Academic literature on the topic 'Privacy policy compliance'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Privacy policy compliance.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Privacy policy compliance"

1

Mazmudar, Miti, and Ian Goldberg. "Mitigator: Privacy policy compliance using trusted hardware." Proceedings on Privacy Enhancing Technologies 2020, no. 3 (July 1, 2020): 204–21. http://dx.doi.org/10.2478/popets-2020-0049.

Full text
Abstract:
AbstractThrough recent years, much research has been conducted into processing privacy policies and presenting them in ways that are easy for users to understand. However, understanding privacy policies has little utility if the website’s data processing code does not match the privacy policy. Although systems have been proposed to achieve compliance of internal software to access control policies, they assume a large trusted computing base and are not designed to provide a proof of compliance to an end user. We design Mitigator, a system to enforce compliance of a website’s source code with a privacy policy model that addresses these two drawbacks of previous work. We use trusted hardware platforms to provide a guarantee to an end user that their data is only handled by code that is compliant with the privacy policy. Such an end user only needs to trust a small module in the hardware of the remote back-end machine and related libraries but not the entire OS. We also provide a proof-of-concept implementation of Mitigator and evaluate it for its latency. We conclude that it incurs only a small overhead with respect to an unmodified system that does not provide a guarantee of privacy policy compliance to the end user.
APA, Harvard, Vancouver, ISO, and other styles
2

Javed, Yousra, Elham Al Qahtani, and Mohamed Shehab. "Privacy Policy Analysis of Banks and Mobile Money Services in the Middle East." Future Internet 13, no. 1 (January 3, 2021): 10. http://dx.doi.org/10.3390/fi13010010.

Full text
Abstract:
Privacy compliance of the Middle East’s financial sector has been relatively unexplored. This paper evaluates the privacy compliance and readability of privacy statements for top banks and mobile money services in the Middle East. Our analysis shows that, overall, Middle Eastern banks have better privacy policy availability and language distribution, and are more privacy compliant compared to mobile money services. However, both the banks and mobile money services need to improve (1) compliance with the principles of children/adolescent’s data protection, accountability and enforcement, and data minimization/retention, and (2) privacy statement texts to be comprehensible for a reader with ~8 years of education or less.
APA, Harvard, Vancouver, ISO, and other styles
3

Joshi, Karuna Pande, and Agniva Banerjee. "Automating Privacy Compliance Using Policy Integrated Blockchain." Cryptography 3, no. 1 (February 5, 2019): 7. http://dx.doi.org/10.3390/cryptography3010007.

Full text
Abstract:
An essential requirement of any information management system is to protect data and resources against breach or improper modifications, while at the same time ensuring data access to legitimate users. Systems handling personal data are mandated to track its flow to comply with data protection regulations. We have built a novel framework that integrates semantically rich data privacy knowledge graph with Hyperledger Fabric blockchain technology, to develop an automated access-control and audit mechanism that enforces users' data privacy policies while sharing their data with third parties. Our blockchain based data-sharing solution addresses two of the most critical challenges: transaction verification and permissioned data obfuscation. Our solution ensures accountability for data sharing in the cloud by incorporating a secure and efficient system for End-to-End provenance. In this paper, we describe this framework along with the comprehensive semantically rich knowledge graph that we have developed to capture rules embedded in data privacy policy documents. Our framework can be used by organizations to automate compliance of their Cloud datasets.
APA, Harvard, Vancouver, ISO, and other styles
4

Fernald, Frances R. "HIPAA Patient Privacy Compliance Guide." Journal For Healthcare Quality 24, no. 6 (November 2002): 52. http://dx.doi.org/10.1097/01445442-200211000-00017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Kaijun, Guoai Xu, Xiaomei Zhang, Guosheng Xu, and Zhangjie Zhao. "Evaluating the Privacy Policy of Android Apps: A Privacy Policy Compliance Study for Popular Apps in China and Europe." Scientific Programming 2022 (August 23, 2022): 1–15. http://dx.doi.org/10.1155/2022/2508690.

Full text
Abstract:
Recently, with the increase in the market share of the Android system and the sharp increase in the number of Android mobile apps, many countries and regions have successively launched laws and regulations related to data security. The EU’s GDPR and China’s Information Security Technology-Personal Information Security Specification are two of the most important bills, affecting vast areas and large populations. Both regulations impose requirements on privacy policy specifications for Android apps. With these requirements, however, apps’ privacy policies have become larger. Researchers have conducted studies on whether the actual privacy behavior of apps conforms to their privacy policy description but have not focused on compliance with the privacy policy itself. In this paper, we propose evaluation metrics for privacy policy compliance and evaluate popular apps by analyzing privacy policies and apps. We applied our method to 1,000 apps from the Google Play Store in Europe and 1,000 apps from the Tencent Appstore in China. We detected a number of app privacy policy noncompliance issues and discovered a number of privacy issues with third-party services and third-party libraries.
APA, Harvard, Vancouver, ISO, and other styles
6

Valentine, Greta, and Kate Barron. "An Examination of Academic Library Privacy Policy Compliance with Professional Guidelines." Evidence Based Library and Information Practice 17, no. 3 (September 19, 2022): 77–96. http://dx.doi.org/10.18438/eblip30122.

