Academic literature on the topic 'Zimbabwe Data Protection Act'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Zimbabwe Data Protection Act.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Zimbabwe Data Protection Act"
Musiwa, Anthony Shuko. "How Has the Presence of Zimbabwe’s Victim-Friendly Court and Relevant Child Protection Policy and Legal Frameworks Affected the Management of Intrafamilial Child Sexual Abuse in Zimbabwe? The Case of Marondera District." Journal of Interpersonal Violence 33, no. 11 (May 8, 2018): 1748–77. http://dx.doi.org/10.1177/0886260517752154.
Full textGossman, P., and J. R. Wilkinson. "Data Protection Act." BMJ 295, no. 6610 (November 28, 1987): 1418. http://dx.doi.org/10.1136/bmj.295.6610.1418.
Full textPriest, R. G. "Data Protection Act." Psychiatric Bulletin 12, no. 5 (May 1, 1988): 204. http://dx.doi.org/10.1192/pb.12.5.204.
Full textPriest, R. G. "Data Protection Act." Bulletin of the Royal College of Psychiatrists 12, no. 5 (May 1988): 204. http://dx.doi.org/10.1192/s0140078900020162.
Full textLorains, John W. "Data Protection Act 1987." Practical Diabetes International 6, no. 3 (May 1989): 140. http://dx.doi.org/10.1002/pdi.1960060316.
Full textGripper, J. "Data Protection Act 1984." Veterinary Record 117, no. 23 (December 7, 1985): 615. http://dx.doi.org/10.1136/vr.117.23.615.
Full textRaymont, Patrick. "The Data Protection Act." Physics Bulletin 37, no. 4 (April 1986): 161–63. http://dx.doi.org/10.1088/0031-9112/37/4/026.
Full textChitimira, Howard. "An Analysis of Socio-Economic and Cultural Rights Protection under the Zimbabwe Constitution of 2013." Journal of African Law 61, no. 2 (April 11, 2017): 171–96. http://dx.doi.org/10.1017/s0021855317000109.
Full textKong, L. "Enacting China's Data Protection Act." International Journal of Law and Information Technology 18, no. 3 (March 5, 2010): 197–226. http://dx.doi.org/10.1093/ijlit/eaq003.
Full textPhair, Lynne, and Julie Lee Winsor. "The new data protection act." Nursing Older People 12, no. 6 (September 1, 2000): 32–33. http://dx.doi.org/10.7748/nop.12.6.32.s16.
Full textDissertations / Theses on the topic "Zimbabwe Data Protection Act"
Cheng, Sin Ying. "Health Insurance Portability and Accountability Act (HIPAA)-compliant privacy access control model for Web services /." View abstract or full-text, 2006. http://library.ust.hk/cgi/db/thesis.pl?COMP%202006%20CHENGS.
Full textCoulibaly, Ibrahim. "La protection des données à caractère personnel dans le domaine de la recherche scientifique." Phd thesis, Université de Grenoble, 2011. http://tel.archives-ouvertes.fr/tel-00798112.
Full textČernohorský, Jan. "Řízení provozu IT v modelu MBI se zaměřením na prostředí středních škol." Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-193928.
Full textWells, William Ward. "Information security program development." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2585.
Full textMaguraushe, Kudakwashe. "Development of a diagnostic instrument and privacy model for student personal information privacy perceptions at a Zimbabwean university." Thesis, 2021. http://hdl.handle.net/10500/27557.
Full textSchool of Computing
Ph. D. (Information Systems)
CHEN, CHIEN-YUN, and 陳倩韻. "The Theory and Practice of Data Protection after the Amendment of the New Data Protection Act." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/97560954807508456263.
Full textMiau-chih, Chou, and 周妙枝. "A Study on Punishment in Personal Data Protection Act." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/96157410474783054489.
Full text東吳大學
法律學系
102
"Personal Data Protection Act," revised from "Computer Processing of Personal Data Protection Act," amended and promulgated on May 26, 2010, was announced October 1, 2012. Its focus on amending the law on criminal responsibility, the main object is to extend the penalty-profit and non-violation of norms intent crime, and violations of intent for profit, increase criminal liability to five years imprisonment, and a NT $ 1 million fines will also intent on profit and public agencies committed the crime of obstruction of a lawsuit to recover assets correctness requirements to non-telling is on. The new law provides for a penalty of about funding, in addition to the violation of the criminal law seems clear Elements of the basic requirements, there is also the main crime problem is unknown and in criminal and non-exploitative degree of blame were treated in other countries. With regard to those points, in this paper asserts: (a) to avoiding implicated too broad, should be deleted non-exploitative criminal violation of Personal Data Protection this Act, instead of torts damages or administrative penalties; (b) to avoid to conflict with The Freedom of Government Information Law and contrary to the original intention of the legislation, public schools, public hospitals, social education institutions and other non-exercise of public authority of local or central authorities should be included in the scope of official authority specification; (c) for the avoidance of too general to expand the definition of personal data, should be added "can recognize the individual's data" after the exemplified regulations, and too difficult to distinguish the sensitivity of personal information, can be used the "health" instead of "medical", "health" and "health check"; (d) the statistical or scholarly study of the individual to whom the information collection, processing, use, or outside Objective , should have a higher public nature, and should then set certain provisions in the program party terribly.
Liang, Yi-Fang, and 梁憶芳. "A Personal Data Risk Management System Based on Personal Data Protection Act." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/8ttrz8.
Full text國立中興大學
資訊科學與工程學系
103
In order to catch up with international trends on regulating privacy protection, Taiwan government revised the Personal Information Protection Act in 2010. Since then, the national universities and colleges started actively to implement the Personal Information Management System (PIMS) for complying with the law. In the universities of Taiwan, most of the personal information records are stored in the information systems that are developed and maintained by the computer centers. Therefore, the computer centers are usually assigned to take charge of developing the Personal Information Management System. Even though, the computer centers have the experience on deploying the Information Security Management System (ISMS), they still face the challenges on developing a good PIMS due to lack of life cycle management of personal information in ISMS. In this thesis, based on the lessons learned from developing PIMS systems by National Chung Hsing University and Feng Chia University, we design and develop a personal data risk management system based on Personal Data Protection Act by adding version control and risk management modules to the PIMS system. The developed PIMS has been installed in Chung Shan Medical University, and it can be used as a demo site for the PIMS system.
Nai-Kang, Huang, and 黃迺康. "A Study of Management Mechanism for Enterprise Privacy Protection Based on Personal Data Protection Act." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/97067221936394110771.
Full text國立中正大學
會計與資訊科技研究所
99
The Legislative Yuan passed the Personal Data Protection Act on April 27th, 2010, and it let the personal data protection issues call the public's attention. In the future organization, regardless of their size or the amount of personal data, will be subject to the Personal Data Protection Act. It affect the data collection and processing way and the marketing practices, and it also increase criminal penalties and compensation that is up to $200 million when the enterprise is against the law. Therefore, the enterprise should engage in planning and implement information security protection of personal data at this stage in quickly. ISO 27001 is an international standard of information security management system. But this is not representative for the integrity of personal data protection in the enterprise when they follow ISO 27001. The enterprise’s information security is focus on the confidential information and less to the customer's personal data. As a result, it make inadequate on personal data protection and enhance the possibility of conflict with the law. In this situation, the enterprise must adjust and build the appropriate security structure to control personal data processes to meet compliance requirements. So they require a complete set of standards to follow to ensure the enterprise adjust properly, comply with regulations, and fulfill the obligation of protecting personal data. This study applies the Gowin's Vee research strategy. In the conceptual side, we sorted out 4 control domains, 15 control objectives, and 75 control measures which develop the Enterprise Privacy Protection Management Mechanism by literature review about Personal Information Management System and Personal Data Protection Act. Then we apply the Delphi Expert Questionnaires to fix this mechanism and add a new control measure. In the methodological side, we use the case study to verify and assessment the practicality and availability of this mechanism. This research shows that the research outcome, the Enterprise Privacy Protection Management Mechanism, provides organizations a reference and compliance purpose to help them obey the law, reduce the risk of litigation, and fulfill the responsibilities of protect personal data.
WEI-CHU, LUO, and 羅偉助. "A study of the information free act and the protection of personal data act in Japan." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/91241137043285248940.
Full textBooks on the topic "Zimbabwe Data Protection Act"
Evans, Alistair. The data protection act. [s.l.]: Institue of Supervisory Management, 1985.
Find full textHely, Michael H. M. Data Protection Act 1984. [Abingdon]: [TaskComputer Services], 1985.
Find full textOppenheim, Charles. The Data Protection Act 1988. [Loughborough]: SCONUL, 2000.
Find full textCongress, Trades Union. Data Protection Act: TUC briefing. London: Trades Union Congress, 2000.
Find full textHolton, Andrew. The Data Protection Act 1998. London: ABG Professional Information, 2000.
Find full textMcNally & co. [from old catalog] Rand. The 1988 Data Protection Act. 2nd ed. London: Stationery Office, 2000.
Find full textRegistrar, Data protection. The Data Protection Act 1984. Springfiled House: Wilmslow, 1985.
Find full textMcNally & co. [from old catalog] Rand. The 1998 Data Protection Act. London: Stationery Office, 1999.
Find full textOffice, Home. Protecting personal data: The Data Protection Act 1984. London: Home Office, 1985.
Find full textVeale, Sarah. Data Protection Act 1998: TUC briefing. London: Trades Union Congress, 1998.
Find full textBook chapters on the topic "Zimbabwe Data Protection Act"
Ncube, Caroline B. "Data Protection in Zimbabwe." In African Data Privacy Laws, 99–116. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47317-8_5.
Full textNahler, Gerhard. "data protection act." In Dictionary of Pharmaceutical Medicine, 47. Vienna: Springer Vienna, 2009. http://dx.doi.org/10.1007/978-3-211-89836-9_351.
Full textManton, Kevin. "The 1984 Data Protection Act." In Population Registers and Privacy in Britain, 1936—1984, 193–216. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02753-7_9.
Full textJeffree, Pauline. "The Data Protection Act 1984." In The Practice Nurse, 6–8. Boston, MA: Springer US, 1994. http://dx.doi.org/10.1007/978-1-4899-6874-6_2.
Full textCieh, Edwin Lee Yong. "Personal Data Protection Act 2010: An Overview Analysis." In Beyond Data Protection, 31–64. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33081-0_3.
Full textZarsky, Tal Z. "The Data Mining Balancing Act." In European Data Protection: In Good Health?, 79–101. Dordrecht: Springer Netherlands, 2012. http://dx.doi.org/10.1007/978-94-007-2903-2_5.
Full textCieh, Edwin Lee Yong. "Limitations of the Personal Data Protection Act 2010 and Personal Data Protection in Selected Sectors." In Beyond Data Protection, 65–98. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33081-0_4.
Full textRajadorai, Kesava Pillai, Vazeerudeen Abdul Hameed, and Selvakumar Samuel. "Data Protection and Data Privacy Act for BIG DATA Governance." In Services and Business Process Reengineering, 189–211. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1007-3_11.
Full textKohnstamm, Jacob. "Getting Our Act Together: European Data Protection Authorities Face Up to Silicon Valley." In Law, Governance and Technology Series, 455–72. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-25047-2_19.
Full textAlunge, Rogers. "Consolidating the Right to Data Protection in the Information Age: A Comparative Appraisal of the Adoption of the OECD (Revised) Guidelines into the EU GDPR, the Ghanaian Data Protection Act 2012 and the Kenyan Data Protection Act 2019." In Innovations and Interdisciplinary Solutions for Underserved Areas, 192–207. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51051-0_14.
Full textConference papers on the topic "Zimbabwe Data Protection Act"
Room, S., and R. Cohen. "The requirements of the Data Protection Act 1998." In IET Conference on Crime and Security. IEE, 2006. http://dx.doi.org/10.1049/ic:20060318.
Full textBaskaran, Hasventhran, Salman Yussof, Fiza Abdul Rahim, and Asmidar Abu Bakar. "Blockchain and the Personal Data Protection Act 2010 (PDPA) in Malaysia." In 2020 8th International Conference on Information Technology and Multimedia (ICIMU). IEEE, 2020. http://dx.doi.org/10.1109/icimu49871.2020.9243493.
Full textSrinivasan, S. "Privacy Protection and Data Breaches." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2261.
Full textApriyanti, Ira. "The Urgency of Establishing Personal Data Protection Act and Financial Technology Act in Digital Era in order to Protect and Control the Privacy in Indonesia." In 3rd International Conference on Law and Governance (ICLAVE 2019). Paris, France: Atlantis Press, 2020. http://dx.doi.org/10.2991/aebmr.k.200321.045.
Full textAmini, Elham, Ruslan Muydinov, Bernd Szyszka, and Christian Boit. "Backside Protection Structure for Security Sensitive ICs." In ISTFA 2017. ASM International, 2017. http://dx.doi.org/10.31399/asm.cp.istfa2017p0279.
Full textPanteleeva, Vanya. "Transposition of Directive (EU) 2016/680 of the European Parliament and of the Council of 27 April 2016 in Personal Data Protection Act in Republic of Bulgaria." In The 7th International Scientific Conference of the Faculty of Law of the University of Latvia. University of Latvia, 2020. http://dx.doi.org/10.22364/iscflul.7.2.17.
Full textKelmere, Laila. "Protection of employees in insolvency proceedings." In 21st International Scientific Conference "Economic Science for Rural Development 2020". Latvia University of Life Sciences and Technologies. Faculty of Economics and Social Development, 2020. http://dx.doi.org/10.22616/esrd.2020.53.010.
Full textMitrović, Ljubinko, and Predrag Raosavljević. "HUMAN RIGHTS OMBUDSMEN IN THE PANDEMIC: CHALLENGES IN PROTECTION OF VULNERABLE GROUPS." In EU 2021 – The future of the EU in and after the pandemic. Faculty of Law, Josip Juraj Strossmayer University of Osijek, 2021. http://dx.doi.org/10.25234/eclic/18353.
Full textOlsen, Daniel B., and Bryan D. Willson. "The Effect of Parametric Variations on Formaldehyde Emissions From a Large Bore Natural Gas Engine." In ASME 2002 Internal Combustion Engine Division Spring Technical Conference. ASMEDC, 2002. http://dx.doi.org/10.1115/ices2002-446.
Full textAraujo, Paulo, José Carlos Teixeira, Dionisio Silveira, Elisabete Silva, Delfim Soares, Raul Fangueiro, and Maria Cândida Vilarinho. "Development of Fiber Structures for High Performance Heat Resistant Curtains." In ASME 2020 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/imece2020-24016.
Full textReports on the topic "Zimbabwe Data Protection Act"
Arends, J., and William F. Sandusky. American Recovery and Reinvestment Act Federal Energy Management Program Technical Assistance Project 184 U.S. Customs and Border Protection Data Center, Springfield, Virginia. Office of Scientific and Technical Information (OSTI), September 2010. http://dx.doi.org/10.2172/1000147.
Full textKennedy, Alan, David Moore, and Taylor Rycroft. Field survey to prioritize needs for modernizing dredged material evaluation guidance. Engineer Research and Development Center (U.S.), May 2021. http://dx.doi.org/10.21079/11681/40701.
Full textBedford, Philip, Alexis Long, Thomas Long, Erin Milliken, Lauren Thomas, and Alexis Yelvington. Legal Mechanisms for Mitigating Flood Impacts in Texas Coastal Communities. Edited by Gabriel Eckstein. Texas A&M University School of Law Program in Natural Resources Systems, May 2019. http://dx.doi.org/10.37419/eenrs.mitigatingfloodimpactstx.
Full text