Dissertations / Theses on the topic 'Data protection – Law and legislation – Zimbabwe'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 28 dissertations / theses for your research on the topic 'Data protection – Law and legislation – Zimbabwe.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Stoddard, Damon. "A new Canadian intellectual property right : the protection of data submitted for marketing approval of pharmaceutical drugs." Thesis, McGill University, 2006. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=101828.
Full textOn June 17, 2006, the federal government of Canada published a proposed data protection regulation, which would provide an initial applicant with eight years of protection for clinical test results submitted in a new drug submission. This protection would lead to an eight year period of market exclusivity for the drug associated with the clinical test data, regardless of whether that drug was protected by a Canadian patent.
In this thesis, the author first describes what data protection is on a practical level, and distinguishes data protection from other forms of intellectual property rights. Next, the author discusses how various jurisdictions choose to protect clinical test data submitted to their health authorities. Canada's international obligations pursuant to the NAFTA and the TRIPS Agreement are also examined. In this regard, the author argues that Canada is under no obligation to provide initial applicants with eight years of data protection. Furthermore, the author argues that exclusive time-limited property rights in clinical test data are difficult to justify from a theoretical perspective. Finally, the author prescribes certain legislative changes to Canada's proposed data protection regulation.
Lynskey, Orla. "Identifying the objectives of EU data protection regulation and justifying its costs." Thesis, University of Cambridge, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.608116.
Full textChan, Lai-sha, and 陳麗莎. "A study of the copyright protection in the digital environment in HongKong." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46779632.
Full textKan, Chi-keung, and 簡志強. "A review of the implementation of the personal data (privacy) ordinance in the Hong Kong Correctional Services Department." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1998. http://hub.hku.hk/bib/B31965507.
Full textAmoraal, Lezel. "Internet-regulering in Suid-Afrika : staat of internasionaal?" Thesis, Stellenbosch : Stellenbosch University, 2003. http://hdl.handle.net/10019.1/53471.
Full textENGLISH ABSTRACT: The Internet has become such an integral part of computer users' daily existence that it seems as if it has always been there. The Internet with its unique borders - or lack of borders - places an enormous burden on geographically based legal systems. Regulation, that has specifically been designed for the Internet, is a necessity because virtually every aspect of the law is challenged by the Internet and that many legal frameworks are inadequate to deal with the Internet. The other aspect which complicates the Internet even more, is that there is no specific organisation, business or government to whom the Internet belongs. Individuals and organisations have rights to the web pages that they own on the Internet, but there is no ownership of the Internet in its entirety. The development of the Internet in South Africa took place during a difficult time in the country's history. The apartheid era initially limited the growth of the Internet. Much of the existing legislation in South Africa has been partially adapted to accommodate the Internet, but the government could not envisage what the actual impact of the Internet would be and consequently they reacted when it came to the regulation of the Internet. In 2002 the Electronic Communication and Transaction Act 25 of2002 came into operation. In fact, the physical component of the Internet has already been regulated to a degree by the pure coincidence as a result of its physical presence. This is because the backbone of the Internet had not originally been created by the Internet, but by the telephone. There are a number of legislative Internet-organisations that are, among others, responsible for the technical standards of the Internet, dispute resolutions and in general what is important for the Internet community. Various international conventions regulate specific aspects of the Internet such as copyright, intellectual property rights, domain names, trademarks and cyber crime. The international conventions and agreements are an important step in the direction of standardised regulation. However, the lack of borders creates problems surrounding jurisdiction of the cyber space.
AFRIKAANSE OPSOMMING: Die Internet het al so deel van rekenaargebruikers se alledaagse bestaan geword dat dit soms wil voorkom asof dit maar nog altyd daar was. Die Internet met sy unieke grense - of sy gebrek aan grense - plaas 'n groot las op geografies gebaseerde regstelsels. Regulering wat spesifiek vir die Internet ontwerp is, is 'n noodsaaklikheid, aangesien byna elke aspek van die reg deur die Internet uitgedaag word en baie regsraamwerke onvoldoende is om die Internet te hanteer. Wat die regulering van die Internet verder kompliseer, is dat daar nie een spesifieke organisasie, onderneming of regering is aan wie die Internet behoort nie. Individue en organisasies het regte tot die webwerwe wat hulle op die Internet besit, maar daar is nie eienaarskap van die Internet in sy geheel nie. Die ontwikkeling van die Internet in Suid-Afirka het tydens 'n moeilike tydperk in die Suid- Afrikaanse geskiedenis plaasgevind. Die apartheidsera het die aanvanklike ontwikkeling en groei van die Internet in Suid-Afrika beperk. Verskeie bestaande Suid-Afrikaanse wetgewing is deels aangepas om die Internet te akkommodeer, maar die regering het nooit besef wat die werklike impak van die Internet sou wees nie en het gevolglik re-aktief te werk gegaan wanneer dit by die regulering van die Internet gekom het. In 2002 het Suid-Afrika se Elektroniese Kommunikasie en Transaksies Wet 25 van 2002 in werking getree. Die regulering van die fisieke komponente van die Internet is tot 'n mate as gevolg van sy fisieke teenwoordigheid deur blote toeval, gereguleer. Dit is omdat die ruggraat van die Internet nie oorspronklik vir die Internet geskep is nie, maar vir die telefoon. Daar bestaan verskeie wetgewende Internet-organisasies wat onder meer verantwoordelik is vir die tegniese standaarde van die Internet, dispuutresolusie en wat oor die algemeen aan die belange van die Internet-gemeenskap wil voldoen. Verskeie internasionale konvensies reguleer spesifieke aspekte van die Internet soos kopiereg, intellektuele eiendomsreg, domeinname en handelsmerke en kubermisdaad. Die internasionale konvensies en verdrae is 'n belangrike stap in die rigting van gestandaardiseerde regulering. Tog skep die grenslose omstandighede van die Internet probleme rondom jurisdiksie in die kuberruim.
Kam, Ka Man. "Reproduction rights in digital environment and copyrights protection : legal issues and challenges." Thesis, University of Macau, 2011. http://umaclib3.umac.mo/record=b2580191.
Full textGamlashe, Thembinkosi. "Freedom of the press, or the infringement of the right to privacy?: media coverage of President Kgalema Motlanthe from October 2008 to April 2009 in three newspapers." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1010118.
Full textSkolmen, Dayne Edward. "Protection of personal information in the South African cloud computing environment: a framework for cloud computing adoption." Thesis, Nelson Mandela Metropolitan University, 2016. http://hdl.handle.net/10948/12747.
Full textArès, Sébastien. "Le couplage de données et la protection de la vie privée informationnelle sous l'article 8 de la Charte canadienne /." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=82651.
Full textIn the author's opinion, a governmental data matching program will probably constitute a search or seizure under section 8 when a positive answer is given to two questions. First, is there a use or transfer of information which implicates constitutionally protected information? Generally, section 8 will only protect biographical personal information, as described in the Plant case. Second, one must determine if a reasonable expectation of privacy exists as to the purpose for which the information will be used. In other words, one must determine if the two governmental databanks are separate on the constitutional level.
However, a positive answer to both of theses questions does not mean that the matching program necessarily infringes section 8. It will not be considered unreasonable if it is authorised by law, if the law itself is reasonable, and if the execution of the program is reasonable. Presuming that the program is authorised by law, it is probable that a matching program aimed to detect individuals collecting illegally social benefits will not be considered unreasonable.
Banerjea-Brodeur, Nicolas Paul. "Advance passenger information passenger name record : privacy rights and security awareness." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=80909.
Full textPassenger Name Record access permits authorities to have additional data that could identify individuals requiring more questioning prior to border control clearance. This data does not cause in itself privacy issues other than perhaps the potential retention and manipulation of information that Border Control Authorities may acquire. In essence, bilateral agreements between governments should be sought in order to protect national legislation.
The common goal of the airline industry is to ensure safe and efficient air transport. API and PNR should be viewed as formalities that can facilitate border control clearance and prevent the entrance of potentially high-risk individuals.
劉曉敏. "互聯網上泄露公民個人信息行為的犯罪化探析 : 以 人肉搜索 為視角." Thesis, University of Macau, 2009. http://umaclib3.umac.mo/record=b2129880.
Full textPupo, Alvaro de Carvalho Pinto. "Privacidade, liberdade de expressão e proteção dos dados pessoais: uma perspectiva brasileira com base na jurisprudência do Supremo Tribunal Federal." Pontifícia Universidade Católica de São Paulo, 2017. https://tede2.pucsp.br/handle/handle/20598.
Full textMade available in DSpace on 2017-11-14T11:28:30Z (GMT). No. of bitstreams: 1 Alvaro de Carvalho Pinto Pupo.pdf: 993019 bytes, checksum: 3e483a91d657e2658eb8b6b67b0a96f2 (MD5) Previous issue date: 2017-10-31
This study analyzes the concept of intimacy, privacy, free speech and personal data under a brazilian perspective, as well as the protection for each of the itens mentioned. The study makes references to authorities, legislation and case law pertaining to each of the subjects. The study pursues the clarification of what each of these understands as privacy protection and personal data protection, and how these correlates. It also pursues to understand if these understandings are aligned and propose, in the end, some way of uniformization considering the legislative bill proposals being discussed in the Brazilian Congress
O presente trabalho analisa o conceito da intimidade, privacidade, liberdade de expressão e de dados pessoais sob uma perspectiva brasileira, bem como a proteção outorgada a cada um dos itens tratados acima. São analisados os pontos doutrinários, legais e jurisprudenciais associados com cada um deles. A análisa busca averiguar o que cada um desses campos entende como proteção da privacidade e dos dados pessoais e como a privacidade e dados pessoais se relacionam, além verificar se esses entendimentos estão alinhados e propor, ao final, uma forma de uniformização, considerando inclusive propostas legislativas que se encontram em debate no Congresso Nacional
Wells, William Ward. "Information security program development." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2585.
Full textMaguraushe, Kudakwashe. "Development of a diagnostic instrument and privacy model for student personal information privacy perceptions at a Zimbabwean university." Thesis, 2021. http://hdl.handle.net/10500/27557.
Full textSchool of Computing
Ph. D. (Information Systems)
Laosebikan, Foluke Oyelayo. "Privacy and technological development : a comparative analysis of South African and Nigerian privacy and data protection laws with particular reference to the protection of privacy and data in internet cafes and suggestions for appropriate legislation in Nigeria." Thesis, 2007. http://hdl.handle.net/10413/9540.
Full textLondon, Ray William. "Comparative data protection and security : a critical evaluation of legal standards." Thesis, 2013. http://hdl.handle.net/10500/13859.
Full textLL. D.
London, R. W. "Comparative data protection and security : a critical evealuation of legal standards." Thesis, 2013. http://hdl.handle.net/10500/13859.
Full textLL.D. (Laws)
Roos, Anneliese. "The law of data (privacy) protection: a comparative and theoretical study." Thesis, 2003. http://hdl.handle.net/10500/1463.
Full textJurisprudence
LL. D. (Jurisprudence)
Mukwindidza, Enock. "The implementation of environmental legislation in the Mutasa district of Zimbabwe." Diss., 2008. http://hdl.handle.net/10500/2295.
Full textPublic Administration
MPA (Public Administration)
Conroy, Marlize. "A comparative study of technological protection measures in copyright law." Thesis, 2006. http://hdl.handle.net/10500/2217.
Full textJurisprudence
LL.D.
Allotey, Asuquo Kofi Essien. "Data protection and transborder data flows : implications for Nigeria's integration into the global network economy." Thesis, 2014. http://hdl.handle.net/10500/13903.
Full textPublic, Constitutional, & International
LLD
Nxokweni, Unathi Pearl. "Legal principles regulating the processing of personal information in the workplace." Diss., 2018. http://hdl.handle.net/10500/25762.
Full textPrivate Law
LL. M.
"An empirical study of the impact of the Personal Data (Privacy) Ordinance on human resource management." 1998. http://library.cuhk.edu.hk/record=b5889382.
Full textThesis (M.B.A.)--Chinese University of Hong Kong, 1998.
Includes bibliographical references (leaves 87-89).
ABSTRACT --- p.ii
TABLE OF CONTENTS --- p.iii
LIST OF TABLES --- p.vi
LIST OF ABBREVIATIONS --- p.vii
ACKNOWLEDGMENT --- p.viii
Chapter
Chapter I. --- INTRODUCTION --- p.1
Chapter II. --- LITERATURE REVIEW --- p.4
Privacy Protection Act --- p.4
A Survey of Privacy in the Workplace --- p.5
Chapter III. --- PERSONAL DATA (PRIVACY) ORDINANCE --- p.8
Events that led to the Enactment of the Ordinance --- p.8
An Overview of the Ordinance --- p.10
Chapter IV. --- METHODOLOGY --- p.14
Chapter V. --- RESULTS --- p.17
Privacy Commissioner's Office (PCO) --- p.17
The Hong Kong Institute of Human Resource Management (IHRM) --- p.23
Bank A --- p.26
Recruitment and Selection --- p.26
References --- p.27
Employee Records --- p.28
Data Relating to Ex-employees --- p.28
Training and Development --- p.29
Compensation and Benefits --- p.30
Data Storage and Security --- p.30
Data Transfer and Transmission --- p.30
Appraisal and Potential Assessment --- p.30
Disciplinary Records --- p.31
Exit Interview --- p.31
Others --- p.32
Bank B --- p.33
Recruitment and Selection --- p.33
References --- p.34
Employee Records --- p.34
Data Relating to Ex-employees --- p.35
Training and Development --- p.35
Compensation and Benefits --- p.35
Data Storage and Security --- p.35
Data Transfer and Transmission --- p.36
Appraisal and Potential Assessment/Disciplinary Records --- p.36
Exit Interview --- p.36
Others --- p.36
Bank C --- p.37
Recruitment and Selection --- p.38
References --- p.38
Employee Records --- p.38
Data Relating to Ex-employees --- p.39
Training and Development --- p.39
Compensation and Benefits --- p.39
Data Storage and Security --- p.39
Data Transfer and Transmission --- p.40
Appraisal and Potential Assessment --- p.40
Disciplinary Records --- p.40
Exit Interview --- p.40
Others --- p.41
Chapter VI. --- ANALYSIS OF RESULTS --- p.43
"Overview of Bank A, B and C's Interview Results" --- p.43
Evaluation on Compliance Level --- p.45
Recruitment and Selection --- p.46
References --- p.47
Employee Records --- p.48
Data Relating to Ex-employees --- p.48
Training and Development --- p.49
Compensation and Benefits --- p.49
Data Storage and Security --- p.50
Data Transfer and Transmission --- p.50
Appraisal and Potential Assessment/Disciplinary Records --- p.50
Exit Interview --- p.50
General --- p.50
Dynamics Between the PCO and Human Resource Practitioners --- p.51
Dynamics Between the PCO and IHRM --- p.53
Dynamics Between IHRM and Human Resource Practitioners --- p.53
Comparison with Linowes' Survey Results --- p.54
Chapter VII. --- RECOMMENDATIONS --- p.56
Privacy Commissioner's Office (PCO) --- p.56
The Hong Kong Institute of Human Resource Management (IHRM) --- p.57
"Bank A, B and C" --- p.57
Chapter VIII. --- LIMITATIONS --- p.59
IX. CONCLUSIONS --- p.60
APPENDIX --- p.62
BIBLIOGRAPHY --- p.87
Donald, Katherine Faye. "Names, pseudonyms and anonymity in online interactions: a study of name policy on news24, the daily Maverick, and 4chan." Thesis, 2017. https://hdl.handle.net/10539/24442.
Full textThis research investigates real names, pseudonyms, and anonymity online. From its small beginning as a research tool, the internet has grown radically and been increasingly incorporated into people’s daily lives. Simultaneously, as the internet has grown and changed, so have its uses, and perceptions of the naming practices used on it. Attitudes towards acceptable name use online have changed over time. Social networking sites have had a strong influence on name usage policies. This research examines how these attitudes have changed, and the implications of real names, pseudonyms and anonymity for behaviour on the internet and privacy. The radically disembodied nature of online communication lends itself to disinhibition, which in turn has resulted in online communications’ reputation for trolls and abusers. Contrary to the common assumption that the use of real names offline indicates the legitimacy of using real names online, online and offline communications are radically different. Online communications have very different considerations regarding privacy, identity theft, the digital footprint, and collapsed context, many of which are not present in offline communications. This paper examines naming policies and site structure through two case studies. The first case focuses on News24 and the Daily Maverick, both of which are South African news sites. Due to the need for rational and polite discourse, these implemented real name policies in order to enforce good behaviour amongst their users. In both cases, the real name policies failed. The second case study is that of 4chan, the American image board site. 4chan does not require any login process, and its users are typically anonymous. Despite being notorious for trolls, illegal content, and its image board /b/, the site’s architecture, along with the way that posts are created and then kept alive, mean that the site can be effective at moderating the kinds of content that it deems appropriate for each of its boards. Despite the contrasting nature and purposes of the news sites and 4chan, there are lessons to be learnt from the failure of real name policies, and the architecture and set up of sites which can be used to enforce particular behaviours. Furthermore, despite the ephemeral and shifting nature of 4chan, identity and a sense of belonging remain important to its users, hinting at the importance of a sense of identity to site members and the role of this identity in ensuring that users adhere to the norms.
XL2018
Dagada, Rabelani. "Legal and policy aspects to consider when providing information security in the corporate environment." Thesis, 2014. http://hdl.handle.net/10500/18839.
Full textSchool of Computing
D. Phil. (Information Systems)
Skosana, Milton Themba. "The right to privacy and identity on social network sites : a comparative legal perspective." Diss., 2016. http://hdl.handle.net/10500/23772.
Full textPrivate Law
LL. M.
Nienaber, Catharina Wilhelmina. "Strafregtelike beskerming van inligting." Thesis, 2005. http://hdl.handle.net/10500/1682.
Full textJurisprudence
LL. D.
Saurombe, Nampombe Pearson. "Public programming of public archives in the East and Southern Africa regional branch of the International Council on Archives (ESARBICA):." Thesis, 2016. http://hdl.handle.net/10500/20084.
Full textInformation Science
D. Litt. et Phil. (Information Science)