Full text
Abstract:
Objective – The tension between upholding privacy as a professional value and the ubiquity of collecting patrons’ data to provide online services is now common in libraries. Privacy policies that explain how the library collects and uses patron records are one way libraries can provide transparency around this issue. This study examines 78 policies collected from the public websites of U.S. Association of Research Libraries’ (ARL) members and examines these policies for compliance with American Library Association (ALA) guidelines on privacy policy content. This overview can provide library policy makers with a sense of trends in the privacy policies of research-intensive academic libraries, and a sense of the gaps where current policies (and guidelines) may not adequately address current privacy concerns. Methods – Content analysis was applied to analyze all privacy policies. A deductive codebook based on ALA privacy policy guidelines was first used to code all policies. The authors used consensus coding to arrive at agreement about where codes were present. An inductive codebook was then developed to address themes present in the text that remained uncoded after initial deductive coding. Results – Deductive coding indicated low policy compliance with ALA guidelines. None of the 78 policies contained all 20 codes derived from the guidelines, and only 6% contained more than half. No individual policy contained more than 75% of the content recommended by ALA. Inductive coding revealed themes that expanded on the ALA guidelines or addressed emerging privacy concerns such as library-initiated data collection and sharing patron data with institutional partners. No single inductive code appeared in more than 63% of policies. Conclusion – Academic library privacy policies appear to be evolving to address emerging concerns such as library-initiated data collection, invisible data collection via vendor platforms, and data sharing with institutional partners. However, this study indicates that most libraries do not provide patrons with a policy that comprehensively addresses how patrons’ data are obtained, used, and shared by the library.
APA, Harvard, Vancouver, ISO, and other styles
7

Linden, Thomas, Rishabh Khandelwal, Hamza Harkous, and Kassem Fawaz. "The Privacy Policy Landscape After the GDPR." Proceedings on Privacy Enhancing Technologies 2020, no. 1 (January 1, 2020): 47–64. http://dx.doi.org/10.2478/popets-2020-0004.

Full text
Abstract:
AbstractThe EU General Data Protection Regulation (GDPR) is one of the most demanding and comprehensive privacy regulations of all time. A year after it went into effect, we study its impact on the landscape of privacy policies online. We conduct the first longitudinal, in-depth, and at-scale assessment of privacy policies before and after the GDPR. We gauge the complete consumption cycle of these policies, from the first user impressions until the compliance assessment. We create a diverse corpus of two sets of 6,278 unique English-language privacy policies from inside and outside the EU, covering their pre-GDPR and the post-GDPR versions. The results of our tests and analyses suggest that the GDPR has been a catalyst for a major overhaul of the privacy policies inside and outside the EU. This overhaul of the policies, manifesting in extensive textual changes, especially for the EU-based websites, comes at mixed benefits to the users.While the privacy policies have become considerably longer, our user study with 470 participants on Amazon MTurk indicates a significant improvement in the visual representation of privacy policies from the users’ perspective for the EU websites. We further develop a new workflow for the automated assessment of requirements in privacy policies. Using this workflow, we show that privacy policies cover more data practices and are more consistent with seven compliance requirements post the GDPR. We also assess how transparent the organizations are with their privacy practices by performing specificity analysis. In this analysis, we find evidence for positive changes triggered by the GDPR, with the specificity level improving on average. Still, we find the landscape of privacy policies to be in a transitional phase; many policies still do not meet several key GDPR requirements or their improved coverage comes with reduced specificity.
APA, Harvard, Vancouver, ISO, and other styles
8

Halder, Suhasish, V. S. Prakash Attili, and Vivek Gupta. "Information Privacy Assimilation." International Journal of Digital Strategy, Governance, and Business Transformation 12, no. 1 (January 1, 2022): 1–17. http://dx.doi.org/10.4018/ijdsgbt.313954.

