Journal articles on the topic 'Data protection'

To see the other types of publications on this topic, follow the link: Data protection.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Data protection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Gama, Cruz. "Data protection and personal data protection." Brazilian Journal of Clinical Medicine and Review 1, Suppl.1 (April 15, 2023): 18. http://dx.doi.org/10.52600/2965-0968.bjcmr.2023.1.suppl.1.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In Angola, the right to privacy is one of the fundamental rights enshrined in the Constitution of the Republic. In addition to the Constitution, the legal framework on the protection of personal data is complemented by other laws, with regard to the Personal Data Protection Law, No. 22/11 of 17 June, which establishes legal rules for the processing of such data and establishes Data Protection (DPA), as the public authority responsible for monitoring compliance with those rules and exercising. The unequivocal and express consent of the data subject or his legal representative and prior notification to the APD are the general requirements for the processing of personal data, without prejudice to the principles and other specific requirements applicable to sensitive data. Only health professionals registered in the respective professional associations are qualified to process health data, and must observe professional secrecy. Data holders are assured the exercise of their rights to information, access, rectification, updating and deletion of their data. Security measures must be implemented to ensure confidentiality, integrity and availability of information. In conclusion, in Angola there is no prohibition on the processing of personal data, what the legislator imposes is that it be done with transparency and legality, aiming at protecting its holders from situations of vulnerability, including stigmatization, discrimination, observing dignity of the human person as one of the fundamental principles of ethics, especially in scientific research.
2

Chamberlain, Johanna, and Andreas Kotsios. "Data protection beyond data protection regulation." Stiftelsen Juridisk Fakultetslitteratur, no. 2024 2 (January 17, 2024): 397–424. http://dx.doi.org/10.53292/bd1fa11c.282687ef.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Walker-Osborn, C., L. Fitzsimons, and J. Ruane. "Data Protection." ITNOW 55, no. 3 (August 28, 2013): 38–39. http://dx.doi.org/10.1093/itnow/bwt050.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rowe, Heather, and Robin McGilligan. "DATA PROTECTION." Computer Law & Security Review 17, no. 5 (September 2001): 333–35. http://dx.doi.org/10.1016/s0267-3649(01)00511-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dinant, Jean-Marc, and Ewout Keuleers. "Data protection." Computer Law & Security Review 20, no. 1 (January 2004): 22–28. http://dx.doi.org/10.1016/s0267-3649(04)00005-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chalton, Simon. "Data protection." Computer Law & Security Review 13, no. 6 (November 1997): 425–28. http://dx.doi.org/10.1016/s0267-3649(97)89792-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sizer, Richard. "Data protection." Computer Law & Security Review 2, no. 5 (January 1987): 13–15. http://dx.doi.org/10.1016/0267-3649(87)90007-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Reynolds, Chris. "Data protection." Computer Law & Security Review 5, no. 6 (March 1990): 19–22. http://dx.doi.org/10.1016/0267-3649(90)90059-k.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Clark, Robert. "Data protection." Computer Law & Security Review 6, no. 6 (March 1991): 16–19. http://dx.doi.org/10.1016/0267-3649(91)90172-r.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

George, R. E. "Data protection." Physics Bulletin 37, no. 9 (September 1986): 363. http://dx.doi.org/10.1088/0031-9112/37/9/001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Saxby, S. "Data protection." Computer Law & Security Review 21, no. 3 (January 2005): 277. http://dx.doi.org/10.1016/j.clsr.2005.01.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Rowe, Heather. "Data protection." Computer Law & Security Review 10, no. 1 (January 1994): 47. http://dx.doi.org/10.1016/0267-3649(94)90092-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Mishra, Amit. "Fundamental Rights and Data Protection (Balancing Innovation and Privacy in Light of Digital Personal Data Protection Act, 2023)." International Journal of Science and Research (IJSR) 13, no. 5 (May 5, 2024): 332–37. http://dx.doi.org/10.21275/mr24504204804.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Begum, Shameena, V. Ratna Vasuki, and K. V. V. Srinivas K.V.V.Srinivas. "Data Security and Protection in Cloud Computing." International Journal of Scientific Research 1, no. 2 (June 1, 2012): 31–34. http://dx.doi.org/10.15373/22778179/jul2012/9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Aruna, K. B., A. LallithaShri, Aravindh ., Jayakumar ., and Jayasurya . "Protection for Multi Owner Data Sharing Scheme." Bonfring International Journal of Advances in Image Processing 7, no. 1 (March 31, 2017): 01–05. http://dx.doi.org/10.9756/bijaip.10485.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

-. "Data Protection Agreement." ASA Bulletin 37, Issue 4 (December 1, 2019): 838–52. http://dx.doi.org/10.54648/asab2019076.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Blackwell, D. "Data protection countdown." Computer Bulletin 40, no. 3 (May 1, 1998): 22–23. http://dx.doi.org/10.1093/combul/40.3.22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Gossman, P., and J. R. Wilkinson. "Data Protection Act." BMJ 295, no. 6610 (November 28, 1987): 1418. http://dx.doi.org/10.1136/bmj.295.6610.1418.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Jakobs, Kai. "Data protection dangers." Science and Public Policy 29, no. 2 (April 2002): 149–50. http://dx.doi.org/10.1093/spp/29.2.149.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

BLUME, PETER. "Practical data protection." International Journal of Law and Information Technology 2, no. 2 (1994): 194–209. http://dx.doi.org/10.1093/ijlit/2.2.194.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Priest, R. G. "Data Protection Act." Psychiatric Bulletin 12, no. 5 (May 1, 1988): 204. http://dx.doi.org/10.1192/pb.12.5.204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Dhont, Jan, and Yves Poullet. "Data protection — Belgium." Computer Law & Security Review 16, no. 1 (February 2000): 5–19. http://dx.doi.org/10.1016/s0267-3649(00)87063-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Rowe, Heather. "EU data protection." Computer Law & Security Review 16, no. 1 (February 2000): 41–42. http://dx.doi.org/10.1016/s0267-3649(00)87072-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Jackson, Margaret. "DATA PROTECTION - AUSTRALIA." Computer Law & Security Review 16, no. 3 (June 2000): 166–69. http://dx.doi.org/10.1016/s0267-3649(00)88911-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Bygrave, Lee A. "EUROPEAN DATA PROTECTION." Computer Law & Security Review 16, no. 4 (August 2000): 252–57. http://dx.doi.org/10.1016/s0267-3649(00)89134-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Carey, Peter, and David Berry. "DATA PROTECTION — SECURITY." Computer Law & Security Review 18, no. 2 (March 2002): 112–13. http://dx.doi.org/10.1016/s0267-3649(02)03010-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Ajana, Btihaj. "Reinventing data protection?" Identity in the Information Society 2, no. 3 (August 25, 2009): 355–58. http://dx.doi.org/10.1007/s12394-009-0025-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Davies, David. "Data protection corner." Computer Law & Security Review 1, no. 5 (January 1986): 9–11. http://dx.doi.org/10.1016/0267-3649(86)90007-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Kolb, Angela. "Data protection — Germany." Computer Law & Security Review 7, no. 3 (September 1991): 123–26. http://dx.doi.org/10.1016/0267-3649(91)90089-e.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Poullet, Y., and M. H. Boulanger. "Data protection — medicine." Computer Law & Security Review 6, no. 5 (January 1991): 18–23. http://dx.doi.org/10.1016/0267-3649(91)90150-t.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Determann, Lothar. "Healthy Data Protection." Michigan Technology Law Review, no. 26.2 (2020): 229. http://dx.doi.org/10.36645/mtlr.26.2.healthy.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Modern medicine is evolving at a tremendous speed. On a daily basis, we learn about new treatments, drugs, medical devices, and diagnoses. Both established technology companies and start-ups focus on health-related products and services in competition with traditional healthcare businesses. Telemedicine and electronic health records have the potential to improve the effectiveness of treatments significantly. Progress in the medical field depends above all on data, specifically health information. Physicians, researchers, and developers need health information to help patients by improving diagnoses, customizing treatments and finding new cures. Yet law and policymakers are currently more focused on the fact that health information can also be used to harm individuals. Even after the outbreak of the COVID-19 pandemic (which occurred after the manuscript for this article was largely finalized), the California Attorney General Becera made a point of announcing that he will not delay enforcement of the California Consumer Privacy Act (“CCPA”), which his office estimated imposes a $55 billion cost (approximately 1.8% of California Gross State Product) for initial compliance, not including costs of ongoing compliance, responses to data subject requests, and litigation. Risks resulting from health information processing are very real. Contact tracing and quarantines in response to SARS, MERS, and COVID-19 outbreaks curb civil liberties with similar effects to law enforcement investigations, arrests, and imprisonment. Even outside the unusual circumstances of a global pandemic, employers or insurance companies may disfavor individuals with pre-existing health conditions in connections with job offers and promotions as well as coverage and eligibility decisions. Some diseases carry a negative stigma in social circumstances. To reduce the risks of such harms and protect individual dignity, governments around the world regulate the collection, use, and sharing of health information with ever-stricter laws. European countries have generally prohibited the processing of personal data, subject to limited exceptions, for which companies have to identify and then document or apply. The General Data Protection Regulation (“GDPR”) that took effect in 2018 confirms and amplifies a rigid regulatory regime that was first introduced in the German State Hessen in 1970 and demands that organizations minimize the amount of data they collect, use, share, and retain. Healthcare and healthtech organizations have struggled to comply with this regime and have found EU data protection laws fundamentally hostile to data-driven progress in medicine. The United States, on the other hand, has traditionally relied on sector- and harm-specific laws to protect privacy, including data privacy and security rules under the federal Health Insurance Portability and Accountability Act (“HIPAA”) and numerous state laws including the Confidentiality of Medical Information Act (“CMIA”) in California, which specifically address the collection and use of health information. So long as organizations observe the specific restrictions and prohibitions in sector-specific privacy laws, they may collect, use, and share health information. As a default rule in the United States, businesses are generally permitted to process personal information, including health information. Yet, recently, extremely broad and complex privacy laws have been proposed or enacted in some states, including the California Consumer Privacy Act of 2018 (“CCPA”), which have a potential to render compliance with data privacy laws impractical for most businesses, including those in the healthcare and healthtech sectors. Meanwhile, the People’s Republic of China is encouraging and incentivizing data-driven research and development by Chinese companies, including in the healthcare sector. Data-related legislation is focused on cybersecurity and securing access to data for Chinese government agencies and much less on individual privacy interests. In Europe and the United States, the political pendulum has swung too far in the direction of ever more rigid data regulation and privacy laws, at the expense of potential benefits through medical progress. This is literally unhealthy. Governments, businesses, and other organizations need to collect, use and share more personal health information, not less. The potential benefits of health data processing far outweigh privacy risks, which can be better tackled by harm-specific laws. If discrimination by employers and insurance companies is a concern, then lawmakers and law enforcement agencies need to focus on anti-discrimination rules for employers and insurance companies - not prohibit or restrict the processing of personal data, which does not per se harm anyone. The notion of only allowing data processing under specific conditions leads to a significant hindrance of medical progress by slowing down treatments, referrals, research, and development. It also prevents the use of medical data as a tool for averting dangers for the public good. Data “anonymization” and requirements for specific consent based on overly detailed privacy notices do not protect patient privacy effectively and unnecessarily complicate the processing of health data for medical purposes. Property rights to personal data offer no solutions. Even if individuals - not companies creating databases - were granted property rights to their own data originally, this would not ultimately benefit individuals. Given that transfer and exclusion rights are at the core of property regimes, data property rights would threaten information freedom and privacy alike: after an individual sells her data, the buyer and new owner could exercise his data property rights to enjoin her and her friends and family from continued use of her personal data. Physicians, researchers, and developers would not benefit either; they would have to deal with property rights in addition to privacy and medical confidentiality requirements. Instead of overregulating data processing or creating new property rights in data, lawmakers should require and incentivize organizations to earn and maintain the trust of patients and other data subjects and penalize organizations that use data in specifically prohibited ways to harm individuals. Electronic health records, improved notice and consent mechanisms, and clear legal frameworks will promote medical progress, reduce risks of human error, lower costs, and make data processing and sharing more reliable. We need fewer laws like the GDPR or the CCPA that discourage organizations from collecting, using, retaining, and sharing personal information. Physicians, researchers, developers, drug companies, medical device manufacturers and governments urgently need better and increased access to personal health information. The future of medicine offers enormous opportunities. It depends on trust and healthy data protection. Some degree of data regulation is necessary, but the dose makes the poison. Laws that require or intend to promote the minimization of data collection, use, and sharing may end up killing more patients than hospital germs. In this article, I promote a view that is decidedly different from that supported by the vast majority of privacy scholars, politicians, the media, and the broader zeitgeist in Europe and the United States. I am arguing for a healthier balance between data access and data protection needs in the interest of patients’ health and privacy. I strive to identify ways to protect health data privacy without excessively hindering healthcare and medical progress. After an introduction (I), I examine current approaches to data protection regulation, privacy law, and the protection of patient confidentiality (II), risks associated with the processing of health data (III), needs to protect patient confidence (IV), risks for healthcare and medical progress (V), and possible solutions (VI). I conclude with an outlook and call for healthier approaches to data protection (VII).
32

Priest, R. G. "Data Protection Act." Bulletin of the Royal College of Psychiatrists 12, no. 5 (May 1988): 204. http://dx.doi.org/10.1192/s0140078900020162.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

McIntyre, T. J. "Reinventing data protection?" Computer Law & Security Review 26, no. 6 (November 2010): 673–76. http://dx.doi.org/10.1016/j.clsr.2010.07.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Garg, Dr Ajay Kumar, and Shikha Kuchhal. "Data Protection Laws in India: A Comparative Study." Indian Journal of Applied Research 3, no. 1 (October 1, 2011): 75–76. http://dx.doi.org/10.15373/2249555x/jan2013/30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Hallinan, D. "Opinions ∙ Data Protection without Data: Could Data Protection Law Apply without Personal Data Being Processed?" European Data Protection Law Review 5, no. 3 (2019): 293–99. http://dx.doi.org/10.21552/edpl/2019/3/5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Shahul Ikram, Nur Adlin Hanisah. "DATA BREACHES EXIT STRATEGY: A COMPARATIVE ANALYSIS OF DATA PRIVACY LAWS." Malaysian Journal of Syariah and Law 12, no. 1 (April 15, 2024): 135–47. http://dx.doi.org/10.33102/mjsl.vol12no1.458.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Data has become highly valuable in the era of digitalisation and is the main target of cybercriminals. Cybercriminals steal data by exploiting system vulnerabilities. The rise of catastrophic data breach incidents affects business operations, reputation and legal standing, leading to business disruptions, financial loss and reputation damage. These incidents have raised data security concerns. The frequent incident is partly due to insufficient security measures in place. This article employs doctrinal research focusing on legal principles based on legislation to analyse Malaysia’s legal framework for protecting personal data in Malaysia and a comparison with other jurisdictions, i.e. the European Union General Data Protection Regulation (GDPR), the Singapore Personal Data Protection Act 2012 and the China Personal Information Protection Law (PIPL). The findings show that Malaysia’s data protection laws fall short of the international norm in some areas. This article suggests that Malaysian policymakers may amend the Personal Data Protection Act 2010 to align with international data protection standards to strengthen data security measures in preventive, detective and responsive data breaches. Consequently, this article provides an analysis of data protection laws in Malaysia and compares them with other advanced jurisdictions. It offers valuable insights into the challenges and opportunities involved in safeguarding personal data, the legal framework, and organisational strategies related to data privacy and security.
37

Mendes de Leon, Pablo. "The Fight Against Terrorism Through Aviation: Data Protection Versus Data Protection." Air and Space Law 31, Issue 4/5 (September 1, 2006): 320–30. http://dx.doi.org/10.54648/aila2006027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Hu, Pengnian, and Qian Wei. "Research on Personal Data Protection of EU General Data Protection Regulation." IOP Conference Series: Materials Science and Engineering 806 (May 5, 2020): 012003. http://dx.doi.org/10.1088/1757-899x/806/1/012003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Hemmings, Nicholas, and Joseph Noar. "Data protection is changing − the new general data protection regulations (GDPR)." Orthodontic Update 11, no. 3 (July 2, 2018): 110–14. http://dx.doi.org/10.12968/ortu.2018.11.3.110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Miño-Vásquez, Verónica. "The Protection of Genetic Data under the General Data Protection regulation." Datenschutz und Datensicherheit - DuD 43, no. 3 (February 25, 2019): 154–58. http://dx.doi.org/10.1007/s11623-019-1083-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Guzmán-Rodríguez, Héctor E. "Data Protection in Mexico: One Right, Two Systems, Different Protections and Uncontrolled Data Breaches." Global Privacy Law Review 2, Issue 2 (June 1, 2021): 149–54. http://dx.doi.org/10.54648/gplr2021019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
To obtain a complete understanding of how data protection laws apply in Mexico, readers must start with the following fact: There are two main data protection laws in Mexico. One applies to companies and individuals processing personal data for non-household activities, the other provides the framework that all Mexican States shall follow to regulate data processing by public entities identified as ‘sujetos obligados’ or ‘obligated subjects’. Even when both laws regulate ‘data protection’ in a very similar way, a close look into them reveals that they provide different rights to data subjects and different obligations for data controllers. As we will indicate, this situation may lead to problems on the differentiated protections and obligations when citizens’ rights are processed by two types of data controllers that otherwise should not have different obligations when processing this information. Mexico, Data Protection, Data Subjects, Portability, Impact Assessment, Breach, Security
42

