Siga este enlace para ver otros tipos de publicaciones sobre el tema: Data protection.

Artículos de revistas sobre el tema "Data protection"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Data protection".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Gama, Cruz. "Data protection and personal data protection". Brazilian Journal of Clinical Medicine and Review 1, Suppl.1 (15 de abril de 2023): 18. http://dx.doi.org/10.52600/2965-0968.bjcmr.2023.1.suppl.1.18.

Texto completo
Resumen
In Angola, the right to privacy is one of the fundamental rights enshrined in the Constitution of the Republic. In addition to the Constitution, the legal framework on the protection of personal data is complemented by other laws, with regard to the Personal Data Protection Law, No. 22/11 of 17 June, which establishes legal rules for the processing of such data and establishes Data Protection (DPA), as the public authority responsible for monitoring compliance with those rules and exercising. The unequivocal and express consent of the data subject or his legal representative and prior notification to the APD are the general requirements for the processing of personal data, without prejudice to the principles and other specific requirements applicable to sensitive data. Only health professionals registered in the respective professional associations are qualified to process health data, and must observe professional secrecy. Data holders are assured the exercise of their rights to information, access, rectification, updating and deletion of their data. Security measures must be implemented to ensure confidentiality, integrity and availability of information. In conclusion, in Angola there is no prohibition on the processing of personal data, what the legislator imposes is that it be done with transparency and legality, aiming at protecting its holders from situations of vulnerability, including stigmatization, discrimination, observing dignity of the human person as one of the fundamental principles of ethics, especially in scientific research.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Chamberlain, Johanna y Andreas Kotsios. "Data protection beyond data protection regulation". Stiftelsen Juridisk Fakultetslitteratur, n.º 2024 2 (17 de enero de 2024): 397–424. http://dx.doi.org/10.53292/bd1fa11c.282687ef.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Alhababi, Hamad Hamed. "Cross-Border Data Transfer between the gcc Data Protection Laws and the gdpr". Global Journal of Comparative Law 13, n.º 2 (7 de agosto de 2024): 178–200. http://dx.doi.org/10.1163/2211906x-13020003.

Texto completo
Resumen
Abstract This article explores the procedures related to data protection laws in the Gulf Cooperation Council States (gcc) and the European Union (EU) regarding the General Data Protection Regulation (gdpr). It draws conclusions about the rules governing the transfer of personal information outside of a country. Transfers of personal data to foreign countries or international organizations are discussed, specifically, transfers based on an ‘adequacy’ judgment, or transfers subject to suitable protections. The article also highlights the primary modifications made to safeguard the outbound transmission of personal information in the EU and the gcc states. The article shows that the gcc nations are concerned about protecting citizens and residents’ personal information and that there is room for development in the legislative process regarding the improvement of personal data protection regulations.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Walker-Osborn, C., L. Fitzsimons y J. Ruane. "Data Protection". ITNOW 55, n.º 3 (28 de agosto de 2013): 38–39. http://dx.doi.org/10.1093/itnow/bwt050.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Rowe, Heather y Robin McGilligan. "DATA PROTECTION". Computer Law & Security Review 17, n.º 5 (septiembre de 2001): 333–35. http://dx.doi.org/10.1016/s0267-3649(01)00511-8.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Dinant, Jean-Marc y Ewout Keuleers. "Data protection". Computer Law & Security Review 20, n.º 1 (enero de 2004): 22–28. http://dx.doi.org/10.1016/s0267-3649(04)00005-6.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Chalton, Simon. "Data protection". Computer Law & Security Review 13, n.º 6 (noviembre de 1997): 425–28. http://dx.doi.org/10.1016/s0267-3649(97)89792-0.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Sizer, Richard. "Data protection". Computer Law & Security Review 2, n.º 5 (enero de 1987): 13–15. http://dx.doi.org/10.1016/0267-3649(87)90007-0.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Reynolds, Chris. "Data protection". Computer Law & Security Review 5, n.º 6 (marzo de 1990): 19–22. http://dx.doi.org/10.1016/0267-3649(90)90059-k.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Clark, Robert. "Data protection". Computer Law & Security Review 6, n.º 6 (marzo de 1991): 16–19. http://dx.doi.org/10.1016/0267-3649(91)90172-r.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