Full text
Abstract:
This paper proposes a framework to understand organizations' perspectives while safeguarding customers' information privacy. Following a detailed literature review, a broad conceptual model was developed to build a theory based on a multi-site, multi-case study approach. The current manuscript treats information privacy as distinct from information security. From an organizational standpoint, this research reveals that legal policy, technology, and industry standards drive privacy assimilation. At a detailed level, adherence to compliance, competitive best practices, and data management controls significantly impact an organization's opportunistic perspective, resulting in higher-order assimilation (infusion) of organizational privacy practices. Resistance to compliance, investment cost, and reactive approach results in lower-order assimilation (adaptation) of organizational privacy practices. This study delivers practical implications related to how businesses perceive privacy practices while maintaining the right balance of privacy risks and opportunities.
APA, Harvard, Vancouver, ISO, and other styles
9

Costante, Elisa, Federica Paci, and Nicola Zannone. "Privacy-Aware Web Service Composition and Ranking." International Journal of Web Services Research 10, no. 3 (July 2013): 1–23. http://dx.doi.org/10.4018/ijwsr.2013070101.

Full text
Abstract:
Service selection is a key issue in the Future Internet, where applications are built by composing services and content offered by different service providers. Most existing service selection schemas only focus on QoS properties of services such as throughput, latency and response time, or on their trust and reputation level. By contrast, the risk of privacy breaches arising from the selection of component services whose privacy policy is not compliant with customers’ privacy preferences is largely ignored. In this paper, the authors propose a novel privacy-preserving Web service composition and selection approach which (i) makes it possible to verify the compliance between users’ privacy requirements and providers’ privacy policies and (ii) ranks the composite Web services with respect to the privacy level they offer. The authors illustrate their approach using an eCommerce Web service as an example of service composition. Moreover, the authors present a possible Java-based implementation of the proposed approach and present an extension to WS-Policy standard to specify privacy related assertions.
APA, Harvard, Vancouver, ISO, and other styles
10

Brothers, Kyle Bertram, and Ellen Wright Clayton. "“Human Non-Subjects Research”: Privacy and Compliance." American Journal of Bioethics 10, no. 9 (September 9, 2010): 15–17. http://dx.doi.org/10.1080/15265161.2010.492891.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Privacy policy compliance"

1

Warren, Adam P. "Fully compliant? : a study of data protection policy in UK public organisations." Thesis, Loughborough University, 2003. https://dspace.lboro.ac.uk/2134/6980.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Marques, Emilena Muzolon. "Análise dos fatores intervenientes no cumprimento das normas referentes às reservas legais no Estado de São Paulo." Universidade de São Paulo, 2011. http://www.teses.usp.br/teses/disponiveis/18/18139/tde-01112011-094155/.

Full text
Abstract:
A reserva legal, instituída pelo Código Florestal Brasileiro (Lei n° 4.771 de 1965), determina que toda propriedade rural deve manter uma parcela da sua área permanentemente coberta com vegetação nativa. Mesmo reconhecida como importante instrumento para a conservação da biodiversidade no país, suas normas são amplamente desrespeitadas. O presente estudo teve por objetivo analisar os fatores que afetam o cumprimento da reserva legal nos municípios do Estado de São Paulo. Para tanto, a existência de correlação entre medidas de cumprimento à RL, referentes ao número e área de reserva legal averbada, dos municípios e Agências Ambientais do Estado e fatores sócio-econômicos, ecológicos e institucionais obtidos em banco de dados Estaduais e Federais foi investigada por meio de diagramas de dispersão, testes de correlação e análise de regressão linear múltipla. Posteriormente, indicadores quantitativos de estrutura e organização interna das Agências Ambientais, obtidos em questionário aplicado a estes órgãos, foram comparados aos índices de cumprimento da reserva legal. Os dados mostram que 98,2% das propriedades rurais do Estado não respeitam o percentual de 20% de RL preconizado na legislação federal e confirmam a hipótese inicial de que algumas regiões do Estado apresentam déficit menor de áreas protegidas nas propriedades privadas. As análises estatísticas revelam, ao contrário do que era esperado, que o valor de produção de produtos agropecuários e o preço da terra não são os principais determinantes da manutenção de áreas protegidas nas propriedades rurais. Os resultados indicam ainda que índices maiores de vegetação nativa remanescente implicam em cumprimento à reserva legal mais efetivo e que a estrutura e organização com que contam as Agências Ambientais não possuem papel decisivo no êxito dos procedimentos de averbação de reserva legal. A maior contribuição do estudo é apontar que o principal argumento utilizado pelos segmentos produtivos da agropecuária para justificar o descumprimento à Reserva Legal, de que são fatores econômicos, principalmente, que afetam a decisão de manter a RL, não se sustenta. Outros fatores, não tratados neste estudo, podem influenciar o cumprimento da RL, portanto, são necessários mais estudos que abordem, em profundidade, os diferentes aspectos que envolvem a decisão de manter áreas protegidas em terras privadas.
Legal Reserve Forest, instituted by the Brazilian Forest Code (Law 4.471/1965), requires that each rural properties in national territory must have a patch of native vegetation in their land. Despite the importance for nature conservation has been recognized, until today the LR it has not been fully implemented. The present study aim to investigate the factors that interfere in the obey of legal reserve in the municipal districts of the Sao Paulo Stated. The correlations between the indexes of accomplishment of LR across the municipal districts and Environmental Agencies of Sao Paulo Stated and socioeconomic, ecological and institutional factors available on government databases, was explore by bloxplots, correlation analysis and multiple linear regression analysis Then, quantitative indicators of structure and organization of Environmental Agencies, calculated by the questionnaire applied in this institutions, was compared to the indexes of accomplishment of LR. The first surveying of data show that 98.2% of rural properties dont comply with the percentage of 20% of LR fixed in the Federal Law and sustain the initial hypothesis that some regions of the State present lower deficit of protect areas on private ownerships. The analysis demonstrate, instead of the expected, that Production Value of main agricola products and Land Price were not the main determinants of keep vegetation areas in the rural properties. The results also show that high percentage of forestry remnants significantly imply in compliance more effective and the structure and organization of Environmental Agencies dont appear as an essential role in the outcome of LR proceeds of assigned. The main finding of the study is point that main argument used by farming sector, that economic factors mainly affect the decision to keep protected areas as LR, was not support. Other factors, not discussion on this work can explain the variation of LR so, it is essential that more studies treat deeply different aspects of decision to keep protected areas in private lands.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Privacy policy compliance"

1

Determann, Lothar. Determann's field guide to data privacy law: International corporate compliance. Cheltenham, UK: Edward Elgar Publishing, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Brouwer, Floor, R. A. Jongeneel, and Glenn Fox. The economics of regulation in agriculture: Compliance with public and private standards. Wallingford, Oxfordshire, UK: CABI, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Durakova, Irina, Aleksandra Mitrofanova, Tat'yana Rahmanova, Ekaterina Mayer, Marina Holyavka, Ol'ga Gerr, Asya Vavilova, et al. Personnel management in Russia: from the ego to the ecosystem. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1567065.

Full text
Abstract:
The monograph contains the results of research concerning, firstly, the ecosystem as a response to the challenges of the XXI century. Secondly, the problems of labor longevity and success in organizations that form an ecosystem approach to working with personnel, including through the use in practice of biomedical factors, socio-economic conditions, nagging as a "soft power" to push older workers to productive work. Thirdly, the realities and problems of combining work and private life, studied from several positions. Among them: the formation of corporate policy, corporate interest, professional orientation; the actual balance of "work — private life", as well as the optimization of labor behavior through the formation of a sense of self-esteem in the workplace, the management of employees ' experience. Fourth, systematization of the results of the health management study, taking into account the experience gained during the coronavirus pandemic — occupational safety management, health promotion in the organization, including the situation of self-isolation. Fifth, the concept of compliance in the personnel management system. For students, undergraduates, postgraduates, doctoral students, researchers studying or conducting research in the field of personnel management, as well as the teaching staff of universities and employers.
APA, Harvard, Vancouver, ISO, and other styles
4

Office, General Accounting. Foreign assistance: USAID compliance with family planning restrictions : report to the Chairman, Committee on Foreign Relations, U.S. Senate. Washington, D.C. (P.O. Box 37050, Washington 20013): The Office, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Office, General Accounting. Foreign assistance: USAID compliance with family planning restrictions : report to the Chairman, Committee on Foreign Relations, U.S. Senate. Washington, D.C. (P.O. Box 37050, Washington 20013): The Office, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Office, General Accounting. Drinking water: Information on the quality of water found at community water systems and private wells : report to Congressional requesters. Washington, D.C: U.S. General Accounting Office, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Office, General Accounting. Drinking water: Information on the quality of water found at community water systems and private wells : report to congressional requesters. Washington, D.C: GAO, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Determann, Lothar. Determann's Field Guide to Data Privacy Law: International Corporate Compliance. Elgar Publishing Limited, Edward, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Determann, Lothar. Determann's Field Guide to Data Privacy Law: International Corporate Compliance. Elgar Publishing Limited, Edward, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Determann, Lothar. Determann's Field Guide to Data Privacy Law: International Corporate Compliance, Third Edition. Elgar Publishing Limited, Edward, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Privacy policy compliance"

1

Karyda, Maria, and Aggeliki Tsohou. "Information Security Policy Compliance." In Encyclopedia of Cryptography, Security and Privacy, 1–3. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1675-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tsohou, Aggeliki, and Maria Karyda. "Information Security Policy Compliance Competences." In Encyclopedia of Cryptography, Security and Privacy, 1–3. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1676-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Agarwal, Sushant, Simon Steyskal, Franjo Antunovic, and Sabrina Kirrane. "Legislative Compliance Assessment: Framework, Model and GDPR Instantiation." In Privacy Technologies and Policy, 131–49. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02547-2_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Xu, Heng, John W. Bagby, and Terence Ryan Melonas. "Regulating Privacy in Wireless Advertising Messaging: FIPP Compliance by Policy vs. by Design." In Privacy Enhancing Technologies, 19–36. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03168-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Di Crescenzo, Giovanni, Joan Feigenbaum, Debayan Gupta, Euthimios Panagos, Jason Perry, and Rebecca N. Wright. "Practical and Privacy-Preserving Policy Compliance for Outsourced Data." In Financial Cryptography and Data Security, 181–94. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-44774-1_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mohan, Jayashree, Melissa Wasserman, and Vijay Chidambaram. "Analyzing GDPR Compliance Through the Lens of Privacy Policy." In Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 82–95. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-33752-0_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mont, Marco Casassa, Siani Pearson, and Robert Thyne. "A Systematic Approach to Privacy Enforcement and Policy Compliance Checking in Enterprises." In Trust and Privacy in Digital Business, 91–102. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11824633_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cortesi, Agostino, Pietro Ferrara, Marco Pistoia, and Omer Tripp. "Datacentric Semantics for Verification of Privacy Policy Compliance by Mobile Applications." In Lecture Notes in Computer Science, 61–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-46081-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ioannou, Constantinos. "A Framework for Privacy Policy Compliance in the Internet of Things." In Research Challenges in Information Science, 595–603. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50316-1_43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mont, Marco Casassa, Robert Thyne, Pete Bramhall, and Kwok-Nga Chan. "Privacy Policy Enforcement in Enterprises: Addressing Regulatory Compliance and Governance Needs." In ISSE 2005 — Securing Electronic Business Processes, 137–48. Wiesbaden: Vieweg+Teubner Verlag, 2005. http://dx.doi.org/10.1007/978-3-322-85237-3_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Privacy policy compliance"

1

Yee, G., and L. Korba. "Privacy policy compliance for Web services." In Proceedings. IEEE International Conference on Web Services, 2004. IEEE, 2004. http://dx.doi.org/10.1109/icws.2004.1314735.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Squicciarini, Anna, Marco Casassa Mont, Abhilasha Bhargav-Spantzel, and Elisa Bertino. "Automatic Compliance of Privacy Policies in Federated Digital Identity Management." In 2008 IEEE Workshop on Policies for Distributed Systems and Networks - POLICY. IEEE, 2008. http://dx.doi.org/10.1109/policy.2008.46.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Xie, Fuman, Yanjun Zhang, Chuan Yan, Suwan Li, Lei Bu, Kai Chen, Zi Huang, and Guangdong Bai. "Scrutinizing Privacy Policy Compliance of Virtual Personal Assistant Apps." In ASE '22: 37th IEEE/ACM International Conference on Automated Software Engineering. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3551349.3560416.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Subahi, Alanoud, and George Theodorakopoulos. "Ensuring Compliance of IoT Devices with Their Privacy Policy Agreement." In 2018 IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud). IEEE, 2018. http://dx.doi.org/10.1109/ficloud.2018.00022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Shuang, Baiyang Zhao, Renjie Guo, Guozhu Meng, Fan Zhang, and Meishan Zhang. "Have You been Properly Notified? Automatic Compliance Analysis of Privacy Policy Text with GDPR Article 13." In WWW '21: The Web Conference 2021. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3442381.3450022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

LADYCHENKO, Viktor. "INFORMATION POLICY IN THE ENVIRONMENTAL SPHERE IN THE CONTEXT OF SUSTAINABLE DEVELOPMENT OF UKRAINE AND THE EU." In RURAL DEVELOPMENT. Aleksandras Stulginskis University, 2018. http://dx.doi.org/10.15544/rd.2017.218.