Li, Zhiping, Jiagui Xie, Likun Gao, and Fanjie Nie. "Data Privacy Protection in Data Fusion." Journal of Physics: Conference Series 2033, no. 1 (September 1, 2021): 012179. http://dx.doi.org/10.1088/1742-6596/2033/1/012179.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Tahim, Arpan, Sanjeeve Sabharwal, Rakesh Dhokia, Rajiv Bajekal, and Steve Kyriacou. "Data protection training improves data handling." Clinical Teacher 9, no. 6 (November 20, 2012): 403–7. http://dx.doi.org/10.1111/j.1743-498x.2012.00557.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Noor Sureani, Nurkhairina Binti, Atikah Shahira Binti Awis Qurni, Ayman Haziqah Binti Azman, Mohd Bahrin Bin Othman, and Hariz Sufi Bin Zahari. "The Adequacy of Data Protection Laws in Protecting Personal Data in Malaysia." Malaysian Journal of Social Sciences and Humanities (MJSSH) 6, no. 10 (October 10, 2021): 488–95. http://dx.doi.org/10.47405/mjssh.v6i10.1087.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
With the burgeoning technology, Malaysia has seen a staggering number of data breaches and data leaks within this past decade alone, with no signs of the trend decreasing. This has raised questions on whether the Personal Data Protection Act 2010 (PDPA) adequately protects the personal data of Malaysians. With the recent COVID-19 pandemic, data has been collected on a larger scale than before, with more frequent data leaks occurring. Hence, this study aims to analyse the adequacy of the PDPA by benchmarking it to the United Kingdom’s (UK) Data Protection Act 2018, which have seen a decrease in data breaches since the implementation of the new legislation. In this context, personal data refers to information processed or recorded that relates directly or indirectly to a data subject, who may be identified from the information and may include sensitive personal data. The study uses a doctrinal analysis methodology to best explore the ideas and concepts within the literature available regarding the protection of personal data. The study also employs a comparative analysis methodology by comparing the scope and application of Malaysian and UK legislation for benchmarking. The findings suggest that there are improvements to be made for the PDPA to be adequate.
45

Supriyadi, Daniar. "The Regulation of Personal and Non-Personal Data in the Context of Big Data." Journal of Human Rights, Culture and Legal System 3, no. 1 (February 14, 2023): 33–69. http://dx.doi.org/10.53955/jhcls.v3i1.71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Data protection laws provide minimum protections for personal data, as well as facilitate the free flow of such data, by setting out principles and rules for legitimate data processing. In the big data context, personal data may not be as easy to distinguish as in traditional data processing, and that makes policy-makers and businesses turn to the identifiability concept: in other words, what data are personal. This research is based on doctrinal legal researchon the legal theory (concepts, rules, and principles) concerning data protection in the EU and Indonesia. The results of the research show that the understand such paramount terminology in data protection law, relevant factors are presented to assess the direct or indirect identification of a natural person. In the EU data protection law, the test entails, for example, risk-based measures and technological development, whereas Indonesian law on data protection has not yet established such assessments. Data within big data operations traditionally falls under the scope of data protection laws only if it discloses the private life of individuals, such as names or other civil identities, but without further conditions to ascertain whether the data can be indirectly identified with an individual.
46

Colangelo, Giuseppe, and Mariateresa Maggiolino. "Data Protection in Attention Markets: Protecting Privacy through Competition?" Journal of European Competition Law & Practice 8, no. 6 (May 10, 2017): 363–69. http://dx.doi.org/10.1093/jeclap/lpx037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Bogosavljević, Mirjana. "Protection of Personal Data in Documents: Application of the Law on Personal Data Protection in Serbia and Abroad." Moderna arhivistika 2, no. 1 (May 1, 2019): 106–15. http://dx.doi.org/10.54356/ma/2019/ghkv7413.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The rapid and continuous development of information technologies that encompasses almost all spheres of social life, imposes the key issue of protecting the privacy personal data, the issue of their availability, the way of their storage, processing, transmission and use. The contemporary concept of privacy puts emphasis on information control, security and data protection in computer information systems. Protection of privacy primarily concerns the issue of protection against abuse, fraud, embezzlement and deliberate or accidental damage. This paper covers several key issues: what are the mechanisms for protecting personal data in documents; is it feasible to achieve higher security of computer systems in terms of data protection; is it possible to limit the distribution of certain types of data (medical reports, financial institutions, schools); what is done regarding data protection in terms of establishing laws, regulations and standards. From the point of view of archivists and archival staff in the era of digitalization of archival material when it becomes accessible and available for use, the protection of personal data in documents is certainly an issue that deserves special attention and consideration. The paper shall provide an overview on the up to date achievements in this field within the archival services in our country and abroad.
48

Starkbaum, Johannes, and Ulrike Felt. "Negotiating the reuse of health-data: Research, Big Data, and the European General Data Protection Regulation." Big Data & Society 6, no. 2 (July 2019): 205395171986259. http://dx.doi.org/10.1177/2053951719862594.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Before the EU General Data Protection Regulation entered into force in May 2018, we witnessed an intense struggle of actors associated with data-dependent fields of science, in particular health-related academia and biobanks striving for legal derogations for data reuse in research. These actors engaged in a similar line of argument and formed issue alliances to pool their collective power. Using descriptive coding followed by an interpretive analysis, this article investigates the argumentative repertoire of these actors and embeds the analysis in ethical debates on data sharing and biobank-related data governance. We observe efforts to perform a paradigmatic shift of the discourse around the General Data Protection Regulation-implementation away from ‘protecting data’ as key concern to ‘protecting health’ of individuals and societies at large. Instead of data protection, the key risks stressed by health researchers became potential obstacles to research. In line, exchange of information with data subjects is not a key concern in the arguments of biobank-related actors and it is assumed that patients want ‘their’ data to be used. We interpret these narratives as a ‘reaction’ to potential restrictions for data reuse and in line with a broader trend towards Big Data science, as the very idea of biobanking is conceptualized around long-term use of readily prepared data. We conclude that a sustainable implementation of biobanks needs not only to comply with the General Data Protection Regulation, but must proactively re-imagine its relation to citizens and data subjects in order to account for the various ways that science gets entangled with society.
49

Erdos, David. "EUROPEAN UNION DATA PROTECTION LAW AND MEDIA EXPRESSION: FUNDAMENTALLY OFF BALANCE." International and Comparative Law Quarterly 65, no. 1 (January 2016): 139–83. http://dx.doi.org/10.1017/s0020589315000512.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
AbstractThe European Data Protection Directive 95/46/EC requires all European Economic Area (EEA) jurisdictions to provide an equivalent regime protecting the privacy and other fundamental rights and freedoms of natural persons in relation to personal data processing, whilst also shielding media expression from the default substantive requirements as necessary to ensure a balance between fundamental rights. Through a comprehensive coding of the derogations set out in each jurisdiction's data protection laws, this article provides the first systematic analysis of whether this has in fact been achieved. It is demonstrated that there is a total lack of even minimal harmonization in this area, with many laws providing for patently unbalanced results especially as regards the publication of sensitive information, which includes criminal convictions and political opinion, and the collection of information without notice direct from the data subject. This reality radically undermines European data protection's twin purposes of ensuring the free flow of personal data and protecting fundamental rights, an outcome which remains largely unaddressed by the proposed new Data Protection Regulation. Practical suggestions are put forward to ameliorate these troubling inconsistencies within the current process of reform.
50

Koziel, G. "Costs of data protection." Актуальні проблеми економіки, no. 7 (145) (2013): 355–60.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

To the bibliography