Tesis sobre el tema "Respect vie privée"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 41 mejores tesis para su investigación sobre el tema "Respect vie privée".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Athea, Valene. "La gouvernance d'entreprise face au respect de la vie privée des salariés". Thesis, Paris Est, 2015. http://www.theses.fr/2015PESC0063/document.
Texto completoThe notion of governance seems to cover themes close to the term "to govern", of the grip of decision and the evaluation.It represents all the organs and the rules of decision, information (transparency) and supervision allowing the legal successors and the partners of a company, to see their respected interests and their voices in the functioning of this one.The governance of company proposes a new conception of the process of decision, granting all its place to the dialogue between the stakeholders.The union representative intervenes in this sense, indeed, he has a mission of claiming (for example concerning the increase in salaries), he is the interlocutor of the labor union(syndicate) with the employer, he negotiates with the latter the standards of the company (agreements and collective labor agreements)Framed by laws assuring the essential transparency, the governance of company would be in theory the way to assure at best the multiple interests of the actors concerned (employees and employers).It is the reason why it seemed convenient to draw a parallel between the exercise of the governance of company by the concerned actors and the respect for private life of the employees.The governance of company can be limited by the respect for private life of the employees.It is about a fundamental law, proclaimed by the law, registered in the bill of rights of 1948 (article 12), the European Convention on Human Rights and fundamental liberties (article 8), on the article 9 of the Civil code and on the article 226-1 of the Penal code.The components of the private life were not the object of a definition or a restrictive enumeration to avoid limiting the protection to the only legal forecasts. The courts applied the principle of this protection, in the right to life sentimental and in the family life, in the secret concerning the health, concerning the secret of the residence and the place of residence, and concerning the right(law) for the image
Antignac, Thibaud. "Méthodes formelles pour le respect de la vie privée par construction". Thesis, Lyon, INSA, 2015. http://www.theses.fr/2015ISAL0016/document.
Texto completoPrivacy by Design (PbD) is increasingly praised as a key approach to improving privacy protection. New information and communication technologies give rise to new business models and services. These services often rely on the exploitation of personal data for the purpose of customization. While privacy is more and more at risk, the growing view is that technologies themselves should be used to propose more privacy-friendly solutions. Privacy Enhancing Technologies (PETs) have been extensively studied, and many techniques have been proposed such as anonymizers or encryption mechanisms. However, PbD goes beyond the use of PETs. Indeed, the privacy requirements of a system should be taken into account from the early stages of the design because they can have a large impact on the overall architecture of the solution. The PbD approach can be summed up as ``prevent rather than cure''. A number of principles related to the protection of personal data and privacy have been enshrined in law and soft regulations. They involve notions such as data minimization, control of personal data by the subject, transparency of the data processing, or accountability. However, it is not clear how to translate these principles into technical features, and no method exists so far to support the design and verification of privacy compliant systems. This thesis proposes a systematic process to specify, design, and verify system architectures. This process helps designers to explore the design space in a systematic way. It is complemented by a formal framework in which confidentiality and integrity requirements can be expressed. Finally, a computer-aided engineering tool enables non-expert designers to perform formal verifications of the architectures. A case study illustrates the whole approach showing how these contributions complement each other and can be used in practice
Chauvet, Delphine. "La vie privée : étude de droit privé". Thesis, Paris 11, 2014. http://www.theses.fr/2014PA111006.
Texto completoPrivacy is a jurisprudential notion, recently established by the legislator. Nevertheless, it’s not yet clearly defined. Privacy lies within an utterly variable context. Consequently, its domain and legal system are difficult to determine. However, notions such as intimacy, identity and personality help apprehending the concept of privacy.The evolution of society and the spreading of new technologies have impacts on privacy. Jeopardized, it has to be better protected. French courts and European Court of Human Rights are attempting at this necessity.If privacy is subjected to a right of respect, its dispute isn’t limited to defense. Privacy also contributes to personal development.Yet, right of privacy is relative insofar as it draws antagonist interests, such as general interest and various particular interests.This study contributes to apprehending privacy with regard to the Law
Alamelou, Quentin. "Protocoles cryptographiques pour l’authentification numérique et le respect de la vie privée". Thesis, Limoges, 2017. http://www.theses.fr/2017LIMO0042/document.
Texto completoInternet constant growth has naturally led to cryptographic issues such as authentication and privacy concerns. The common usage of connected devices (smartphones, tablet, watch, …) as authentication means made us consider cryptographic keys generations and/or managements from such devices to address aforementioned needs. For such a purpose, we identified fuzzy extractors and group signature schemes. On the one hand, this thesis then presents the first reusable fuzzy extractor based on set difference metric (in the nonprogrammable random oracle). In so doing, we were able to design a key generation module performing authentication from users’ devices. On the other hand, we came up with two group signature schemes, respectively based on Hamming and rank metrics, that seriously compete with post-quantum concurrent schemes based on lattices
Fragoso, Rodriguez Uciel. "Modèle de respect de la vie privée dans une architecture d'identité fédérée". Phd thesis, Institut National des Télécommunications, 2009. http://tel.archives-ouvertes.fr/tel-00541850.
Texto completoLajoie-Mazenc, Paul. "Réputation et respect de la vie privée dans les réseaux dynamiques auto-organisés". Thesis, Rennes 1, 2015. http://www.theses.fr/2015REN1S039/document.
Texto completoReputation mechanisms are very powerful mechanisms to foster trust between unknown users, by rewarding good behaviors and punishing bad ones. Reputation mechanisms must guarantee that the computed reputation scores are precise and robust against attacks; to guarantee such properties, existing mechanisms require information that jeopardize users' privacy: for instance, clients' interactions might be tracked. Privacy-preserving reputation mechanisms have thus been proposed, protecting both clients' privacy and the providers' one. However, to guarantee strong privacy properties, these mechanisms provide imprecise reputation scores, particularly by preventing clients to testify about their negative interactions. In this thesis, we propose a new distributed privacy-preserving reputation mechanism allowing clients to issue positive as well as negative feedback. Such a construction is made possible thanks to tools from the distributed systems community -- distributed third parties that allow for a distribution of trust and that tolerate malicious behaviors -- as well as from the cryptographic one -- for instance zero-knowledge proofs of knowledge or anonymous proxy signatures. Furthermore, we prove that our mechanism guarantees the required privacy and security properties, and we show with theoretical and practical analysis that this mechanism is usable
Moreno, Barbosa Andrés Dario. "Passage à l’échelle des systèmes de recommandation avec respect de la vie privée". Thesis, Nice, 2014. http://www.theses.fr/2014NICE4128/document.
Texto completoThe main objective of this thesis is to propose a recommendation method that keeps in mind the privacy of users as well as the scalability of the system. To achieve this goal, an hybrid technique using content-based and collaborative filtering paradigms is used in order to attain an accurate model for recommendation, under the strain of mechanisms designed to keep user privacy, particularly designed to reduce the user exposure risk. The thesis contributions are threefold : First, a Collaborative Filtering model is defined by using client-side agent that interacts with public information about items kept on the recommender system side. Later, this model is extended into an hybrid approach for recommendation that includes a content-based strategy for content recommendation. Using a knowledge model based on keywords that describe the item domain, the hybrid approach increases the predictive performance of the models without much computational effort on the cold-start setting. Finally, some strategies to improve the recommender system's provided privacy are introduced: Random noise generation is used to limit the possible inferences an attacker can make when continually observing the interaction between the client-side agent and the server, and a blacklisted strategy is used to refrain the server from learning interactions that the user considers violate her privacy. The use of the hybrid model mitigates the negative impact these strategies cause on the predictive performance of the recommendations
Flaud, Ivan. "Le droit au respect de la vie familiale". Chambéry, 2004. http://www.theses.fr/2004CHAML024.
Texto completoKillijian, Marc-Olivier. "CONTRIBUTIONS À LA RÉSILIENCE ET AU RESPECT DE LA VIE PRIVÉE DES SYSTÈMES MOBIQUITAIRES". Habilitation à diriger des recherches, Université Paul Sabatier - Toulouse III, 2013. http://tel.archives-ouvertes.fr/tel-00849725.
Texto completoArnaud, Stéphanie. "Le respect de la vie personnelle des salariés dans la relation de travail". Aix-Marseille 3, 2006. http://www.theses.fr/2006AIX32028.
Texto completoPrivacy consists in a logic of self-determination and informational monopoly on personal data. Respecting it means conceding autonomy and reducing monitoring and information screening on employees. There are legal vaguenesses in which managers find the possibility to choose between different levels of respect of workers' personal life: To what extent can they promote employees privacy without compromising organizational efficiency ? According to standard agency theory, incentives reduce opportunism and foster extrinsic motivation. In psychology, theory of self-determination and cognitive evaluation explains that a work environment which doesn't respect the logic of a person self-determination, crowds out her self-regulated motivation. We find that every work situation requires a particular equilibrium between those two types of motivations which implies appropriate forms of management and monitoring – and therefore, the optimal level of privacy. Our hypotheses are globally validated by a structural equations model based on 568 questionnaires distributed to French workers. Results show the crowding-out / crowding-in effect of self-regulated motivation by a type of management perceived as controlling / informative and autonomy supportive. Situational management appears to be a solution to conciliate the respect of employees' privacy with the firm's performance
Barki, Amira. "Mécanismes cryptographiques conciliant authentification et respect de la vie privée dans le contexte du M2M". Thesis, Compiègne, 2016. http://www.theses.fr/2016COMP2337.
Texto completoMachine to Machine (M2M) applications enable a better management of resources and provide users With greater cornfort. Unfortunately, they also entail serious security and privacy concerns. ln this thesis, we focus on M2M security, and particularly on the authentication and privacy issues of M2M applications involving a SIM card. ln the first part, we design five new cryptographic primitives and formally prove that they meet the expected security requirements. More precisely, they consist of a partially blind signature scheme, a sequential aggregate Message Authentication Codes (MAC) scheme, an algebraic MAC scheme and two pre-Direct Anonymous Attestation (pre-DAA) schemes. Some of the proposed schemes aim to achieve a particular property that was not provided by previous constructions whereas others intend to improve the efficiency of state-of-the-art schemes. Our five schemes do not require the userls device to compute pairings. Thus, they are suitable for resource constrained environments such as SIM cards. ln a second part, we rely on these primitives to propose new privacy-preserving protocols. More specifically, we design an efficient private eCash system. We also propose a protocol enabling anonymous authentication and identification of embedded SIMs (eSlMs). Furthermore, we rely on our algebraic MAC scheme to build a practical Keyed-Verification Anonymous Credentials (KVAC) system. Finally, based on our sequential aggregate MAC scheme, we introduce a remote electronic voting system that is coercion-resistant and practical for real polls. The security of our protocols is formally proven in the Random Oracle Model (ROM) under classical computational assumptions
Jammet, Adrien. "La prise en compte de la vie privée dans l’innovation technologique". Thesis, Lille 2, 2018. http://www.theses.fr/2018LIL2D003/document.
Texto completoThe study of privacy within technological innovations is the study of the legal system surrounding personal data. However, the complexity and context of the subject imposes a pragmatic analysis, gathering elements of economy and technology, to define the reality of the use of the law by and within numerical innovations. As such, it necessitates a phenomenological approach, reviewing the historical steps that lead to the particular set of protections that the legislator has chosen, from a general protection of privacy towards a special regime applicable to personal data, and then an observation of its effectiveness to protect the essence of privacy. At the center of this work, we can find the will to understandthe gap between the trust given by the public to technology regarding the respect of one’s privacy and the declarations of legislators on the efficiency of the legislative response. Since the consent is the core principle of these regulations, this divergence deserves a legal analysis. Consequently, we can sum this thesis by a simple question: what it the real efficiency of privacy’s protection regime facing technological innovations ?
Augand, André-Jacques. "Respect de la vie privée en matière de nouvelles technologies à travers des études de cas". Thesis, Paris 2, 2015. http://www.theses.fr/2015PA020027.
Texto completoThe development of the Internet and online services have resulted in a proliferation of information collected from users - explicitly or without their knowledge. Furthermore, such information may be disclosed to third parties, or crossed with other data to create user profiles, or contribute to the identification of an individual.-The intensity of human activities in social networks is therefore a breeding ground for potential violations of user privacy. This research aims to study first the socio-economic determinants of the use and adoption of the Internet in a developing society. Then we studied the perception, risk control, and trust perceived by the user of the Internet in the context of online networks (Facebook, LinkedIn, Twitter, Myspace, Viadeo, Hi5 etc.). We developed a questionnaire that was administered to Gabon surfers. Our results showed that socio-economic status and people's living conditions strongly influence the use of the Internet in Libreville and Port-Gentil. Regarding the perceived trust and user behavior, three types of determinants of trust were identified: the website-related factors (social networks), factors related to various public and private organizations of Gabon (Army, police, judiciary, administrations and companies) and factors related to the user (risk aversion). These results are sufficient to relativize the effectiveness of Gabonese policies to ensure broad coverage of countries by ICT supposed to create added value and improve the living standards and social welfare of citizens. From these results, managerial recommendations for managers of social networks and regulatory bodies including the Gabonese National Commission for the Protection of Personal Data (CNPDCP) are proposed. We will propose practices to better protect the privacy of users of online social networks
Juncu-Moraru, Corina. "Le droit au respect du secret de la personne, droit fondamental ?" Aix-Marseille 3, 2008. http://www.theses.fr/2008AIX32025.
Texto completoIs there a right to secrecy and, if so, should this right be classified as a fundamental right? Indeed, should one not notice, beyond the protection of privacy, the gradually emerging elements of a fundamental right, inseparable from the very notion of natural person, an area representing the secrecy of a human person without which his/her unique individual consciousness, as well as his/her opinions and choices could not express themselves in action? In addition to the transparency requirements, designated in recent decades as the foundation of democratic societies, the urgent need to abide by a secrecy domain proper to the human person becomes more imposing each day, obligation most often accompanied by legal sanctions and gradually developing into a right. This necessary secrecy, a counterpart of the freedom of expression, ultimately acts as another guarantor of a pluralist democracy. The explosion of technical means of investigation requires rethinking the relationship already established between secrecy and information. The individual must be protected against indiscreet and unjustified intrusions in the substance of his person by a right to secrecy, essential to his/her self-determination. Only the right to secrecy provides him/her with the legal background enabling him/her to determine his/her own profound values and build his/her own identity. The place secrecy occupies in each individual’s life and in society as a whole, leads one to wonder about the meaning of this concept, the legal nature of the right to secrecy, and the modalities of his/her protection under the positive law. The first part of this thesis seeks therefore to bring to light the protection of the secrecy by constitutional and European judges, as well as its characteristics as a fundamental right. The second part of this study is devoted to the analysis and synthesis of all normative acts that ensure the preservation of various aspects of the right to secrecy. These texts, often criminally sanctioned, are common in French law, though, with no one actually attempting to fully comprehend them so far. Their scope confirms that, while a fundamental right, the right to secrecy can never be absolute
Payraudeau, Christel. "La protection du droit au respect de la vie privée par le Conseil constitutionnel à l’épreuve du numérique". Thesis, Corte, 2022. http://www.theses.fr/2022CORT0006.
Texto completoThe constitutionalisation of the right to privacy has progressively found its place, but with the advent of digital technology, new issues have emerged. Our society has undergone major changes over the last few decades, and even though modern technologies are very attractive due to their undeniable efficiency, they are evolving very fast and the law can thus only intervene too late.In this context and with regard to the supremacy of digital technology, we must question the reality of individual freedoms and fundamental rights. Privacy is shaken up by new practices. These issues are inescapable whatever the global challenges be they security, economic or political ones. It is necessary to analyse how the constitutional Council positions itself in order to better identify its limits. In our digital age, how can the much needed protection of the constitutional Council appear as inadequate as regards the right to privacy ?The purpose of this thesis is to demonstrate that in an ever-evolving technological world, the three themes studied here are inextricably linked: the right to privacy, as with individual freedoms which prevail, digital technology which makes itself indispensable and the constitutional court to guarantee the proper functioning and the management of these notions which could easily become antagonistic. We will identify the constitutional objectives which can be opposed to the right to privacy as well as the guarantees which determine the conciliation of this right with legislative objectives. In our study, we will consider that privacy in the digital virtual world has two sides that the constitutional Council is attempting to guarantee: on the one hand, protecting our relationship with others and on the other hand protecting the individual.It is important to remain critical of the use made of our personal data. With digital technology, the protection of privacy must unquestionably be analysed beyond our national borders. To analyse the dangers which threatens it, it is interesting to look at the study of the constitutional Council decisions in order to be able to compare case law and French legislation to those of other countries. Digital tools, due to their possible impacts on many aspects of our lives, considerably reduce spatial and temporal boundaries, which increasingly appear as obsolete. The digital network can virtually connect people all over the world. Therefore, constitutional protection is today part of a very different context insofar as exercising our freedoms and rights, such as privacy, inevitably has a supranational dimension
Jambert, Amandine. "Outils cryptographiques pour la protection des contenus et de la vie privée des utilisateurs". Thesis, Bordeaux 1, 2011. http://www.theses.fr/2011BOR14234/document.
Texto completoPrivacy is, nowadays, inseparable from modern technology. This is the context in which the present thesis proposes new cryptographic tools to meet current challenges.Firstly, I will consider zero-knowledge proofs of knowledge, which allow in particular to reach the anonymity property. More precisely, I will propose a new range proof system and next give the first comparison between all existing solutions to this problem. Then, I will describe a new method to verify a set of ``Groth-Sahaï'' proofs, which significantly decreases the verification time for such proofs.In a second part, I will consider sanitizable signatures which allow, under some conditions, to manipulate (we say ``sanitize'') a signed message while keeping a valid signature of the initial signer. I will first propose a new scheme in the classical case. Next, I will introduce several extensions which enable the signer to obtain better control of the modifications done by the ``sanitizer''. In particular, I will propose a new security model taking into account these extensions and give different schemes achieving those new properties.Finally, I will present different applications of the above cryptographic tools that enhance customer privacy. In particular, I will consider the questions of subscription, use and billing of services and also address the issue of managing protected content in a hierarchical group
Machara, Marquez Samer. "Models and algorithms for managing quality of context and respect for privacy in the Internet of Things". Electronic Thesis or Diss., Université Paris-Saclay (ComUE), 2015. http://www.theses.fr/2015SACLL005.
Texto completoThe Internet of Things (IoT) is a novel paradigm, which basic idea is the pervasive presence around us of a variety of things or objects that are able to interact with each other and cooperate with their neighbors by sharing data, directly acquired by measuring some facts, in order to reach common goals. This information not only represents the state of users but also the processes in which they are involved, this is called the Context. The context informs both recognition and mapping operations by providing a structured, unified view of the world in which a system operates. With the IoT, many applications consume context information concerning users (context owners) such as, daily routines, behaviors and health, offering lots of benefits to users, but compromising their privacy. The re-search problematic of this thesis lies within the “semantic-oriented” IoT vision. In this context, semantic technologies play a key role in exploiting appropriate modelling solutions for integrating privacy security into the IoT. Context-aware applications and services (context consumers) expect correct and reliable context data to adapt their functionalities. In this thesis the Quality of Context (QoC) is meta-data attached to context information describing a range of criteria that express context information quality. These meta-data can be used to determine the worth of the information for a particular application in a particular situation. We explore middleware and framework solutions to integrate the management of privacy and QoC in the IoT. This thesis is distinguished from other context management domain researches by bearing in mind the decoupling of the IoT participants, i.e., the owners of context information and the consumers of this context information. Moreover, we consider the QoC as a factor affecting the privacy of individuals. This thesis provides the following contributions along two axis: 1. Designing a Context Contract Meta-model to define privacy and QoC concerns of decoupled context owners and context consumers based on reciprocal trust. This design is based on two points. Firstly, we consider that privacy is the capacity of context owners to control what, how, when, where and with whom to share information. Therefore, we identify four privacy dimensions (purpose, visibility, retention, QoC), and use them in the definition of access policies and obligations. Secondly, context consumers expect a certain QoC level in order to perform their tasks. We then propose to define two kinds of context contract for the producer and the consumer sides as follows: Context producer contract: A context contract whose clauses are expressions of the production of context data, of privacy requirements, and of QoC guarantees; Context consumer contract: A context contract whose clauses are expressions of the consumption of context data, of QoC requirements, and of privacy guarantees. Each context contract is created without the knowledge of is counter party.2. Proposing an algorithm to create agreements among context producers and context consumers by evaluating and compare requirements against guarantees, stated on their respective context contracts. As both IoT participants have symmetric contracts, when one participant defines its requirements, the other one defines its guarantees. The matching process of these context contracts verifies if the requirements of one party are included within the guarantees offered by the other party. Therefore, taking a decision based on this compatibility match from the producer point of view is to permit or deny the access to context data. Complementarily, from a consumer point of view, the consumption of context data is permitted or denied. From this definition, we designed algorithms to determine whether access and consumption are authorized or not, according to the context contracts matching
Arfaoui, Ghada. "Conception de protocoles cryptographiques préservant la vie privée pour les services mobiles sans contact". Thesis, Orléans, 2015. http://www.theses.fr/2015ORLE2013/document.
Texto completoThe increasing number of worldwide mobile platforms and the emergence of new technologies such as the NFC (Near Field Communication) lead to a growing tendency to build a user's life depending on mobile phones. This context brings also new security and privacy challenges. In this thesis, we pay further attention to privacy issues in NFC services as well as the security of the mobile applications private data and credentials namely in Trusted Execution Environments (TEE). We first provide two solutions for public transport use case: an m-pass (transport subscription card) and a m-ticketing validation protocols. Our solutions ensure users' privacy while respecting functional requirements of transport operators. To this end, we propose new variants of group signatures and the first practical set-membership proof that do not require pairing computations at the prover's side. These novelties significantly reduce the execution time of such schemes when implemented in resource constrained environments. We implemented the m-pass and m-ticketing protocols in a standard SIM card: the validation phase occurs in less than 300ms whilst using strong security parameters. Our solutions also work even when the mobile is switched off or the battery is flat. When these applications are implemented in TEE, we introduce a new TEE migration protocol that ensures the privacy and integrity of the TEE credentials and user's private data. We construct our protocol based on a proxy re-encryption scheme and a new TEE model. Finally, we formally prove the security of our protocols using either game-based experiments in the random oracle model or automated model checker of security protocols
Machara, Marquez Samer. "Models and algorithms for managing quality of context and respect for privacy in the Internet of Things". Thesis, Université Paris-Saclay (ComUE), 2015. http://www.theses.fr/2015SACLL005/document.
Texto completoThe Internet of Things (IoT) is a novel paradigm, which basic idea is the pervasive presence around us of a variety of things or objects that are able to interact with each other and cooperate with their neighbors by sharing data, directly acquired by measuring some facts, in order to reach common goals. This information not only represents the state of users but also the processes in which they are involved, this is called the Context. The context informs both recognition and mapping operations by providing a structured, unified view of the world in which a system operates. With the IoT, many applications consume context information concerning users (context owners) such as, daily routines, behaviors and health, offering lots of benefits to users, but compromising their privacy. The re-search problematic of this thesis lies within the “semantic-oriented” IoT vision. In this context, semantic technologies play a key role in exploiting appropriate modelling solutions for integrating privacy security into the IoT. Context-aware applications and services (context consumers) expect correct and reliable context data to adapt their functionalities. In this thesis the Quality of Context (QoC) is meta-data attached to context information describing a range of criteria that express context information quality. These meta-data can be used to determine the worth of the information for a particular application in a particular situation. We explore middleware and framework solutions to integrate the management of privacy and QoC in the IoT. This thesis is distinguished from other context management domain researches by bearing in mind the decoupling of the IoT participants, i.e., the owners of context information and the consumers of this context information. Moreover, we consider the QoC as a factor affecting the privacy of individuals. This thesis provides the following contributions along two axis: 1. Designing a Context Contract Meta-model to define privacy and QoC concerns of decoupled context owners and context consumers based on reciprocal trust. This design is based on two points. Firstly, we consider that privacy is the capacity of context owners to control what, how, when, where and with whom to share information. Therefore, we identify four privacy dimensions (purpose, visibility, retention, QoC), and use them in the definition of access policies and obligations. Secondly, context consumers expect a certain QoC level in order to perform their tasks. We then propose to define two kinds of context contract for the producer and the consumer sides as follows: Context producer contract: A context contract whose clauses are expressions of the production of context data, of privacy requirements, and of QoC guarantees; Context consumer contract: A context contract whose clauses are expressions of the consumption of context data, of QoC requirements, and of privacy guarantees. Each context contract is created without the knowledge of is counter party.2. Proposing an algorithm to create agreements among context producers and context consumers by evaluating and compare requirements against guarantees, stated on their respective context contracts. As both IoT participants have symmetric contracts, when one participant defines its requirements, the other one defines its guarantees. The matching process of these context contracts verifies if the requirements of one party are included within the guarantees offered by the other party. Therefore, taking a decision based on this compatibility match from the producer point of view is to permit or deny the access to context data. Complementarily, from a consumer point of view, the consumption of context data is permitted or denied. From this definition, we designed algorithms to determine whether access and consumption are authorized or not, according to the context contracts matching
Beauchamps, Anne. "Des garanties aux atteintes à la liberté individuelle". Nice, 2000. http://www.theses.fr/2000NICE0049.
Texto completoThe most fundamental aspect of freedom is the safety right. The coercive mesure must be forecast by the law and have to be accompanied by a decision of a tribunal. However, in many cases a government official, the Prefect, can decide to detain someone. The preservation of public order can justify this faculty but the legislator have to regulate the conflict of two opposite interests. Many garantees must preserve the dignity of a personn and prevent from the arbitrary detention. Two ways have to be followed : on the one hand, a new and best application of rights, on the other hand, a much improved judicial review
Toulieux, Fabrice. "Le droit au respect de la vie familiale des étrangers et l'article 8 de la convention européenne des droits de l'homme". Lyon 3, 2008. https://scd-resnum.univ-lyon3.fr/out/theses/2008_out_toulieux_f.pdf.
Texto completoIn its initial version, the Convention for the protection of Human rights and fundamental freedoms doesn’t guarantee foreigners either a right of entry and residence on the territory of a Member State or a protection against an expulsion measure. However, since decisions concerning aliens police may infringe the right to respect for family life that the article 8 of the Convention protects, both european and french case-law admit that litigation on aliens police enters the scope of this article. To benefit from this protection, the foreigner must prove that the measure in question, taken by public authorities, constitutes an interference with his family life. Invasions of family life are accepted only if, in accordance with the law and seeking a rightful purpose aimed at in the second section of the article 8, they are necessary in a democratic society. Otherwise, public authorities have to make up for the disproportionate infringement, adopting the more suitable measure to realise or maintain the family unity on the french territory. Regardless of national law, which enables foreigners to enjoy a right of entry and residence in France or a protection against an epulsion measure, interested parties can obtain recognition of such rights on the basis of the article 8 of the European Convention. Foreigners can therefore equally put forward national law or Europena Huma, rights law
He, Kun. "Content privacy and access control in image-sharing platforms". Thesis, CentraleSupélec, 2017. http://www.theses.fr/2017CSUP0007.
Texto completoIn recent years, more and more users prefer to share their photos through image-sharing platforms. Most of platforms allow users to specify who can access to the images, it may result a feeling of safety and privacy. However, the privacy is not guaranteed, since at least the provider of platforms can clearly know the contents of any published images. According to some existing researches, encrypting images before publishing them, and only the authorised users who can decrypt the encrypted image. In this way, user’s privacy can be protected.There are three challenges when proposing an encryption algorithm for the images published on image-sharing platforms: the algorithm has to preserve image format (e.g. JPEG image) after encryption, the algorithm should be secure (i.e. the adversary cannot get any information of plaintext image from the encrypted image), and the algorithm has to be compatible with basic image processing in each platform. In this thesis, our main goal is to propose an encryption algorithm to protect JPEG image privacy on different image-sharing platforms and overcome the three challenges. We first propose an encryption algorithm which can meet the requirements of the first two points. We then implement this algorithm on several widely-used image-sharing platforms. However, the results show that it cannot recover the plaintext image with a high quality after downloading the image from Facebook, Instagram, Weibo and Wechat. Therefore, we add the correcting mechanism to improve this algorithm, which reduces the losses of image information during uploading the encrypted image on each platform and reconstruct the downloaded images with a high quality
Laliberté, Bianca. "La droit à la protection de la vie privée et au respect de la confidentialité des dossiers de thérapie des plaignantes dans le cadre des procès pour infractions d'ordre sexuel, une utopie". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape15/PQDD_0009/MQ35691.pdf.
Texto completoEl, jaouhari Saad. "A secure design of WoT services for smart cities". Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2018. http://www.theses.fr/2018IMTA0120/document.
Texto completoThe richness and the versatility of WebRTC, a new peer-to-peer, real-time and browser based communication technology, allowed the imagination of new and innovative services. In this thesis, we analyzed the capabilities required to allow a participant in a WebRTC session to access the smart Things belonging to his own environment as well as those of any other participant in the same session. The access to such environment, which we call “SmartSpace (SS)”, can be either passive, for example by monitoring the contextual information provided by the sensors, or active by requesting the execution of commands by the actuators, or a mixture of both. This approach deserves attention because it allows solving in an original way various issues such as allowing experts to remotely exercise and provide their expertise and/or knowing how. From a technical point of view the issue is not trivial because it requires a smooth and mastered articulation between two different technologies: WebRTC and the Internet of Things (IoT) /Web of Things (WoT). Hence, the first part of the problem studied in this thesis, consists in analyzing the possibilities of extending WebRTC capabilities with theWoT. So as to provide a secure and privacy-respectful access to the various smart objects located in the immediate environment of a participant to any otherend-user involved in the same ongoing WebRTC session. This approach is then illustrated in the ehealth domain and tested in a real smart home (a typical example of a smart space). Moreover,positioning our approach in the context of communication services operating in smart cities requires the ability to support a multiplicity of SSs,each with its own network and security policy. Hence,in order to allow a participant to access one of his own SSs or one of another participant (through a delegation of access process), it becomes necessary to dynamically identify, select, deploy, and enforce the SS’s specific routing and security rules, so as to have an effective, fast and secure access. Therefore, the second part of the problem studied in this Ph.D.consists in defining an efficient management of the routing and security issues regarding the possibility of having multiple SSs distributed over the entire network
Champion, Pierre. "Anonymizing Speech : Evaluating and Designing Speaker Anonymization Techniques". Electronic Thesis or Diss., Université de Lorraine, 2023. http://www.theses.fr/2023LORR0101.
Texto completoThe growing use of voice user interfaces, from telephones to remote controls, automobiles, and digital assistants, has led to a surge in the collection and storage of speech data. While data collection allows for the development of efficient tools powering most speech services, it also poses serious privacy issues for users as centralized storage makes private personal speech data vulnerable to cyber threats. Advanced speech technologies, such as voice-cloning and personal attribute recognition, can be used to access and exploit sensitive information. Voice-cloning technology allows an attacker to take a recording of a person's voice and use it to generate new speech that sounds like it is coming from that person. For example, an attacker could use voice-cloning to impersonate a person's voice to gain unauthorized access to his/her financial information over the phone. With the increasing use of voice-based digital assistants like Amazon's Alexa, Google's Assistant, and Apple's Siri, and with the increasing ease with which personal speech data can be collected and stored, the risk of malicious use of voice-cloning and speaker/gender/pathological/etc. recognition technologies have increased. Companies and organizations need to consider these risks and implement appropriate measures to protect user data in order to prevent misuse of speech technologies and comply with legal regulations (e.g., General Data Protection Regulation (GDPR)). To address these concerns, this thesis proposes solutions for anonymizing speech and evaluating the degree of the anonymization. In this work, anonymization refers to the process of making personal speech data unlinkable to an identity, while maintaining the usefulness (utility) of the speech signal (e.g., access to the linguistic content). The goal is to protect the privacy of individuals by removing or obscuring any Personally Identifiable Information (PPI) from the acoustic of speech. PPI includes things like a person's voice, accent, and speaking style; other personal information in the speech content like, phone number, person name, etc., is out of the scope of this thesis. Our research is built on top of existing anonymization methods based on voice conversion and existing evaluation protocols. We start by identifying and explaining several challenges that evaluation protocols need to consider to evaluate the degree of privacy protection properly. We clarify how anonymization systems need to be configured for evaluation purposes and highlight the fact that many practical deployment configurations do not permit privacy evaluation. Furthermore, we study and examine the most common voice conversion-based anonymization system and identify its weak points, before suggesting new methods to overcome some limitations. We isolate all components of the anonymization system to evaluate the degree of speaker PPI associated with each of them. Then, we propose several transformation methods for each component to reduce as much as possible speaker PPI while maintaining utility. We promote anonymization algorithms based on quantization-based transformation as an alternative to the most-used and well-known noise-based approach. Finally, we endeavor a new attack method to invert the anonymization, creating a new threat. In this thesis, we openly work on sharing anonymization systems and evaluation protocols to aid organizations in facilitating the preservation of privacy rights for individuals
Marino, Laure. "Responsabilité civile et activité d'information". Montpellier 1, 1995. http://www.theses.fr/1995MON10041.
Texto completoIn a dualistic analysis using juridical categories, information is apprehended as a value (porperty right) and as an activity (obligations right). In this second prospect, information activity, breaking up in two stages (intellectual creation and diffusion), is capable of instituting the liability of the different intermediates. The study of the action in liability (interest to act and basis of claim( and of the compensation right (through conditions and effects of liability), allows to see how a special condition that the fundamental fact is distinct of an infringement, it allows to avoid the contraining rules of penal procedure and to extend the incriminating field. The product liability directive (july 1985) must be excluded ; on the contrary, contractual and tort liability must be treated. In both cases, duties are mainly jurisprudential based and practically comparable. The duty of objectivity (devoir d'objectivite) and the duty of respect of other people'rights (devoir de respect des droits d'autrui) are the two ways to considering the matter. The duty of objectivity is a professional typed duty of means (devoir de moyens) common to all informations. When the informations ae personal, duty of respect of personality rights (droits de la personnalite), duty with results (devoir de resultat), completes it. The fault is then a violation of one of these duties. The compensable damage must be directly caused by the fact and injustified. The justificating facts are explained themselves by the victim's assent or by the position of the instigator who acts within the framework of a freedom of information. The compensation of the damage, often moral, is not easy; the private penalty must be rejected
Guittet, Leo. "La transparence des données de santé issues des bases médico-administratives : Pour une ouverture des bases de données respectueuse de la vie privée". Thesis, Lyon, 2019. http://www.theses.fr/2019LYSE3028.
Texto completoDigitized data is an integral part of our daily lives. Among them, personal health data represent a particularly sensitive group which must be processed and shared with care because they contain information relating to the private lives of individuals. They are therefore subject to special protection as a matter of principle. But at the same time, they are highly coveted because of their potential to improve the entire healthcare system. In France, two major historical databases, SNIIRAM and PMSI, are dedicated to the collection and processing of health data. Although these databases do not contain any personally identifying information, they have long been accessible only under very strict conditions, sometimes difficult to understand, in the name of respect for the privacy of individuals. However, difficult access to these databases represents a proven loss of knowledge, and legal and technical means exist to ensure data security and the right to privacy of individuals. It is for this reason in particular that the procedures for accessing the personal health data contained in these databases have been completely reformed and continue to be reformed. To fully understand the process that led to the recent opening of medico-administrative databases, this study focuses on how access to these data has worked from their creation to the present day. With regard to the types of access that exist, this requires positioning oneself from three angles: that of privileged public actors who benefit from permanent access; that of ordinary public actors and private non-profit actors who can access certain data by complying with a prior authorization regime; and that of private for-profit actors who were first excluded from access to health data before finally being admitted. The evolution of access to this sensitive data is still a headlining topic due to a further reform of the governance of medico-administrative databases and their content. This new project aims to ensure that the protection of the right to privacy is combined with the widest possible access to as much health data as possible
Nuñez, del Prado Cortez Miguel. "Inference attacks on geolocated data". Thesis, Toulouse, INSA, 2013. http://www.theses.fr/2013ISAT0028/document.
Texto completoIn recent years, we have observed the development of connected and nomad devices suchas smartphones, tablets or even laptops allowing individuals to use location-based services(LBSs), which personalize the service they offer according to the positions of users, on a dailybasis. Nonetheless, LBSs raise serious privacy issues, which are often not perceived by the endusers. In this thesis, we are interested in the understanding of the privacy risks related to thedissemination and collection of location data. To address this issue, we developed inferenceattacks such as the extraction of points of interest (POI) and their semantics, the predictionof the next location as well as the de-anonymization of mobility traces, based on a mobilitymodel that we have coined as mobility Markov chain. Afterwards, we proposed a classificationof inference attacks in the context of location data based on the objectives of the adversary.In addition, we evaluated the effectiveness of some sanitization measures in limiting the efficiencyof inference attacks. Finally, we have developed a generic platform called GEPETO (forGEoPrivacy Enhancing Toolkit) that can be used to test the developed inference attacks
Nunez, Del Prado Cortez Miguel. "Attaques d'inférence sur des bases de données géolocalisées". Phd thesis, INSA de Toulouse, 2013. http://tel.archives-ouvertes.fr/tel-00926957.
Texto completoVibrac, Geoffrey. "Le corps et la preuve pénale". Thesis, Université de Lorraine, 2019. http://docnum.univ-lorraine.fr/ulprive/DDOC_T_2019_0230_VIBRAC.pdf.
Texto completoThe purpose of each trial is to determine a judicial truth. For that, it is necessary to bring different proofs which will lead to preserve the social order, regarding civilian law as well as criminal law. The body does not escape such an objective : yesterday as today, it was and it is used for probative purposes. However, while it has been abused to obtain usefull information for a procedure throwghout history, it is now, theoretically, subject to multiple protections both national and supranational. Thus, the latter, remains a tremendos object of probative investigation, very talkative, which leads to obtain information considered more and more reliable and above all, discriminating (and this, whatever its form: global body or a simple detached element of this material human reality). So far, the visual observation of a person is not always enough for the body to become proof : body proof is mainly a scientific evidence and the growing growth of science allows an easy development of it. This is how our judicial procedures are increasingly appealing to the scientist: the scientist is a strong ally to "make the body speak" and he provides real support to the magistrate. In any case, it is necessary that a fair balance be found between the preservation of the general interest and the individual protection of the person and his body
Mittal, Nupur. "Data, learning and privacy in recommendation systems". Thesis, Rennes 1, 2016. http://www.theses.fr/2016REN1S084/document.
Texto completoRecommendation systems have gained tremendous popularity, both in academia and industry. They have evolved into many different varieties depending mostly on the techniques and ideas used in their implementation. This categorization also marks the boundary of their application domain. Regardless of the types of recommendation systems, they are complex and multi-disciplinary in nature, involving subjects like information retrieval, data cleansing and preprocessing, data mining etc. In our work, we identify three different challenges (among many possible) involved in the process of making recommendations and provide their solutions. We elaborate the challenges involved in obtaining user-demographic data, and processing it, to render it useful for making recommendations. The focus here is to make use of Online Social Networks to access publicly available user data, to help the recommendation systems. Using user-demographic data for the purpose of improving the personalized recommendations, has many other advantages, like dealing with the famous cold-start problem. It is also one of the founding pillars of hybrid recommendation systems. With the help of this work, we underline the importance of user’s publicly available information like tweets, posts, votes etc. to infer more private details about her. As the second challenge, we aim at improving the learning process of recommendation systems. Our goal is to provide a k-nearest neighbor method that deals with very large amount of datasets, surpassing billions of users. We propose a generic, fast and scalable k-NN graph construction algorithm that improves significantly the performance as compared to the state-of-the art approaches. Our idea is based on leveraging the bipartite nature of the underlying dataset, and use a preprocessing phase to reduce the number of similarity computations in later iterations. As a result, we gain a speed-up of 14 compared to other significant approaches from literature. Finally, we also consider the issue of privacy. Instead of directly viewing it under trivial recommendation systems, we analyze it on Online Social Networks. First, we reason how OSNs can be seen as a form of recommendation systems and how information dissemination is similar to broadcasting opinion/reviews in trivial recommendation systems. Following this parallelism, we identify privacy threat in information diffusion in OSNs and provide a privacy preserving algorithm for the same. Our algorithm Riposte quantifies the privacy in terms of differential privacy and with the help of experimental datasets, we demonstrate how Riposte maintains the desirable information diffusion properties of a network
Pfeiff, Silvia. "La portabilité du statut personnel dans l'espace européen: De l’émergence d’un droit fondamental à l’élaboration d’une méthode de la reconnaissance". Doctoral thesis, Universite Libre de Bruxelles, 2016. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/229680.
Texto completoDoctorat en Sciences juridiques
info:eu-repo/semantics/nonPublished
Legendre, Rebecca. "Droits fondamentaux et droit international privé : Réflexion en matière personnelle et familiale". Electronic Thesis or Diss., Paris 2, 2018. https://buadistant.univ-angers.fr/login?url=https://bibliotheque.lefebvre-dalloz.fr/secure/isbn/9782247201181.
Texto completoFundamental rights put private international law to the test. First, the context in which private international law operates has evolved. Fundamental rights have created a better, closer, intertwining of the separate state legal orders and have achieved a higher protection for the persons as they experience international mobility. If this evolution does not threaten, as such, the existence of private international law, it must be acknowledged that fundamental rights modify its analysis. Whereas the conflicts between legal orders are transformed into conflicts between values, the hierarchy of interests protected by private international law is replaced by a balancing of these interests. The solutions of private international law are thus disrupted by the enforcement of fundamental rights through litigation. Proportionality is at the source of this disruption. Being a case by case technique of enforcement of fundamental rights, the influence of the proportionality test on private international is uneven. If the proportionality test is found to be overall indifferent to the methods of private international law, its main impact is on the solutions of PIL. The European courts are indeed prone to favour the continuity in the legal situations of the persons, over the defence of the internal cohesion of the state legal orders. As a consequence, private international law is invited to reach liberal solutions. The enforcement of fundamental rights through litigation must hence be clarified so as to maintain a mesure of authority and predictability of the solutions of the rules of conflict of laws, international jurisdiction and recognition of foreign judgements. It is, on the one hand, by methodologically dissociating the enforcement of fundamental rights from the public policy exception and, on the other hand, through an amendment to the proportionality test, that the balance of private international may hopefully be restored
Legendre, Rebecca. "Droits fondamentaux et droit international privé : Réflexion en matière personnelle et familiale". Thesis, Paris 2, 2018. http://www.theses.fr/2018PA020074.
Texto completoFundamental rights put private international law to the test. First, the context in which private international law operates has evolved. Fundamental rights have created a better, closer, intertwining of the separate state legal orders and have achieved a higher protection for the persons as they experience international mobility. If this evolution does not threaten, as such, the existence of private international law, it must be acknowledged that fundamental rights modify its analysis. Whereas the conflicts between legal orders are transformed into conflicts between values, the hierarchy of interests protected by private international law is replaced by a balancing of these interests. The solutions of private international law are thus disrupted by the enforcement of fundamental rights through litigation. Proportionality is at the source of this disruption. Being a case by case technique of enforcement of fundamental rights, the influence of the proportionality test on private international is uneven. If the proportionality test is found to be overall indifferent to the methods of private international law, its main impact is on the solutions of PIL. The European courts are indeed prone to favour the continuity in the legal situations of the persons, over the defence of the internal cohesion of the state legal orders. As a consequence, private international law is invited to reach liberal solutions. The enforcement of fundamental rights through litigation must hence be clarified so as to maintain a mesure of authority and predictability of the solutions of the rules of conflict of laws, international jurisdiction and recognition of foreign judgements. It is, on the one hand, by methodologically dissociating the enforcement of fundamental rights from the public policy exception and, on the other hand, through an amendment to the proportionality test, that the balance of private international may hopefully be restored
Benet, Alain. "Analyse critique du "Droit" au respect de la vie privée contribution à l'étude des libertés civiles". Lille 3 : ANRT, 1986. http://catalogue.bnf.fr/ark:/12148/cb37594489q.
Texto completoSmith, Nicholas. "Private Rule Following and the Principle of Respect for Autonomy". Ohio University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1429884767.
Texto completoPagani, Margherita. "The Role of consumer experiential engagement in new media based social networks environnments : implications for marketing strategies". Thesis, Lyon 3, 2015. http://www.theses.fr/2014LYO30091.
Texto completoThe thesis aims to understand how companies can leverage on consumer experiential engagement in new-media based social media environments (using video on the web, handheld devices and web 2.0) in order to stimulate active behavior and redefine commercial marketing strategies. We structure our analysis on a three studies approach. The first study describes how Personal Engagement with the content and Social-Interactive Engagement (resulting from the perceived sense of community, intrinsic enjoyment and participation experience) differently influence both active and passive behavior. We test hypotheses with survey data from a sample of 814 US and EU social TV users. In study 2 we examine the influence of privacy intrusiveness on the relation between Experiential Engagement (Personal and Social-interactive Engagement) and active and passive use and we test it (n=379) with reference to mobile location-based social networking applications in EU and US. In study 3 we develop a conceptual model in which social-interactive engagement influences social identity directly and brand love indirectly through the mediating effect of social identity. The model was empirically validated (n=387) on the Facebook fan pages of 20 leading international brands in EU and the US. Findings emerging from the three studies show that Experiential Engagement has positive effects on the consumer behavior online (active and passive) and it may contrast the negative effect of privacy intrusiveness. The results obtained show also a positive effects of social-interactive engagement on consumer-brand affective relationships (brand love) and the full mediating effect of social identity. More specifically advertisers, leveraging on experiences that influence social-interactive engagement can influence the social identity and the relationship with the brand
Laliberté, Bianca. "Le Droit à la protection de la vie privée et au respect de la confidentialité des dossiers de thérapie des plaignantes dans le cadre des procès pour infractions d'ordre sexuel une utopie". Sherbrooke : Université de Sherbrooke, 1998.
Buscar texto completoPrasong, Orapim. "La protection des droits de l'enfant par la Cour européenne des droits de l'homme". Thesis, Bordeaux, 2016. http://www.theses.fr/2016BORD0137/document.
Texto completoAlthough not originally designed as a child-centered Convention, the EuropeanConvention on Human Rights generated through the dynamic interpretation of the European Courtof Human Rights, the most abundant case law of all the instruments of this type on the rights of thechild. With a favorable legal space to protect child’s rights, the European Court lacks a text onwhich it can base an interpretation on. That is why it mainly refers to the Convention on the Rightsof the Child, which is the most detailed and the most suitable Convention for protecting child’srights specifically. Through the mobilization of the UN Convention on child's rights and theintegration of the concept of the best interest of the child contained in this instrument in itsreasoning, the European Court uses this Convention as a tool to construct its own case law on thespecific protection of child’s rights. But if the integration of this Convention in the reasoning of theEuropean Court is a factor of harmonization to the extent that it encourages the Member States ofthe Council of Europe to implement the international treaty while providing a commoninterpretation its provisions, no absolute uniformity is required. The study of the European Court’scase law underlines its growing will to make the European Convention on Human Rights asubsidiary conventional instrument to child’s rights protection
Shulga-Morskaya, Tatiana. "La démocratie électronique, une notion en construction". Thesis, Bordeaux, 2017. http://www.theses.fr/2017BORD0958.
Texto completoRepresentative democracy remains essentially a representative government that was created precisely to avoid all the citizens to participate directly in political decision-making. Implementation of direct participation’s instruments in form of e-democracy creates a conflict within this government, a conflict which can be solved only by a renewal of representative democracy concept, even its substitution by another idea committed to reconciling representation and participation. This thesis aims a reflection on a concept of government capable of integrating e-democracy.Such an integration highlights the interdependent character of the link between democracy and human rights that are exposed to totally new threats in the digital era. The possibility to introduce e-democracy is conditional upon the reinforced protection of such essential rights and freedoms: as freedom of expression and right to respect for private and family life in the digital environment, as well as recognition of new rights based on personal self-determination. Implementation of e-democracy can also challenge well-established concepts such as majority principle or require their reconsideration, as in the case of good governance
Giroud, Clémentine. "Les registres médicaux et la confidentialité". Thèse, 2003. http://hdl.handle.net/1866/2531.
Texto completoMedical registries are databases which record aIl cases of a specifie disease found in a given area. Registries provide vital information for public health research and for the implementation of appropriate public policies. The question is : How does the regulation of privacy apply to registries? Legislation currently in force in the province of Quebec requires the consent of a patient in order to inc1ude personal information in the registry. Personal health data in a registry have to be protected to preserve the privacy of research subjects. To ensure data security and confidentiality sorne measures must be taken during their conservation. Secondary use of data is possible under certain conditions aimed at protecting the right to privacy. It is possible to use such personal information again for other purposes even if the data need to be transferred to another national or foreign database.
"Mémoire présenté à la Faculté des études supérieures en vue de l'obtention du grade de Maîtrise en LL.M. Droit - Recherche option Droit, Biotechnologies et Sociétés"