George, R. E. "Data protection". Physics Bulletin 37, n.º 9 (septiembre de 1986): 363. http://dx.doi.org/10.1088/0031-9112/37/9/001.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Saxby, S. "Data protection". Computer Law & Security Review 21, n.º 3 (enero de 2005): 277. http://dx.doi.org/10.1016/j.clsr.2005.01.012.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Rowe, Heather. "Data protection". Computer Law & Security Review 10, n.º 1 (enero de 1994): 47. http://dx.doi.org/10.1016/0267-3649(94)90092-2.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Mishra, Amit. "Fundamental Rights and Data Protection (Balancing Innovation and Privacy in Light of Digital Personal Data Protection Act, 2023)". International Journal of Science and Research (IJSR) 13, n.º 5 (5 de mayo de 2024): 332–37. http://dx.doi.org/10.21275/mr24504204804.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Begum, Shameena, V. Ratna Vasuki y K. V. V. Srinivas K.V.V.Srinivas. "Data Security and Protection in Cloud Computing". International Journal of Scientific Research 1, n.º 2 (1 de junio de 2012): 31–34. http://dx.doi.org/10.15373/22778179/jul2012/9.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Aruna, K. B., A. LallithaShri, Aravindh ., Jayakumar . y Jayasurya . "Protection for Multi Owner Data Sharing Scheme". Bonfring International Journal of Advances in Image Processing 7, n.º 1 (31 de marzo de 2017): 01–05. http://dx.doi.org/10.9756/bijaip.10485.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Aljibawi, Mayas y Roslan Ismail. "Personal Data Protection Acts: Concepts and Review". International Journal of Scientific Engineering and Research 2, n.º 9 (27 de septiembre de 2014): 12–16. https://doi.org/10.70729/j2013362.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

-. "Data Protection Agreement". ASA Bulletin 37, Issue 4 (1 de diciembre de 2019): 838–52. http://dx.doi.org/10.54648/asab2019076.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Blackwell, D. "Data protection countdown". Computer Bulletin 40, n.º 3 (1 de mayo de 1998): 22–23. http://dx.doi.org/10.1093/combul/40.3.22.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Gossman, P. y J. R. Wilkinson. "Data Protection Act." BMJ 295, n.º 6610 (28 de noviembre de 1987): 1418. http://dx.doi.org/10.1136/bmj.295.6610.1418.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Jakobs, Kai. "Data protection dangers". Science and Public Policy 29, n.º 2 (abril de 2002): 149–50. http://dx.doi.org/10.1093/spp/29.2.149.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

BLUME, PETER. "Practical data protection". International Journal of Law and Information Technology 2, n.º 2 (1994): 194–209. http://dx.doi.org/10.1093/ijlit/2.2.194.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Priest, R. G. "Data Protection Act". Psychiatric Bulletin 12, n.º 5 (1 de mayo de 1988): 204. http://dx.doi.org/10.1192/pb.12.5.204.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Dhont, Jan y Yves Poullet. "Data protection — Belgium". Computer Law & Security Review 16, n.º 1 (febrero de 2000): 5–19. http://dx.doi.org/10.1016/s0267-3649(00)87063-6.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Rowe, Heather. "EU data protection". Computer Law & Security Review 16, n.º 1 (febrero de 2000): 41–42. http://dx.doi.org/10.1016/s0267-3649(00)87072-7.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Jackson, Margaret. "DATA PROTECTION - AUSTRALIA". Computer Law & Security Review 16, n.º 3 (junio de 2000): 166–69. http://dx.doi.org/10.1016/s0267-3649(00)88911-6.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Bygrave, Lee A. "EUROPEAN DATA PROTECTION". Computer Law & Security Review 16, n.º 4 (agosto de 2000): 252–57. http://dx.doi.org/10.1016/s0267-3649(00)89134-7.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Carey, Peter y David Berry. "DATA PROTECTION — SECURITY". Computer Law & Security Review 18, n.º 2 (marzo de 2002): 112–13. http://dx.doi.org/10.1016/s0267-3649(02)03010-8.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Ajana, Btihaj. "Reinventing data protection?" Identity in the Information Society 2, n.º 3 (25 de agosto de 2009): 355–58. http://dx.doi.org/10.1007/s12394-009-0025-3.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Davies, David. "Data protection corner". Computer Law & Security Review 1, n.º 5 (enero de 1986): 9–11. http://dx.doi.org/10.1016/0267-3649(86)90007-5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Kolb, Angela. "Data protection — Germany". Computer Law & Security Review 7, n.º 3 (septiembre de 1991): 123–26. http://dx.doi.org/10.1016/0267-3649(91)90089-e.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Poullet, Y. y M. H. Boulanger. "Data protection — medicine". Computer Law & Security Review 6, n.º 5 (enero de 1991): 18–23. http://dx.doi.org/10.1016/0267-3649(91)90150-t.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Determann, Lothar. "Healthy Data Protection". Michigan Technology Law Review, n.º 26.2 (2020): 229. http://dx.doi.org/10.36645/mtlr.26.2.healthy.

Texto completo
Resumen
Modern medicine is evolving at a tremendous speed. On a daily basis, we learn about new treatments, drugs, medical devices, and diagnoses. Both established technology companies and start-ups focus on health-related products and services in competition with traditional healthcare businesses. Telemedicine and electronic health records have the potential to improve the effectiveness of treatments significantly. Progress in the medical field depends above all on data, specifically health information. Physicians, researchers, and developers need health information to help patients by improving diagnoses, customizing treatments and finding new cures. Yet law and policymakers are currently more focused on the fact that health information can also be used to harm individuals. Even after the outbreak of the COVID-19 pandemic (which occurred after the manuscript for this article was largely finalized), the California Attorney General Becera made a point of announcing that he will not delay enforcement of the California Consumer Privacy Act (“CCPA”), which his office estimated imposes a $55 billion cost (approximately 1.8% of California Gross State Product) for initial compliance, not including costs of ongoing compliance, responses to data subject requests, and litigation. Risks resulting from health information processing are very real. Contact tracing and quarantines in response to SARS, MERS, and COVID-19 outbreaks curb civil liberties with similar effects to law enforcement investigations, arrests, and imprisonment. Even outside the unusual circumstances of a global pandemic, employers or insurance companies may disfavor individuals with pre-existing health conditions in connections with job offers and promotions as well as coverage and eligibility decisions. Some diseases carry a negative stigma in social circumstances. To reduce the risks of such harms and protect individual dignity, governments around the world regulate the collection, use, and sharing of health information with ever-stricter laws. European countries have generally prohibited the processing of personal data, subject to limited exceptions, for which companies have to identify and then document or apply. The General Data Protection Regulation (“GDPR”) that took effect in 2018 confirms and amplifies a rigid regulatory regime that was first introduced in the German State Hessen in 1970 and demands that organizations minimize the amount of data they collect, use, share, and retain. Healthcare and healthtech organizations have struggled to comply with this regime and have found EU data protection laws fundamentally hostile to data-driven progress in medicine. The United States, on the other hand, has traditionally relied on sector- and harm-specific laws to protect privacy, including data privacy and security rules under the federal Health Insurance Portability and Accountability Act (“HIPAA”) and numerous state laws including the Confidentiality of Medical Information Act (“CMIA”) in California, which specifically address the collection and use of health information. So long as organizations observe the specific restrictions and prohibitions in sector-specific privacy laws, they may collect, use, and share health information. As a default rule in the United States, businesses are generally permitted to process personal information, including health information. Yet, recently, extremely broad and complex privacy laws have been proposed or enacted in some states, including the California Consumer Privacy Act of 2018 (“CCPA”), which have a potential to render compliance with data privacy laws impractical for most businesses, including those in the healthcare and healthtech sectors. Meanwhile, the People’s Republic of China is encouraging and incentivizing data-driven research and development by Chinese companies, including in the healthcare sector. Data-related legislation is focused on cybersecurity and securing access to data for Chinese government agencies and much less on individual privacy interests. In Europe and the United States, the political pendulum has swung too far in the direction of ever more rigid data regulation and privacy laws, at the expense of potential benefits through medical progress. This is literally unhealthy. Governments, businesses, and other organizations need to collect, use and share more personal health information, not less. The potential benefits of health data processing far outweigh privacy risks, which can be better tackled by harm-specific laws. If discrimination by employers and insurance companies is a concern, then lawmakers and law enforcement agencies need to focus on anti-discrimination rules for employers and insurance companies - not prohibit or restrict the processing of personal data, which does not per se harm anyone. The notion of only allowing data processing under specific conditions leads to a significant hindrance of medical progress by slowing down treatments, referrals, research, and development. It also prevents the use of medical data as a tool for averting dangers for the public good. Data “anonymization” and requirements for specific consent based on overly detailed privacy notices do not protect patient privacy effectively and unnecessarily complicate the processing of health data for medical purposes. Property rights to personal data offer no solutions. Even if individuals - not companies creating databases - were granted property rights to their own data originally, this would not ultimately benefit individuals. Given that transfer and exclusion rights are at the core of property regimes, data property rights would threaten information freedom and privacy alike: after an individual sells her data, the buyer and new owner could exercise his data property rights to enjoin her and her friends and family from continued use of her personal data. Physicians, researchers, and developers would not benefit either; they would have to deal with property rights in addition to privacy and medical confidentiality requirements. Instead of overregulating data processing or creating new property rights in data, lawmakers should require and incentivize organizations to earn and maintain the trust of patients and other data subjects and penalize organizations that use data in specifically prohibited ways to harm individuals. Electronic health records, improved notice and consent mechanisms, and clear legal frameworks will promote medical progress, reduce risks of human error, lower costs, and make data processing and sharing more reliable. We need fewer laws like the GDPR or the CCPA that discourage organizations from collecting, using, retaining, and sharing personal information. Physicians, researchers, developers, drug companies, medical device manufacturers and governments urgently need better and increased access to personal health information. The future of medicine offers enormous opportunities. It depends on trust and healthy data protection. Some degree of data regulation is necessary, but the dose makes the poison. Laws that require or intend to promote the minimization of data collection, use, and sharing may end up killing more patients than hospital germs. In this article, I promote a view that is decidedly different from that supported by the vast majority of privacy scholars, politicians, the media, and the broader zeitgeist in Europe and the United States. I am arguing for a healthier balance between data access and data protection needs in the interest of patients’ health and privacy. I strive to identify ways to protect health data privacy without excessively hindering healthcare and medical progress. After an introduction (I), I examine current approaches to data protection regulation, privacy law, and the protection of patient confidentiality (II), risks associated with the processing of health data (III), needs to protect patient confidence (IV), risks for healthcare and medical progress (V), and possible solutions (VI). I conclude with an outlook and call for healthier approaches to data protection (VII).
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Priest, R. G. "Data Protection Act". Bulletin of the Royal College of Psychiatrists 12, n.º 5 (mayo de 1988): 204. http://dx.doi.org/10.1192/s0140078900020162.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

McIntyre, T. J. "Reinventing data protection?" Computer Law & Security Review 26, n.º 6 (noviembre de 2010): 673–76. http://dx.doi.org/10.1016/j.clsr.2010.07.003.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Poongodi, R. K. "Biometric for Data Protection". International Journal for Research in Applied Science and Engineering Technology 13, n.º 2 (28 de febrero de 2025): 159–63. https://doi.org/10.22214/ijraset.2025.66818.

Texto completo
Resumen
Biometric data, including fingerprints, facial recognition, iris scans, and voice patterns, has become a vital tool in various industries, offering enhanced security and streamlined user experiences. However, the use of biometric data raises significant concerns regarding privacy and data protection due to its sensitive nature and potential for misuse. This abstract discusses the importance of protecting biometric data, examining the risks associated with its collection, storage, and processing, as well as the legal frameworks that govern its use. Key regulations such as the General Data Protection Regulation (GDPR) and the Biometric Information Privacy Act (BIPA) set stringent guidelines for organizations to ensure biometric data is collected with explicit consent, securely stored, and properly managed. The abstract also explores the role of encryption, access controls, and privacy policies in mitigating risks and safeguarding individuals' rights. As biometric technologies continue to advance, it is essential that organizations implement comprehensive data protection strategies to prevent unauthorized access, breaches, and misuse while maintaining the trust of individuals. The abstract concludes with an emphasis on the need for continued innovation in both biometric technologies and data protection practices to address emerging challenges and ensure compliance with evolving privacy standards.
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Hallinan, D. "Opinions ∙ Data Protection without Data: Could Data Protection Law Apply without Personal Data Being Processed?" European Data Protection Law Review 5, n.º 3 (2019): 293–99. http://dx.doi.org/10.21552/edpl/2019/3/5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Shahul Ikram, Nur Adlin Hanisah. "DATA BREACHES EXIT STRATEGY: A COMPARATIVE ANALYSIS OF DATA PRIVACY LAWS". Malaysian Journal of Syariah and Law 12, n.º 1 (15 de abril de 2024): 135–47. http://dx.doi.org/10.33102/mjsl.vol12no1.458.

Texto completo
Resumen
Data has become highly valuable in the era of digitalisation and is the main target of cybercriminals. Cybercriminals steal data by exploiting system vulnerabilities. The rise of catastrophic data breach incidents affects business operations, reputation and legal standing, leading to business disruptions, financial loss and reputation damage. These incidents have raised data security concerns. The frequent incident is partly due to insufficient security measures in place. This article employs doctrinal research focusing on legal principles based on legislation to analyse Malaysia’s legal framework for protecting personal data in Malaysia and a comparison with other jurisdictions, i.e. the European Union General Data Protection Regulation (GDPR), the Singapore Personal Data Protection Act 2012 and the China Personal Information Protection Law (PIPL). The findings show that Malaysia’s data protection laws fall short of the international norm in some areas. This article suggests that Malaysian policymakers may amend the Personal Data Protection Act 2010 to align with international data protection standards to strengthen data security measures in preventive, detective and responsive data breaches. Consequently, this article provides an analysis of data protection laws in Malaysia and compares them with other advanced jurisdictions. It offers valuable insights into the challenges and opportunities involved in safeguarding personal data, the legal framework, and organisational strategies related to data privacy and security.
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Mendes de Leon, Pablo. "The Fight Against Terrorism Through Aviation: Data Protection Versus Data Protection". Air and Space Law 31, Issue 4/5 (1 de septiembre de 2006): 320–30. http://dx.doi.org/10.54648/aila2006027.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Hu, Pengnian y Qian Wei. "Research on Personal Data Protection of EU General Data Protection Regulation". IOP Conference Series: Materials Science and Engineering 806 (5 de mayo de 2020): 012003. http://dx.doi.org/10.1088/1757-899x/806/1/012003.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Hemmings, Nicholas y Joseph Noar. "Data protection is changing − the new general data protection regulations (GDPR)". Orthodontic Update 11, n.º 3 (2 de julio de 2018): 110–14. http://dx.doi.org/10.12968/ortu.2018.11.3.110.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Miño-Vásquez, Verónica. "The Protection of Genetic Data under the General Data Protection regulation". Datenschutz und Datensicherheit - DuD 43, n.º 3 (25 de febrero de 2019): 154–58. http://dx.doi.org/10.1007/s11623-019-1083-9.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Guzmán-Rodríguez, Héctor E. "Data Protection in Mexico: One Right, Two Systems, Different Protections and Uncontrolled Data Breaches". Global Privacy Law Review 2, Issue 2 (1 de junio de 2021): 149–54. http://dx.doi.org/10.54648/gplr2021019.

Texto completo
Resumen
To obtain a complete understanding of how data protection laws apply in Mexico, readers must start with the following fact: There are two main data protection laws in Mexico. One applies to companies and individuals processing personal data for non-household activities, the other provides the framework that all Mexican States shall follow to regulate data processing by public entities identified as ‘sujetos obligados’ or ‘obligated subjects’. Even when both laws regulate ‘data protection’ in a very similar way, a close look into them reveals that they provide different rights to data subjects and different obligations for data controllers. As we will indicate, this situation may lead to problems on the differentiated protections and obligations when citizens’ rights are processed by two types of data controllers that otherwise should not have different obligations when processing this information. Mexico, Data Protection, Data Subjects, Portability, Impact Assessment, Breach, Security
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Garg, Dr Ajay Kumar y Shikha Kuchhal. "Data Protection Laws in India: A Comparative Study". Indian Journal of Applied Research 3, n.º 1 (1 de octubre de 2011): 75–76. http://dx.doi.org/10.15373/2249555x/jan2013/30.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Kajeje, Vicky, Ir Sylvain Sibita, Muhindo Syauswa y H. Ciraba. "The Researcher Faces Data Security: Risks and Protection". International Journal of Scientific Engineering and Research 5, n.º 8 (27 de agosto de 2017): 124–27. https://doi.org/10.70729/ijser171841.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Noor Sureani, Nurkhairina Binti, Atikah Shahira Binti Awis Qurni, Ayman Haziqah Binti Azman, Mohd Bahrin Bin Othman y Hariz Sufi Bin Zahari. "The Adequacy of Data Protection Laws in Protecting Personal Data in Malaysia". Malaysian Journal of Social Sciences and Humanities (MJSSH) 6, n.º 10 (10 de octubre de 2021): 488–95. http://dx.doi.org/10.47405/mjssh.v6i10.1087.

Texto completo
Resumen
With the burgeoning technology, Malaysia has seen a staggering number of data breaches and data leaks within this past decade alone, with no signs of the trend decreasing. This has raised questions on whether the Personal Data Protection Act 2010 (PDPA) adequately protects the personal data of Malaysians. With the recent COVID-19 pandemic, data has been collected on a larger scale than before, with more frequent data leaks occurring. Hence, this study aims to analyse the adequacy of the PDPA by benchmarking it to the United Kingdom’s (UK) Data Protection Act 2018, which have seen a decrease in data breaches since the implementation of the new legislation. In this context, personal data refers to information processed or recorded that relates directly or indirectly to a data subject, who may be identified from the information and may include sensitive personal data. The study uses a doctrinal analysis methodology to best explore the ideas and concepts within the literature available regarding the protection of personal data. The study also employs a comparative analysis methodology by comparing the scope and application of Malaysian and UK legislation for benchmarking. The findings suggest that there are improvements to be made for the PDPA to be adequate.
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Li, Zhiping, Jiagui Xie, Likun Gao y Fanjie Nie. "Data Privacy Protection in Data Fusion". Journal of Physics: Conference Series 2033, n.º 1 (1 de septiembre de 2021): 012179. http://dx.doi.org/10.1088/1742-6596/2033/1/012179.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Tahim, Arpan, Sanjeeve Sabharwal, Rakesh Dhokia, Rajiv Bajekal y Steve Kyriacou. "Data protection training improves data handling". Clinical Teacher 9, n.º 6 (20 de noviembre de 2012): 403–7. http://dx.doi.org/10.1111/j.1743-498x.2012.00557.x.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Colangelo, Giuseppe y Mariateresa Maggiolino. "Data Protection in Attention Markets: Protecting Privacy through Competition?" Journal of European Competition Law & Practice 8, n.º 6 (10 de mayo de 2017): 363–69. http://dx.doi.org/10.1093/jeclap/lpx037.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Supriyadi, Daniar. "The Regulation of Personal and Non-Personal Data in the Context of Big Data". Journal of Human Rights, Culture and Legal System 3, n.º 1 (14 de febrero de 2023): 33–69. http://dx.doi.org/10.53955/jhcls.v3i1.71.

Texto completo
Resumen
Data protection laws provide minimum protections for personal data, as well as facilitate the free flow of such data, by setting out principles and rules for legitimate data processing. In the big data context, personal data may not be as easy to distinguish as in traditional data processing, and that makes policy-makers and businesses turn to the identifiability concept: in other words, what data are personal. This research is based on doctrinal legal researchon the legal theory (concepts, rules, and principles) concerning data protection in the EU and Indonesia. The results of the research show that the understand such paramount terminology in data protection law, relevant factors are presented to assess the direct or indirect identification of a natural person. In the EU data protection law, the test entails, for example, risk-based measures and technological development, whereas Indonesian law on data protection has not yet established such assessments. Data within big data operations traditionally falls under the scope of data protection laws only if it discloses the private life of individuals, such as names or other civil identities, but without further conditions to ascertain whether the data can be indirectly identified with an individual.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía