To see the other types of publications on this topic, follow the link: Zimbabwe Data Protection Act.

Journal articles on the topic 'Zimbabwe Data Protection Act'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Zimbabwe Data Protection Act.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Musiwa, Anthony Shuko. "How Has the Presence of Zimbabwe’s Victim-Friendly Court and Relevant Child Protection Policy and Legal Frameworks Affected the Management of Intrafamilial Child Sexual Abuse in Zimbabwe? The Case of Marondera District." Journal of Interpersonal Violence 33, no. 11 (May 8, 2018): 1748–77. http://dx.doi.org/10.1177/0886260517752154.

Full text
Abstract:
The study intended to assess, based on the perceptions of Victim-Friendly Court (VFC) professionals in Marondera District in Zimbabwe, how the presence of the VFC and relevant child protection policy and legal frameworks has affected the management of Intrafamilial Child Sexual Abuse (ICSA) in Zimbabwe. Sem-istructured questionnaires were administered to 25 professionals from 13 VFC agencies in Marondera, while one-on-one semi-structured interviews were conducted with 15 key informants who included five ICSA survivors and their respective five caregivers as well as five key community child protection committee members. All 40 participants were selected using purposive sampling. Data were analyzed manually using thematic analysis, descriptive analysis, and document analysis. The study showed that the VFC manages ICSA through prevention, protection, treatment, and support interventions, and that its mandate is guided by key child protection policy and legal frameworks, particularly the National Action Plan for Orphaned and Vulnerable Children and the Children’s Act (Chapter 5:06). The presence of these mechanisms is perceived to have resulted in increased awareness of ICSA, realization of effective results, increased reporting of ICSA, and enhanced coordination among VFC agencies. However, the same frameworks are perceived to be fraught with gaps and inconsistencies, too prescriptive, incoherent with some key aspects of the National Constitution and international child rights standards, and poorly resourced for effective implementation. All this has negatively affected the management of ICSA. Therefore, the Government of Zimbabwe should consistently review these systems to make them responsive to the ever-evolving factors associated with ICSA. Also, alignment with the National Constitution, full domestication of global child rights instruments, and routine collection of better statistics for evidence-based policy- and decision-making, and for better monitoring of progress and evaluation of outcomes, are necessary for positive results. Non-governmental stakeholders too should chip in with human, technical, and financial resources to enhance effective management of the social problem.
APA, Harvard, Vancouver, ISO, and other styles
2

Gossman, P., and J. R. Wilkinson. "Data Protection Act." BMJ 295, no. 6610 (November 28, 1987): 1418. http://dx.doi.org/10.1136/bmj.295.6610.1418.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Priest, R. G. "Data Protection Act." Psychiatric Bulletin 12, no. 5 (May 1, 1988): 204. http://dx.doi.org/10.1192/pb.12.5.204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Priest, R. G. "Data Protection Act." Bulletin of the Royal College of Psychiatrists 12, no. 5 (May 1988): 204. http://dx.doi.org/10.1192/s0140078900020162.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lorains, John W. "Data Protection Act 1987." Practical Diabetes International 6, no. 3 (May 1989): 140. http://dx.doi.org/10.1002/pdi.1960060316.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gripper, J. "Data Protection Act 1984." Veterinary Record 117, no. 23 (December 7, 1985): 615. http://dx.doi.org/10.1136/vr.117.23.615.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Raymont, Patrick. "The Data Protection Act." Physics Bulletin 37, no. 4 (April 1986): 161–63. http://dx.doi.org/10.1088/0031-9112/37/4/026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chitimira, Howard. "An Analysis of Socio-Economic and Cultural Rights Protection under the Zimbabwe Constitution of 2013." Journal of African Law 61, no. 2 (April 11, 2017): 171–96. http://dx.doi.org/10.1017/s0021855317000109.