Full text
Abstract:
The purpose of this research is to develop a legal mechanism for ensuring the right to access environmental information to ensure sustainable development of society. In the context of our study we developed an understanding of information human rights - the right to collect, disseminate, use and preserve environmental information is fundamental and natural. We understand information human rights as a group of rights with a center around freedom of information, the right to environmental information, the right to communication in environmental sphere, the right to access to environmental information that is public or socially significant, the right to privacy, and the protection of personal data. In the EU, access to environmental information is regulated by Directive 2003/4/EC (Aarhus Convention, 1998). Citizens of the EU have the right to receive this information within one month from the moment they ask and not to mention why they need it. In addition, public authorities are required to actively disseminate information on environmental information at their disposal. In Ukraine defined system of a jurisdiction whose collection includes different types of environmental information and formation of information on environmental policy. But the issue of public administration in the field of environmental protection is currently split between different executive bodies; there is no united information policy and the body responsible for it. There is no obligation for the authorities to inform the population even in crisis situations. This study will form the legal framework to ensure the right of access to environmental information in Ukraine by introducing the position of Information Commissioner - an official, the competence of which includes monitoring of compliance of information law with information policy in the environmental field.
APA, Harvard, Vancouver, ISO, and other styles
7

Iizuka, M., and Y. Bourbon-Galvez. "Compliance with the private standards and capacity building of national institutions under globalization: new agendas for developing countries." In 2009 Atlanta Conference on Science and Innovation Policy. IEEE, 2009. http://dx.doi.org/10.1109/acsip.2009.5367833.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kaufmane, Dace. "Community cooperation for tourism development." In 21st International Scientific Conference "Economic Science for Rural Development 2020". Latvia University of Life Sciences and Technologies. Faculty of Economics and Social Development, 2020. http://dx.doi.org/10.22616/esrd.2020.54.018.

Full text
Abstract:
Cooperation and research on related issues in the tourism sector is still topical as virtually no new tourism offer is possible without cooperation. This has been confirmed by previous studies. However, in the context of community initiatives, cooperation in tourism has not been analysed very much. The aim of the paper is to analyse community cooperation in rural tourism development on the basis of content analysis of the LEADER projects and previous studies on collaboration. Cooperation is based on the understanding and exchange of information facilitated by existing and new forms of common actions between public and private actors. The results reveal that community cooperation for the development of rural tourism in Latvia can be seen as structural with the Rural Support Service as a central actor, which is responsible for the uniform implementation of the state’s and European Union’s support policy in Latvia, monitors compliance with agricultural legislation and regulates the conditions of all involved. At regional level, cooperation is coordinated by rural partnerships and governed by their strategies that sets clear objectives for local action in communities.
APA, Harvard, Vancouver, ISO, and other styles
9

G. Domingo, Winston, Erwin N. Lardizabal, and Sheena Marie V. Toledo. "K12 Senior High School Students Academic Performance Monitoring System for Private Institutions with Decision Support System." In 7th International Conference on Natural Language Computing (NATL 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.112011.

Full text
Abstract:
The K to 12 Basic Education program uses standards and a competency-based grading system. These are found in the curriculum guides. All grades will be based on the weighted raw score of the learners’ summative assessments. Senior High School Students have been graded on three categories the written work, performance tasks, and quarterly assessments. Technology plays a substantial role in helping teachers in the progress, communication, application, and grading of assessment tasks. Thus, this study aims to produce a feasible computerized grading system that will address these issues and problems encountered by the teachers in recording and monitoring grades. The developed K12 Senior High School Students Academic Performance Monitoring System for Private Institutions with Decision Support System was compliant with ISO 25010 quality standards as assessed by SHS Principal, SHS Faculty/ Teachers, and IT Experts. The developed system followed the policy and guidelines set by the department of education in the grading system. The decision support system of the developed system helped the senior high school principal and teachers in monitoring the grades and performance of the students in every subject. Monitoring the performance of the students academically and non-academically, and classifying the students who have at risk in their academic performance.
APA, Harvard, Vancouver, ISO, and other styles
10

Mamley Osae, Erika, John Victor Mensah, David Wellington Essaw, and Rufai Kilu. "A functional support system in a bustling 24/7 economy: Perspectives on slum dwellers in Ashaiman, Ghana." In 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022). AHFE International, 2022. http://dx.doi.org/10.54941/ahfe1002156.

Full text
Abstract:
Slums are often associated with negativities in society including social vices, thievery and arm robbery due to the unsightly nature of the settlements, characterized with filth and insanitary conditions. However, slums provide accommodation for rural-urban migrants who are unable to afford the high cost of rent due to several factors including poor housing policy by government, high rental cost, financial difficulties, unemployment and poverty. This study aims at ascertaining the functional activities and survival strategies of slum dwellers in Ashaiman Municipality in Ghana. Ashaiman is a sprawling urban settlement, parts of which exhibit characteristics of a slum. It is a home to people from many ethnic groups within and outside Ghana who are all there to eke out a living. It also provides space for well organised and recognised professional, trade, ethnic, welfare and youth associations with formal structures and support systems to ensure good governance, compliance and reward systems. This study deployed a mixed method approach to collect quantitative and qualitative data from 490 respondents and 13 key informants in two slum communities; namely; Manmomo and Tulaku within Ashaiman Municipality. Interview schedule, interview guides and focus group discussion guides were used to collect data. Appropriate techniques were used to process and analyse the data. The results showed that the slum dwellers presented varied economic potentials as they contributed to the bustling 24/7 economy. The local economy was characterised by small and micro-scale activities in the informal sector. The municipal authority generated revenue through taxation in whatever form while the slum dwellers provided a strong voting block for politicians. However, the slums also provided the opacity needed for illegal activities. The slum residents operated in an under-served location with deficits in security, infrastructure, health and environmental sanitation. The survival strategies included social safety in terms of perception of historical and traditional ties, social acceptability, social network, security and business opportunities. The diverse characteristics, capacities, tenacity arising from survival experiences, adaptability, social capital, political clout in numbers, and youthful population contribute to make the slum communities in Ashaiman a place of survival. The main argument of the study is that slum dwellers demonstrate resourcefulness, thereby debunking their association with low levels of access to productive sources. It is therefore, recommended that the central government, local government, technocrats, the private sector and civil society groups should collaborate to enhance the potentials of the slum dwellers for local level development.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Privacy policy compliance"

1

Kagal, Lalana. Policy Compliance of Queries for Private Information Retrieval. Fort Belvoir, VA: Defense Technical Information Center, November 2010. http://dx.doi.org/10.21236/ada533742.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Barlow, Jos, Liana Anderson, Erika Berenguer, Pedro Brancalion, Nathalia Carvalho, Joice Ferreira, Rachael Garrett, et al. Policy Brief: Transforming the Amazon through ‘Arcs of Restoration’. Sustainable Development Solutions Network (SDSN), November 2022. http://dx.doi.org/10.55161/kjcs2175.

Full text
Abstract:
There is an urgent need for large-scale restoration across the Amazon, which has suffered decades of deteriorating ecological conditions and is fragile in the face of climate change. Restoration at scale can be achieved through seven complementary targets: (a) Achieve zero deforestation by 2030; (b) Avoiding forest degradation; (c) Restoring forests in protected areas; (d) Restoring forests in undesignated lands; (e) Restoring areas that have been cleared above the legal allowance on private lands; (f) Restoring forest cover beyond legal compliance; and (g) Sustainable restoration of degraded farmland.
APA, Harvard, Vancouver, ISO, and other styles
3

Financial Stability Report - Second Semester of 2021. Banco de la República, September 2022. http://dx.doi.org/10.32468/rept-estab-fin.sem2.eng-2021.

Full text
Abstract:
Banco de la República’s main objective is to preserve the purchasing power of the currency in coordination with the general economic policy that is intended to stabilize output and employment at long-term sustainable levels. Properly meeting the goal assigned to the Bank by the 1991 Constitution critically depends on preserving financial stability. This is understood to be a general condition in which the financial system assesses and manages the financial risks in a way that facilitates the economy’s performance and efficient allocation of resources while, at the same time, it is able to, on its own, absorb, dissipate, and mitigate the shocks that may arise as a result of adverse events. This Financial Stability Report meets the goal of giving Banco de la República’s diagnosis of the financial system’s and its debtors’ recent performance as well as of the main risks and vulnerabilities that could affect the stability of the Colombian economy. In this way, participants in financial markets and the public are being informed, and public debate on trends and risks affecting the system is being encouraged. The results presented here also serve the monetary authority as a basis for making decisions that will enhance financial stability in the general context of its objectives. In recent months, several positive aspects of the financial system have preserved a remarkable degree of continuity and stability: the liquidity and capital adequacy of financial institutions have remained well above the regulatory minimums at both the individual and consolidated levels, the coverage of past-due loans by loan-loss provisions remains high, and the financial markets for public and private debt and stocks have continued to function normally. At the same time, a surge in all the types of loan portfolios, a sharp downturn in the non-performing loan portfolio, and a rise in the profitability of credit institutions can be seen for the first time since the beginning of the pandemic. In line with the general recovery of the economy, the main vulnerability to the stability of the Colombian financial system identified in the previous edition—uncertainty about changes in the non-performing loans portfolio—has receded and remains on a downward trend. In this edition, the main source of vulnerability identified for financial stability in the short term is the system’s exposure to sudden changes in international financial conditions; the results presented in this Report indicate that the system is sufficiently resilient to such scenarios. In compliance with its constitutional objectives and in coordination with the financial system’s security network, Banco de la República will continue to closely monitor the outlook for financial stability at this juncture and will make the decisions necessary to ensure the proper functioning of the economy, facilitate the flow of sufficient credit and liquidity resources, and further the smooth functioning of the payment system. Leonardo Villar Gomez Governor Box 1 -Decomposition of the Net Interest Margin in Colombia and Chile Wilmar Cabrera Daniela Rodríguez-Novoa Box 2 - Spatial Analysis of New Home Prices in Bogota, Medellín, and Cali Using a Geostatistical Approach María Fernanda Meneses Camilo Eduardo Sánchez Box 3 - Interest Rate Model for the SYSMO Stress Test Exercise Wilmar Cabrera Diego Cuesta Santiago Gamba Camilo Gómez Box 4 - The Transition from LIBOR and other International Benchmark Rates Daniela X. Gualtero Briceño Javier E. Pirateque Niño
APA, Harvard, Vancouver, ISO, and other styles
4

Financial Stability Report - Second Semester of 2020. Banco de la República de Colombia, March 2021. http://dx.doi.org/10.32468/rept-estab-fin.sem2.eng-2020.

Full text
Abstract:
The Colombian financial system has not suffered major structural disruptions during these months of deep economic contraction and has continued to carry out its basic functions as usual, thus facilitating the economy's response to extreme conditions. This is the result of the soundness of financial institutions at the beginning of the crisis, which was reflected in high liquidity and capital adequacy indicators as well as in the timely response of various authorities. Banco de la República lowered its policy interest rates 250 points to 1.75%, the lowest level since the creation of the new independent bank in 1991, and provided ample temporary and permanent liquidity in both pesos and foreign currency. The Office of the Financial Superintendent of Colombia, in turn, adopted prudential measures to facilitate changes in the conditions for loans in effect and temporary rules for rating and loan-loss provisions. Finally, the national government expanded the transfers as well as the guaranteed credit programs for the economy. The supply of real credit (i.e. discounting inflation) in the economy is 4% higher today than it was 12 months ago with especially marked growth in the housing (5.6%) and commercial (4.7%) loan portfolios (2.3% in consumer and -0.1% in microloans), but there have been significant changes over time. During the first few months of the quarantine, firms increased their demands for liquidity sharply while consumers reduced theirs. Since then, the growth of credit to firms has tended to slow down, while consumer and housing credit has grown. The financial system has responded satisfactorily to the changes in the respective demands of each group or sector and loans may grow at high rates in 2021 if GDP grows at rates close to 4.6% as the technical staff at the Bank expects; but the forecasts are highly uncertain. After the strict quarantine implemented by authorities in Colombia, the turmoil seen in March and early April, which was evident in the sudden reddening of macroeconomic variables on the risk heatmap in Graph A,[1] and the drop in crude oil and coal prices (note the high volatility registered in market risk for the region on Graph A) the local financial markets stabilized relatively quickly. Banco de la República’s credible and sustained policy response played a decisive role in this stabilization in terms of liquidity provision through a sharp expansion of repo operations (and changes in amounts, terms, counterparties, and eligible instruments), the purchases of public and private debt, and the reduction in bank reserve requirements. In this respect, there is now abundant aggregate liquidity and significant improvements in the liquidity position of investment funds. In this context, the main vulnerability factor for financial stability in the short term is still the high degree of uncertainty surrounding loan quality. First, the future trajectory of the number of people infected and deceased by the virus and the possible need for additional health measures is uncertain. For that reason, there is also uncertainty about the path for economic recovery in the short and medium term. Second, the degree to which the current shock will be reflected in loan quality once the risk materializes in banks’ financial statements is uncertain. For the time being, the credit risk heatmap (Graph B) indicates that non-performing and risky loans have not shown major deterioration, but past experience indicates that periods of sharp economic slowdown eventually tend to coincide with rises in non-performing loans: the calculations included in this report suggest that the impact of the recession on credit quality could be significant in the short term. This is particularly worrying since the profitability of credit establishments has been declining in recent months, and this could affect their ability to provide credit to the real sector of the economy. In order to adopt a forward-looking approach to this vulnerability, this Report presents several stress tests that evaluate the resilience of the liquidity and capital adequacy of credit institutions and investment funds in the event of a hypothetical scenario that seeks to simulate an extreme version of current macroeconomic conditions. The results suggest that even though there could be strong impacts on the credit institutions’ volume of credit and profitability under such scenarios, aggregate indicators of total and core capital adequacy will probably remain at levels that are above the regulatory limits over the horizon of a year. At the same time, the exercises highlight the high capacity of the system's liquidity to face adverse scenarios. In compliance with its constitutional objectives and in coordination with the financial system's security network, Banco de la República will continue to closely monitor the outlook for financial stability at this juncture and will make the decisions that are necessary to ensure the proper functioning of the economy, facilitate the flow of sufficient credit and liquidity resources, and further the smooth operation of the payment systems. Juan José Echavarría Governor
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography