Academic literature on the topic 'Privacy legislation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Privacy legislation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Privacy legislation"
Woodward, Beverly. "Federal Privacy Legislation." Journal of Law, Medicine & Ethics 26, no. 1 (1998): 80–81. http://dx.doi.org/10.1111/j.1748-720x.1998.tb01910.x.
Full textCharlesworth, Andrew J. "Privacy, Personal Information and Employment." Surveillance & Society 1, no. 2 (September 1, 2002): 217–22. http://dx.doi.org/10.24908/ss.v1i2.3355.
Full textCarapetis, Jonathan R., Jonathon W. Passmore, and Kerry Ann O'Grady. "Privacy legislation and research." Medical Journal of Australia 177, no. 9 (November 2002): 523. http://dx.doi.org/10.5694/j.1326-5377.2002.tb04929.x.
Full textBreen, Kerry J., and Sandra M. Hacker. "Comment: Privacy legislation and research." Medical Journal of Australia 177, no. 9 (November 2002): 523–24. http://dx.doi.org/10.5694/j.1326-5377.2002.tb04930.x.
Full textSkene, Loane LC. "Comment: Privacy legislation and research." Medical Journal of Australia 177, no. 9 (November 2002): 524. http://dx.doi.org/10.5694/j.1326-5377.2002.tb04931.x.
Full textHFARKAS, D., H. GOERL, and R. HYER. "Genetic privacy legislation: Two views." Molecular Diagnosis 2, no. 1 (March 1997): 83–87. http://dx.doi.org/10.1016/s1084-8592(97)80014-8.
Full textTrouille, Helen. "Private Life and Public Image: Privacy Legislation in France." International and Comparative Law Quarterly 49, no. 1 (January 2000): 199–208. http://dx.doi.org/10.1017/s0020589300064034.
Full textKatzav, Gilad. "Compartmentalised data protection in South Africa: The right to privacy in the Protection of Personal Information Act." South African Law Journal 139, no. 2 (2022): 432–70. http://dx.doi.org/10.47348/salj/v139/i2a8.
Full textWHITE, MARY TERRELL. "Underlying Ambiguities in Genetic Privacy Legislation." Genetic Testing 3, no. 4 (January 1999): 341–45. http://dx.doi.org/10.1089/gte.1999.3.341.
Full textWhite, Garry L., Francis A. Méndez Mediavilla, and Jaymeen R. Shah. "Information Privacy." International Journal of Information Security and Privacy 5, no. 1 (January 2011): 50–66. http://dx.doi.org/10.4018/jisp.2011010104.
Full textDissertations / Theses on the topic "Privacy legislation"
Gunnarsson, Annicka, and Siri Ekberg. "Invasion of Privacy : Spam - one result of bad privacy protection." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5393.
Full textHarding, Ian M., and n/a. "The introduction of privacy legislation to Australia as a case study in policy making." University of Canberra. Administrative Studies, 1998. http://erl.canberra.edu.au./public/adt-AUC20060720.124331.
Full textSaganich, Robert Lee. "An investigation of electronic Protected Health Information (e-PHI) privacy policy legislation in California for seniors using in-home health monitoring systems." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1075.
Full textCaple, Andrew. "Transparency, privacy and equality: A human rights analysis of the open justice principle in Australian mental health legislation." Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/109615/1/Andrew_Caple_Thesis.pdf.
Full textMoller, Kerry. "The Right to Digital Privacy: Advancing the Jeffersonian Vision of Adaptive Change." Scholarship @ Claremont, 2014. http://scholarship.claremont.edu/cmc_theses/936.
Full textBanerjea-Brodeur, Nicolas Paul. "Advance passenger information passenger name record : privacy rights and security awareness." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=80909.
Full textPassenger Name Record access permits authorities to have additional data that could identify individuals requiring more questioning prior to border control clearance. This data does not cause in itself privacy issues other than perhaps the potential retention and manipulation of information that Border Control Authorities may acquire. In essence, bilateral agreements between governments should be sought in order to protect national legislation.
The common goal of the airline industry is to ensure safe and efficient air transport. API and PNR should be viewed as formalities that can facilitate border control clearance and prevent the entrance of potentially high-risk individuals.
Kan, Chi-keung, and 簡志強. "A review of the implementation of the personal data (privacy) ordinance in the Hong Kong Correctional Services Department." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1998. http://hub.hku.hk/bib/B31965507.
Full textWatt, James Robert. "Electronic workplace surveillance and employee privacy : a comparative analysis of privacy protection in Australia and the United States." Thesis, Queensland University of Technology, 2009. https://eprints.qut.edu.au/26536/1/James_Watt_Thesis.pdf.
Full textWatt, James Robert. "Electronic workplace surveillance and employee privacy : a comparative analysis of privacy protection in Australia and the United States." Queensland University of Technology, 2009. http://eprints.qut.edu.au/26536/.
Full textMabeka, Nombulelo Queen. "When does the conduct of an employer infringe on an employee's constitutional right to privacy when intercepting or monitoring electronic communications?" Thesis, University of the Western Cape, 2008. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_5883_1253850534.
Full text"
The Regulation of Interception of Communications and Provision of Communication Related Information Act 70 of 2002 (RICA) that regulates the monitoring of electronic communications has not yet been tested by our courts. This paper explores the likelihood of an infringement of an employee's right to privacy by an employer in the process of intercepting the latters electronic communications. It is argued that there is no explicit provision of the protection of the right to privacy that is provided in the LRA. It is further argued that the provisions of section 4, 5 and 6 of RICA as they stand do not necessarily provide for the protection of an employee's right to privacy, but the incorporation of these sections could be construed as meaning that the legislature or the framers of the legislation intended to limit the employers right to trade freely, at the same breath, limit the employees right to privacy. It is argued that RICA does not provide protection for the right to privacy wherein consent has been obtained under duress or based on misrepresentation of facts. It is contended that the interception of employees electronic communications in such circumstances would be regarded as an infringement of such employees right to privacy. The burden of proving duress or misrepresentation of facts rests on the employee who alleges that such consent was obtained under duress or based on misrepresentation of facts. It is also argued that RICA does not define the meaning of the words in the course of carrying on of business or reasonable steps provided in section 6 of RICA. It is argued that the meaning of in the course of carrying on of business would be determined by the type of the industry upon which the business operates, as well as the circumstances of the case. Reasonable steps would be regarded as being taken if employers notify employees that their electronic communications would be intercepted..."
Books on the topic "Privacy legislation"
Ontario. Freedom of Information and Privacy Branch. Ontario's access and privacy legislation: An annotation. Toronto, Ont: Management Board Secretariat, 1992.
Find full textInstitute, Pennsylvania Bar. Privacy. [Mechanicsburg, Pa.] (5080 Ritter Rd., Mechanicsburg 17055-6903): Pennsylvania Bar Institute, 2005.
Find full textElder, David A. Privacy torts. [St. Paul, Minn.]: Thomson/West, 2002.
Find full textDavid, Allison. Personal Data (Privacy) (Amendment) Ordinance: Guidance and legislation. Hong Kong: Sweet & Maxwell/Thomson Reuters Hong Kong Limited, 2013.
Find full textH, Franklin Charles E., and International Chamber of Commerce, eds. Business guide to privacy and data protection legislation. Paris: ICC Pub., 1996.
Find full textWestern Australia. Office of the Attorney General. Privacy legislation for Western Australia policy research paper. Perth, , WA: Privacy Working Group, 2003.
Find full textHébert, L. Camille. Employee privacy law. [St. Paul, Minn.]: West Group, 1993.
Find full textPlatt, Priscilla. Privacy law in the private sector: An annotation of the legislation in Canada. Aurora, ON: Canada Law Book, 2002.
Find full textKoral, Alan M. Employee privacy rights. New York, N.Y: Executive Enterprises Publications, 1988.
Find full textOntario's proposed personal health information privacy legislation for health sector (health sector privacy rules). Toronto, Ont: Ministry of Health and Long-Term Care, 2000.
Find full textBook chapters on the topic "Privacy legislation"
Lane, V. P. "Privacy and Data Protection Legislation." In Security of Computer Based Information Systems, 130–43. London: Macmillan Education UK, 1985. http://dx.doi.org/10.1007/978-1-349-18011-0_9.
Full textPatrick, Andrew S., and Steve Kenny. "From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions." In Privacy Enhancing Technologies, 107–24. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-40956-4_8.
Full textShvets, Yuriy Yu. "Legislation Comparison in the Sphere of Health Protection in Selected European Countries." In Data Protection and Privacy in Healthcare, 200–211. Boca Raton, FL : CRC Press, 2021.: CRC Press, 2021. http://dx.doi.org/10.1201/9781003048848-11.
Full textCeleste, Edoardo, and Federico Fabbrini. "Competing Jurisdictions: Data Privacy Across the Borders." In Palgrave Studies in Digital Business & Enabling Technologies, 43–58. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-54660-1_3.
Full textMuntermann, Jan, and Heiko Roßnagel. "On the Effectiveness of Privacy Breach Disclosure Legislation in Europe: Empirical Evidence from the US Stock Market." In Identity and Privacy in the Internet Age, 1–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04766-4_1.
Full textGeorgiadou, Yola, Ourania Kounadi, and Rolf A. de By. "Digital Earth Ethics." In Manual of Digital Earth, 785–810. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-32-9915-3_25.
Full textPoullet, Yves. "About the E-Privacy Directive: Towards a Third Generation of Data Protection Legislation?" In Data Protection in a Profiled World, 3–30. Dordrecht: Springer Netherlands, 2010. http://dx.doi.org/10.1007/978-90-481-8865-9_1.
Full textLyons, Valerie. "Justice vs Control in Cloud Computing: A Conceptual Framework for Positioning a Cloud Service Provider’s Privacy Orientation." In Palgrave Studies in Digital Business & Enabling Technologies, 79–104. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-54660-1_5.
Full textČtvrtník, Mikuláš. "Personality Rights, Privacy, and Post-mortem Privacy Protection in Archives: International Comparison, Germany and “Protection of Legitimate Interests”." In Archives and Records, 19–53. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-18667-7_2.
Full textJohnston, Steven R. "The Impact of Privacy and Data Protection Legislation on the Sharing of Intrusion Detection Information." In Lecture Notes in Computer Science, 150–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45474-8_10.
Full textConference papers on the topic "Privacy legislation"
Glass, Leah, and Robin Gresko. "Legislation and Privacy across Borders." In 2012 International Conference on Privacy, Security, Risk and Trust (PASSAT). IEEE, 2012. http://dx.doi.org/10.1109/socialcom-passat.2012.135.
Full textLioudakis, G. V., E. A. Koutsoloukas, N. L. Dellas, F. Gaudino, D. I. Kaklamani, and I. S. Venieris. "Technical Enforcement of Privacy Legislation." In 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications. IEEE, 2007. http://dx.doi.org/10.1109/pimrc.2007.4394184.
Full textBecker, Anja, Alapan Arnab, and Mercè Serra. "Assessing privacy criteria for drm using eu privacy legislation." In the 8th ACM workshop. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1456520.1456534.
Full textPasca, Ioana-Celina. "Criminal Protection of Privacy in Legislation of Romania." In The 7th International Scientific Conference of the Faculty of Law of the University of Latvia. University of Latvia, 2020. http://dx.doi.org/10.22364/iscflul.7.2.23.
Full textBekara, Kheira, and Maryline Laurent. "A Semantic Information Model Based on the Privacy Legislation." In 2011 Conference on Network and Information Systems Security (SAR-SSI). IEEE, 2011. http://dx.doi.org/10.1109/sar-ssi.2011.5931375.
Full textDaniels, Jesse, and Sajal Bhatia. "Legislation and the Negative Impact on Cybersecurity in Healthcare." In 6th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2020. http://dx.doi.org/10.5220/0009157906910697.
Full textMirkovic, Jelena, Eva Skipenes, Ellen K. Christiansen, and Haakon Bryhni. "Security and privacy legislation guidelines for developing personal health records." In 2015 Second International Conference on eDemocracy & eGovernment (ICEDEG). IEEE, 2015. http://dx.doi.org/10.1109/icedeg.2015.7114460.
Full textBekara, Kheira, Maryline Laurent, and Than Ha Nguyen. "Technical Enforcement of European Privacy Legislation: An Access Control Approach." In 2012 5th International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 2012. http://dx.doi.org/10.1109/ntms.2012.6208724.
Full textPusztahelyi, Réka. "Recent EU Legislation Relating to Drones in the Light of Right to Privacy." In MultiScience - XXXIII. microCAD International Multidisciplinary Scientific Conference. University of Miskolc, 2019. http://dx.doi.org/10.26649/musci.2019.062.
Full textKrunic, Tanja, and Ljiljana Ruzic-Dimitrijevic. "Online Privacy Analysis and Hints for Its Improvement." In InSITE 2008: Informing Science + IT Education Conference. Informing Science Institute, 2008. http://dx.doi.org/10.28945/3216.
Full textReports on the topic "Privacy legislation"
Ponce, Joseph A. The Privacy Officer: A Critical Success Factor in the Implementation and Maintenance of HIPAA Legislation in DoD Medical Treatment Facilities. Fort Belvoir, VA: Defense Technical Information Center, May 2002. http://dx.doi.org/10.21236/ada420902.
Full textEastman, Brittany. Legal Issues Facing Automated Vehicles, Facial Recognition, and Privacy Rights. SAE International, July 2022. http://dx.doi.org/10.4271/epr2022016.
Full textPrats, Joan, Helen Harris, and Juan Andrés Pérez. Political Determinants of Public-Private Partnerships. Inter-American Development Bank, September 2021. http://dx.doi.org/10.18235/0003619.
Full textDurovic, Mateja, and Franciszek Lech. A Consumer Law Perspective on the Commercialization of Data. Universitätsbibliothek J. C. Senckenberg, Frankfurt am Main, 2021. http://dx.doi.org/10.21248/gups.64577.
Full textAzuaje Pirela, Michelle. ¿Por qué es necesario repensar la tributación minera y cómo hacerlo? Universidad Autónoma de Chile, March 2021. http://dx.doi.org/10.32457/20.500.12728/90342021115.
Full textBergsen, Pepijn, Carolina Caeiro, Harriet Moynihan, Marianne Schneider-Petsinger, and Isabella Wilkinson. Digital trade and digital technical standards. Royal Institute of International Affairs, January 2022. http://dx.doi.org/10.55317/9781784135133.
Full textAyala, David, Ashley Graves, Colton Lauer, Henrik Strand, Chad Taylor, Kyle Weldon, and Ryan Wood. Flooding Events Post Hurricane Harvey: Potential Liability for Dam and Reservoir Operators and Recommendations Moving Forward. Edited by Gabriel Eckstein. Texas A&M University School of Law Program in Natural Resources Systems, September 2018. http://dx.doi.org/10.37419/eenrs.floodingpostharvey.
Full text2023 SDG4 scorecard on progress towards national SDG 4 benchmarks: focus on early childhood. UNESCO, January 2023. http://dx.doi.org/10.54676/zslv3583.
Full text