Full text
Abstract:
AbstractThis article discusses certain provisions of the Zimbabwe Constitution Amendment Act 20 of 2013 that deal with the protection of socio-economic and cultural rights in Zimbabwe. The purpose of the article is to investigate the adequacy, flaws, challenges and prospects of these provisions in relation to the protection and affording of basic socio-economic and cultural rights to all citizens of Zimbabwe.
APA, Harvard, Vancouver, ISO, and other styles
9

Kong, L. "Enacting China's Data Protection Act." International Journal of Law and Information Technology 18, no. 3 (March 5, 2010): 197–226. http://dx.doi.org/10.1093/ijlit/eaq003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Phair, Lynne, and Julie Lee Winsor. "The new data protection act." Nursing Older People 12, no. 6 (September 1, 2000): 32–33. http://dx.doi.org/10.7748/nop.12.6.32.s16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Moulton, Simon. "The Data Protection Act 1984." Aslib Proceedings 41, no. 4 (April 1989): 145–47. http://dx.doi.org/10.1108/eb051133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Mavhura, Emmanuel. "Disaster legislation: a critical review of the Civil Protection Act of Zimbabwe." Natural Hazards 80, no. 1 (September 30, 2015): 605–21. http://dx.doi.org/10.1007/s11069-015-1986-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Moulton, S. "The UK Data Protection Act 1984." Journal of Studies in International Education 15, no. 1 (January 1, 1989): 55–56. http://dx.doi.org/10.1177/102831538901500109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

WILLS, CHRIS. "Confidentiality and the Data Protection Act*." Health Libraries Review 2, no. 4 (December 1985): 188–90. http://dx.doi.org/10.1046/j.1365-2532.1985.240188.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Howe, Eric. "The United Kingdom's data protection act." Government Information Quarterly 8, no. 4 (1991): 345–57. http://dx.doi.org/10.1016/0740-624x(91)90002-p.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Dyer, C. "Data Protection Act and medical records." BMJ 291, no. 6502 (October 19, 1985): 1070–71. http://dx.doi.org/10.1136/bmj.291.6502.1070.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Davies, J. R. "Data Protection Act and medical records." BMJ 291, no. 6507 (November 23, 1985): 1507. http://dx.doi.org/10.1136/bmj.291.6507.1507-b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Moulton, Simon. "The UK Data Protection Act 1984." Journal of Information Science 15, no. 1 (February 1989): 55–56. http://dx.doi.org/10.1177/016555158901500109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Lloyd, Ian. "Reform of the data protection act." Computer Law & Security Review 5, no. 5 (January 1990): 18. http://dx.doi.org/10.1016/0267-3649(90)90035-a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Silman, Alan J., and Gary J. Macfarlane. "Effects of changes to Data Protection Act." Lancet 357, no. 9266 (May 2001): 1452. http://dx.doi.org/10.1016/s0140-6736(00)04612-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Elliott, Simon T. "Ultrasound Images and the Data Protection Act." BMUS Bulletin 10, no. 4 (November 2002): 30. http://dx.doi.org/10.1177/1742271x0201000409.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Iversen, Amy, Kathleen Liddell, Nicola Fear, Matthew Hotopf, and Simon Wessely. "Consent, confidentiality, and the Data Protection Act." BMJ 332, no. 7534 (January 19, 2006): 165–69. http://dx.doi.org/10.1136/bmj.332.7534.165.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Ford, M. "Recent legislation. The Data Protection Act 1998." Industrial Law Journal 28, no. 1 (March 1, 1999): 57–60. http://dx.doi.org/10.1093/ilj/28.1.57.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Traca, J. L., and B. Embry. "The Angolan Data Protection Act: first impressions." International Data Privacy Law 2, no. 1 (November 14, 2011): 40–45. http://dx.doi.org/10.1093/idpl/ipr024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Richardson, Barbara. "An explanation of the Data Protection Act." Nursing and Residential Care 5, no. 2 (February 2003): 87–89. http://dx.doi.org/10.12968/nrec.2003.5.2.11039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Smith, M. F. "The New Data Protection Act and Healthcare." Health Informatics Journal 6, no. 2 (June 2000): 59–60. http://dx.doi.org/10.1177/146045820000600201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Evans, Michael. "Who's afraid of the Data Protection Act? Is the Data Protection Act 1998 a problem for journal publishers?" Learned Publishing 14, no. 4 (October 2001): 291–95. http://dx.doi.org/10.1087/095315101753141392.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Ellis, Sarah. "Data protection and the media." Library and Information Research 18, no. 60 (October 26, 2013): 33–34. http://dx.doi.org/10.29173/lirg436.

