib.byu.edu/ETD/image/etd192.pdf.
Full textRama, Sobhana. "Managing Information Confidentiality Using the Chinese Wall Model to Reduce Fraud in Government Tenders." Thesis, University of Fort Hare, 2013. http://hdl.handle.net/10353/d1006956.
Full textFischedick, Walter. "Die Zeugnisverweigerungsrechte von Geistlichen und kirchlichen Mitarbeitern /." Frankfurt am Main [u.a.] : Lang, 2006. http://www.gbv.de/dms/spk/sbb/recht/toc/506739074.pdf.
Full textMcConnell, Justin W. "You've got mail the study of the attorney-client privilege and the use of electronic mail." Honors in the Major Thesis, University of Central Florida, 2011. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/470.
Full textB.A. and B.S.
Bachelors
Health and Public Affairs
Legal Studies
Shankar, Jay Eriah. "Providers choices in web-medical records: An analysis of trade-offs made by physicians in San Bernardino County." CSUSB ScholarWorks, 2002. https://scholarworks.lib.csusb.edu/etd-project/2210.
Full textHsiao, Chih-Wen, David Turner, and Keith Ross. "A secure lightweight currency service provider." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2594.
Full textGundu, Tapiwa. "Towards an information security awareness process for engineering SMEs in emerging economies." Thesis, University of Fort Hare, 2013. http://hdl.handle.net/10353/d1007179.
Full textHowieson, Jillian Alice. "Family law dispute resolution : procedural justice and the lawyer-client interaction." University of Western Australia. Law School, 2009. http://theses.library.uwa.edu.au/adt-WU2009.0109.
Full textGstöhl, Caroline. "Geheimnisschutz im Verfahren der internationalen Rechtshilfe in Strafsachen /." Bern : Stämpfli, 2008. http://deposit.d-nb.de/cgi-bin/dokserv?id=3062777&prov=M&dok_var=1&dok_ext=htm.
Full textAndino, López Juan Antonio. "Efectos de la vulneración del secreto profesional del abogado en el proceso civil." Doctoral thesis, Universitat de Barcelona, 2013. http://hdl.handle.net/10803/123748.
Full textThe thesis proceeds with the analysis of legal privilege and the effects of its breach in a Spanish civil proceedings. Therefore, the thesis explains the following issues: (i) analysis of the contractual relationship between the client and his/her Lawyer; (ii) the legal privilege in Spain (applicable law, history, subjects obliged by said privilege, object of the privilege, legal and illegal reveal of the secret, etc); (iii) the effects of the breach of the legal privilege in the Spanish civil proceedings: consideration of the evidence as illegal, as a breach of constitutional rights, or against the good faith that has to be applied in the judicial proceedings. The work attaches the text of the Spanish Law regarding legal privilege of Lawyers, as well as the Law of the countries of Europe and the United States; finally, it also attaches several court cases regarding legal privilege.