Full text
Abstract:
The idea for this research grew out of an interest in the attempts to balance the conflicting concerns of individual privacy and freedom of expression and the rights of the individual vis a vis those of economic and political needs. British law recognizes no statutory right to privacy and the Data Protection Act 1984 was the first Act to address this right, albeit in the limited area of the automatic processing of personal data.
APA, Harvard, Vancouver, ISO, and other styles
29

Bainbridge, David, and Graham Pearce. "The UK data protection act 1998 — Data subjects' rights." Computer Law & Security Review 14, no. 6 (November 1998): 401–6. http://dx.doi.org/10.1016/s0267-3649(98)80057-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Saxby, Stephen. "Data protection act 1984: Security and accuracy of data." Computer Law & Security Review 2, no. 2 (July 1986): 14. http://dx.doi.org/10.1016/0267-3649(86)90065-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Coldham, Simon. "STATUTE NOTE." Journal of African Law 45, no. 2 (October 2001): 227–29. http://dx.doi.org/10.1017/s0221855301001729.

Full text
Abstract:
LAND ACQUISITION AMENDMENT ACT, 2000 (ZIMBABWE)Since Zimbabwe became independent in 1980 the issue of land reform and, in particular, the issue of land acquisition and redistribution has seldom been off the political agenda. For the first ten years of independence there were constitutional constraints on the acquisition of land for resettlement purposes, but the National Land Policy of 1990 set out plans for an accelerated programme of resettlement. In order to achieve its ambitious targets the government of Zimbabwe saw the need to strengthen its powers of compulsory acquisition both by amending section 16 of the Constitution (which provided strong protection against the compulsory acquisition of property) and by enacting the Land Acquisition Act to provide a statutory basis for the new policy. These reforms were extremely controversial both inside and outside the country and a clause excluding the right to fair compensation for expropriated land was dropped partly in response to international pressure.
APA, Harvard, Vancouver, ISO, and other styles
32

Bvirindi, Tawanda Ray, and Nigel Mxolisi Landa. "Exploring Policy Issues on the Trafficking of Women in Southern Africa with Reference to Zimbabwe." Africanus: Journal of Development Studies 46, no. 2 (October 26, 2017): 73–87. http://dx.doi.org/10.25159/0304-615x/2662.

Full text
Abstract:
Following the socio-economic and political problems that ensued after the Fast Track Land Reform Programme (FTLRP) in Zimbabwe, instances of human trafficking previously unseen on a large scale have sparked a newfound interest among policy makers and researchers. This article examines the flawed system provided by the Zimbabwean Trafficking in Persons Act No. 4 of 2014 for the protection of victims of human trafficking. It argues that the “Palermo Protocol”—the international instrument against all trafficking in persons is well-equipped to assume greater responsibility in ensuring the protection of victims. Although the Palermo Protocol is a universal protocol; which should be contextualised to suit various scenarios in which trafficking occurs across the globe, it may still be reasonably interpreted as providing the core principles which are vital to the protection of vulnerable populations from trafficking. Over the long haul, a new Zimbabwean Act, re-aligned with the Palermo Protocol, yet flexible, anti-trafficking partnerships between the government, Non-governmental Organisations and Civil Society remain the most viable solutions to addressing this predicament.
APA, Harvard, Vancouver, ISO, and other styles
33

Keakopa, Tumelo, and Olefhile Mosweu. "Data protection in Botswana." ESARBICA Journal: Journal of the Eastern and Southern Africa Regional Branch of the International Council on Archives 39, no. 1 (December 24, 2020): 65–78. http://dx.doi.org/10.4314/esarjo.v39i1.5.

Full text
Abstract:
Data protection legislation is concerned with the safeguarding of privacy rights of individuals in relation to the processing of personal data, regardless of media or format. The Government of Botswana enacted the Data Protection Act in 2018 for purposes of regulating personal data and to ensure the protection of individual privacy as it relates to personal data, and its maintenance. This paper investigates opportunities and challenges for records management, and recommends measures to be put in place in support of data protection, through proper records management practices. The study employed a desktop approach and data was collected using content analysis. The study found that opportunities such as improved retrieval and access to information, improved job opportunities for records management professionals and a conducive legislative framework are available. It also revealed that a lack of resources to drive the records management function, limitations in electronic document and records systems and a lack of freedom of information to regulate access to public information by members of the public is still a challenge. The study recommends the employment of qualified records management staff with capacity to manage records in the networked environment for purposes of designing and implementing records management programmes that can facilitate compliance with the requirements prescribed by the Data Protection Act.
APA, Harvard, Vancouver, ISO, and other styles
34

Park, Yang Dong. "Medical Data Privacy Protection Act should be Reappraised." Journal of the Korean Medical Association 50, no. 3 (2007): 204. http://dx.doi.org/10.5124/jkma.2007.50.3.204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Beranek Zanon, Nicole. "Switzerland: Revision of Federal Data Protection Act (FDPA)." Computer Law Review International 21, no. 4 (August 1, 2020): 125–28. http://dx.doi.org/10.9785/cri-2020-210406.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Boyd, Phil. "Health research and the Data Protection Act 1998." Journal of Health Services Research & Policy 8, no. 1_suppl (July 2003): 24–27. http://dx.doi.org/10.1258/135581903766468846.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Walker, Clive. "Educational institutions and the Data Protection Act 1984." Education and the Law 3, no. 3 (January 1991): 111–18. http://dx.doi.org/10.1080/0953996910030301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Lloyd, Reggie. "The Data Protection Act: employee rights, employer obligations." In Practice 24, no. 5 (May 2002): 288–90. http://dx.doi.org/10.1136/inpract.24.5.288.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Woods, Lorna. "Data Protection: The Directive and the New Act." Utilities Law Review 10, no. 2 (March 1999): 45–46. http://dx.doi.org/10.1002/(sici)1099-1808(199903/04)10:2<45::aid-ulr1123>3.0.co;2-k.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Wright, Kerri. "The implications of the Data Protection Act 1998." Nursing and Residential Care 4, no. 8 (August 2002): 376–78. http://dx.doi.org/10.12968/nrec.2002.4.8.10714.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Richardson, Barbara. "Principles of the Data Protection Act: an evaluation." Nursing and Residential Care 5, no. 3 (March 2003): 138–41. http://dx.doi.org/10.12968/nrec.2003.5.3.11117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Nelka Fikeys Krmić, L. L. M. "The first personal data protection act in Yugoslavia." Computer Law & Security Review 7, no. 2 (July 1991): 66–67. http://dx.doi.org/10.1016/0267-3649(91)90118-f.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Jones, P. J. "Data users must observe all principles of Data Protection Act." BMJ 313, no. 7056 (August 31, 1996): 560. http://dx.doi.org/10.1136/bmj.313.7056.560a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Kurebwa, Jeffrey. "Understanding Cyber Security." International Journal of Systems and Service-Oriented Engineering 11, no. 1 (January 2021): 43–55. http://dx.doi.org/10.4018/ijssoe.2021010104.

Full text
Abstract:
This study provides an understanding of cyber security and further analyses the Cyber Security and Data Protection Bill of Zimbabwe. The internet and other technological developments have provided a variety of platforms for increased and sometimes unrestricted exercise of freedom of expression, association, online transactions, and access to information rights. Zimbabwe has faced increased threats from cyber activities. This has necessitated the country to enact the Cyber Security and Data Protection Bill. The purpose of the Cyber Security and Data Protection Bill is to increase cyber security in order to build confidence and trust in the secure use of information and communication technologies by data controllers, their representatives, and data subjects. This study relied on data gathered through key informant interviews and documentary search. The key informants were drawn from various institutions that deal with cybercrime. Zimbabwe does not have adequate and effective legislative instruments to combat cybercrime.
APA, Harvard, Vancouver, ISO, and other styles
45

Spencer, Aleksandra, and Seraphim Patel. "Applying the Data Protection Act 2018 and General Data Protection Regulation principles in healthcare settings." Nursing Management 26, no. 1 (January 28, 2019): 34–40. http://dx.doi.org/10.7748/nm.2019.e1806.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Hoeren, Thomas. "The new German Data Protection Act and its compatibility with the European Data Protection Directive." Computer Law & Security Review 25, no. 4 (July 2009): 318–24. http://dx.doi.org/10.1016/j.clsr.2009.05.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Chitimira, Howard. "A General Legislative Analysis of "Torture" as a Human Rights Violation in Zimbabwe." Potchefstroom Electronic Law Journal/Potchefstroomse Elektroniese Regsblad 20 (June 6, 2017): 1. http://dx.doi.org/10.17159/1727-3781/2017/v20i0a1271.

Full text
Abstract:
violations have been reported in Zimbabwe from the late 1970s to date. Notably, these torture-related human rights violations were problematic during the liberation war era in Zimbabwe. Regrettably, such violations are allegedly still prevalent, especially prior to and/or during general political elections in Zimbabwe. Accordingly, this article investigates torture as a human rights violation in Zimbabwe, inter alia by focusing on the role of selected law enforcement agencies in the protection of human rights in Zimbabwe. The article also discusses the legal position on torture and the perpetration of torture against ordinary people prior to as well as after independence in Zimbabwe. This is done to investigate the adequacy of the legal framework in Zimbabwe with regard to the combatting of torture. In relation to this, selected regional and international legal frameworks against torture are briefly discussed in order to determine possible measures that could be utilised in Zimbabwe. The authors submit that although the Constitution of Zimbabwe Amendment (No 20) Act, 2013 (Zimbabwe Constitution, 2013) prohibits torture, more may still need to be done to enhance the combatting of torture in Zimbabwe. For instance, apart from the prohibition contained in the Zimbabwe Constitution, 2013, there is no legislation that expressly outlaws torture in Zimbabwe. Moreover, Zimbabwe has not ratified the United Nations (UN) Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment of 1984 (UN Convention against Torture) to date. Lastly, concluding remarks and possible recommendations that could be employed to discourage torture-related human rights abuses in Zimbabwe are provided
APA, Harvard, Vancouver, ISO, and other styles
48

Sheikh, Asim. "The Data Protection (Amendment) Act, 2003: The Data Protection Directive and its Implications for Medical Research in Ireland." European Journal of Health Law 12, no. 4 (2005): 357–72. http://dx.doi.org/10.1163/157180905775088568.

Full text
Abstract:
AbstractDirective 95/46/EC on the Protection of Individuals with regard to the Processing of Personal Data and on the Free Movement of Such Data has been transposed into national law and is now the Data Protection (Amendment) Act, 2003.The Directive and the transposing Act provide for new obligations to those processing data. The new obligation of primary concern is the necessity to obtain consent prior to the processing of data (Article 7, Directive 95/46/EC). This has caused much concern especially in relation to 'secondary data' or 'archived data'.There exist, what seem to be in the minds of the medical research community, two competing interests: (i) that of the need to obtain consent prior to processing data and (ii) the need to protect and foster medical research. At the same time as the introduction of the Act, other prior legislation, i.e. the Freedom of Information Act, 1997-2003, has encouraged candour within the doctor-patient relationship and the High Court in Ireland, in the case of Geoghegan v. Harris, has promulgated the 'reasonable-patient test' as being the correct law in relation to the disclosure of risks to patients. The court stated that doctors have a duty to disclose all material risks to patients. The case demonstrates an example of a move toward a more open medical relationship. An example of this rationale was also recently seen in the United Kingdom in the House of Lords decision in Chester v. Afshar. Within the medical research community in Ireland, the need to respect the autonomy of patients and research participants by providing information to such parties has also been observed (Sheikh A. A., 2000 and Irish Council for Bioethics, 2005).Disquiet has been expressed in Ireland and other jurisdictions by the medical research communities in relation to the exact working and meaning of the Directive and therefore the transposing Acts (Strobl et al). This may be due to the fact that, as observed by Beyleveld "The Directive makes no specific mention of medical research and, consequently, it contains no provisions for medical research as an explicitly delineated category." (Beyleveld D., 2004) This paper examines the Irish Act and discusses whether the concerns expressed are well-founded and if the Act is open to interpretation such that it would not hamper medical research and public health work.
APA, Harvard, Vancouver, ISO, and other styles
49

Wong YongQuan, Benjamin. "Data privacy law in Singapore: the Personal Data Protection Act 2012." International Data Privacy Law 7, no. 4 (September 23, 2017): 287–302. http://dx.doi.org/10.1093/idpl/ipx016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Redsell, Sarah A., and Francine M. Cheater. "The Data Protection Act (1998): implications for health researchers." Journal of Advanced Nursing 35, no. 4 (August 27, 2001): 508–13. http://dx.doi.org/10.1046/j.1365-2648.2001.01867.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography