Tesi sul tema "Protection de l'information (informatique) – Droit international"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Protection de l'information (informatique) – Droit international".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.
Florimond, Guillaume. "Droit et internet : approche comparatiste et internationaliste du monde virtuel". Nantes, 2013. http://www.theses.fr/2013NANT4009.
Testo completoGhaibi, Dhia Moslem Abd Alameer. "La protection pénale de la sécurité de l’information en Irak : Etude juridique au niveau national et international". Thesis, Lille, 2018. http://www.theses.fr/2018LIL2D013.
Testo completoThe security of information and communication technologies (ICT) and the issue of cybercrime has been a concern for some time. It is only in the recent past that governments have begun to understand the importance of ICT security. Computer crime, like any form of crime, is hard to quantify, and cybercrime may be the least reported form of criminal behavior since the victim often does not know that an offense has even occurred. In addition, the lack of cybersecurity solutions and the lack of common understanding make legal difficulties both nationally and internationally. It is doubtful that common law standards, including those of the criminal law, are sufficient, on the one hand to cover the needs of an effective criminal policy and, on the other hand, the need to deal with the diversity of crimes and the continual evolution of their means. Iraq, like some countries, has suffered information system breaches. But how can Iraq cope with the issues of cybercrime? Are traditional laws sufficient to frame cybersecurity? Does Iraq need new legal rules? In this respect, the contribution of international law is important for the fight against cybercrime. International cyber security conventions and pioneer legislation in this area can inspire the Iraqi legislator. The purpose of this research topic is, in the light of international law, to provide effective legal protection and to develop Iraq's legal framework for cybersecurity
Favero, Luca. "La dimension externe de la protection des données à caractère personnel dans le droit de l'Union européenne". Thesis, Strasbourg, 2013. http://www.theses.fr/2013STRAA012.
Testo completoThis doctoral thesis deals with the external dimension of the protection of personal data, thus of the mechanisms by which the law of the European Union ensures an adequate level of protection to the personal data that are transferred to third countries. Under this perspective, the aim of the thesis is to underline the achievements of what amounts to a “legislative foreign policy” of the European Union aimed at the protection of personal data as a fundamental right of the individuals
Renaudin, Klervi. "Le spamming et le droit : analyse critique et prospective de la protection juridique des "spammés"". Phd thesis, Université de Grenoble, 2011. http://tel.archives-ouvertes.fr/tel-00821146.
Testo completoZwolinska, Monika. "Sécurité et libertés fondamentales des communications électroniques en droit français, européen et international". Thesis, Nice, 2015. http://www.theses.fr/2015NICE0038/document.
Testo completoThe impact of today’s information and communication technologies is essential forthe exercice of human rights, particularly concerning freedom of expression and privacyprotection. With the massive use of Internet, mobile phones and – more recently – other smart objects and digital services, the tension mounts with respect to establishing the limit between public and private space online. Likewise, the freedom of expression, communication and information are at risk as - under the pretext of fighting cybercrime and cyber terrorism, as well as maintaining public order - public authorities interfere with online contents by controlling, monitoring, restraining or prohibiting it. Especially as both States’ and private companies’ capacities in creating extremely precise databases identifying information on persons’ consumption habits, itineraries, thoughts and opinions gradually increase. Therefore, the need to redefine the way in which the respect of fundamental freedoms is taken into consideration in the context of digital environment becomes urgent
Khalifa, Otman. "La protection de la vie privée à l’ère des nouvelles technologies : une protection relative". Thesis, Paris 10, 2019. http://www.theses.fr/2019PA100023.
Testo completoThe right to respect private life is a fundamental right, which is fully protected by the provisions of the law and the provisions of the judiciary at the national and international levels. This fundamental nature requires the state to provide effective methods that protect this right against the dangers surrounding it, the most important of which is the threat of modern information and communication technology. The French and European legislators enacted several legislations that would limit the illegal uses of this technology to private life. However, in recent years, justifications for the security and interests of the state have passed legislation authorizing public authorities to use high-tech devices to spy on people's lives and to monitor their private communications without adequate legal safeguards, which has increasingly weakened the scope of privacy protection. Moreover, the dominant Internet companies are now a real threat to the privacy of Internet users. The violations carried out by these companies outweigh the danger of states and legally and realistically exclude the authority of the French and European control bodies. Finally, the actual legal protection mechanisms, in the absence of financial and technical possibilities and the absence of a binding international convention on privacy, would not be able to provide effective legal protection to this fundamental right
Di, Maggio Antonia. "Les atteintes aux systèmes de traitement automatisé de données : harmonisation et coopération en Europe". Electronic Thesis or Diss., Corte, 2022. http://www.theses.fr/2022CORT0014.
Testo completoComputer systems are essential parts of political, social, and economic interaction and have become fundamental for development and innovation. However, these systems are as many resources as they can be a threat to the security, the rights and the freedoms of users. Indeed, attacks on automated data processing systems consist in various criminal processes, carried out by several categories of offenders and affecting many different victims such as individuals, companies, or even States. The study of the punishment of such offences leads us to the question of the relevance of French legislation concerning that through a double examination. The first one, on the one hand, consisting of comparing, through a horizontal analysis, the substantive and formal special criminal law, from the angle of comparative law (Belgium and Italy), and, on the other hand, in examining, through a vertical analysis, their consistency with European standards. From this point of view, the study discloses the existence of a legislative corpus which is dense but also unclear because of its technicality. The study also notes that there is a fragile border in procedural matters regarding to the development of techniques which are effective but also likely to affect individual freedoms. The second examination focuses on the overall policy implemented by States to prevent and combat these computer attacks. On this point, cooperation between States is a corollary of the effectiveness of repression in this area. However, in practice, the choices made to promote such collaboration encounter major application difficulties. Added to these difficulties are those linked to the commission of cyberattacks by the States themselves, since cyberspace now appears as a new field of political and military conflict. That being stated, while it seemed that these state cyberattacks were carried out in an area of lawlessness, it turns out, on the contrary, that criminal law has a certain potential for their repression
Hubschwerlin, Marie-Odile. "Utilisation des données continues dans le système d'information Schengen : analyse des tensions entre système d'information Schengen, système commun, et disparités dans l'utilisation de ce système". Strasbourg, 2010. http://www.theses.fr/2010STRA4010.
Testo completoThe Schengen Information System’s (SIS) strategic objectives are the protection of public order and security; to ensure the good implementation of the provisions on free movement as well as the management of migratory flows. Legislative acts telling us who are the people that can enter an alert in the system and consult the available data on it allow for a theoretical achievement of these objectives. The same goes for people and objects that can be subject to an alert and the consequences of such an alert. Yet, the example of the United Kingdom - and its "personal" use of the file - undermines the realization of these objectives and creates tensions. This is not an isolated case; this practice is common to all Member States who give prevalence to their interests over strategic objectives of the SIS. The SIS efficiency could therefore be jeopardized. Facts show that its objectives could only be successfully achieved through a homogeneous use of the SIS (by the Schengen Member States). As these objectives are crucial for states, its successes only make the SIS more attractive. The Swiss example clearly illustrates that the SIS is essential. Efficiency problems cannot carry on. Can the SIS II be a solution? What about grouping together the SIS with Eurodac and the VIS? Among other things the increase of data, technological improvements do not end issues with data quality, disparity of the use of SIS and unfamiliarity with the system. Tensions continue. The success of the SIS relies on a homogenous use; in order to wipe out tensions training of its users is essential
Bouthier, Corinne. "Le droit comme outil de développement du commerce électronique". Thesis, Lyon, 2019. http://www.theses.fr/2019LYSES049.
Testo completoE-commerce is considered to be a source of economic growth. If it has developed thanks to the new information and communication technologies, a legal framework is nevertheless needed to promote its growth. Our study will seek, by considering the multiple sources of regulation, mainly European and national, to demonstrate that the latter is oriented along two main axes: ensuring, on the one hand, the freedom of electronic commerce, and, on the other, confidence in this new mode of commerce. We shall establish that the freedom of its exercise cannot be absolute, and that this is indissociable from the interest of the consumer. As soon as a legal framework is absent or inappropriate, the freedom of e-commerce is weakened. Finally, the study will focus on the rules that create the confidence of the participants in e-commerce: their joint confidence in electronic transactions secured within a legal framework; their singular trust, regarding their respective interests, whether it concerns the protection of the intangible assets of the company, or the consent of e-consumers, during their act of purchase as well as in the processing of their personal data
Laspiti, Vassiliki. "La coopération Europe-Etats-Unis en matière de lutte contre le terrorisme et la protection des libertés". Paris 13, 2013. http://scbd-sto.univ-paris13.fr/secure/ederasme_th_2013_laspiti.pdf.
Testo completoMatet, Benoît. "Multi-source data fusion for the analysis of mobility". Electronic Thesis or Diss., Université Gustave Eiffel, 2024. http://www.theses.fr/2024UEFL2019.
Testo completoThis thesis focuses on generating and using safe and accurate data to describe the mobility of people in an urban environment. The main focus of this work is the Origin-Destination (OD) matrices obtained from mobile phone data, which describe the flows of population between the zones of a city. These data are characterized by huge volumes, which call for light-weight processing solutions, and a high variety, which imply a privacy risk for outliers.In a first part, we develop an algorithm to efficiently guarantee the k-anonymization of such OD matrices via generalization and suppression. Our method implements a hard constraint on the number of trips that can be suppressed, in order to maintain the representativity of the data. The spatial generalization is formalized as a knapsack problem with a dependency tree, whose dual can be efficiently solved using the Some Breakpoints Algorithm. We also study the solving of the relaxation of the problem, which does not guarantee a maximum number of suppressed trips but instead a maximum level of generalization. We compare our approaches to an extensive benchmark of the state of the art in anonymization on a collection of large-scale OD matrices. In a second part, we propose two steps to generate more realistic synthetic travel using dynamic OD matrices. In the first step, we calibrate the temporal distribution of trips made during the day by formalizing it as hierarchical population problem. In the second step, we draw activity locations using the OD matrices as transition probabilities in a probabilistic graph model. We illustrate a pitfall in the estimation of such a model when implementing basic agenda constraints, such as the fact that the ``home'' locations must share the same value. These added dependencies create cycles in the graph which invalidate the direct use of the OD matrices as maximum likelihood estimators. Instead, we propose an heuristic adaptation to estimate the parameters of the model. Then, we implement a variety of approaches corresponding to different trade-offs between matching the OD matrices and matching the surveys. This allows us to give a quantitative measure of the discrepancies between the OD matrices and the HTS, which are known to exist but hard to measure as the two sources do not describe the same objects. This work is part of a context of a recent multiplication of available data sources for transportation studies. In particular, passive sources such as mobile phone data collect traveler's information without input on their part and mostly without their knowing. They carry invaluable insights into the dynamics of transportation networks due to their unequalled penetration rate, but are also an ethic liability due to their monitoring potential. By guaranteeing a foolproof anonymization of the data and illustrating its use in travel demand synthesis, we aim at addressing its problem of privacy while at the same time leveraging it to produce a realistic, exhaustive overview of urban transportation
Combe, Marion. "La protection pénale de l'information". Nice, 2012. http://www.theses.fr/2012NICE0027.
Testo completoInformation is omnipresent in the modern world. Its supports, its modes of spreading, but also the means to harm it never stop diversifying. Criminal law cannot ignore these evolutions. A criminal law approach to the protection of some information has existed for a long time, especially through the use of secrecy. The aim is now to measure the reach and efficiency of this protection, to understand its mechanisms and to underline its incoherencies, especially in the light of the technological evolutions that continually renew its problematic. First of all, it seems that protection of information is incoherent. The criminal matter in this field is obsolete, focusing on a multifaceted protection, because it is imbued with insufficient concepts, of a huge variety and not much theorised; Criminal law is unable to understand the concept of information that is intrinsically immaterial and of a great mobility, which confers to it rather vague borders. Beyond concepts, such a negative statement can be observed in a concrete and practical way in a basic and fundamental field : the criminal protection of information related to the private sphere. Thus, these many inconsistencies are not satisfying. They therefore justified reflection of a rational improvement of the criminal protection of information, in order to increase its efficiency and to bring along some homogeneity into the process of criminal protection. Premises of homogeneity can be found in the protection of information related to the professional sphere. In the light of these interesting premises, modernization of criminal protection is suggested, the aim of which is to develop the efficiency of protection, by the wording of the bases of a modern protection and the suggestion of the conditions of its setting. At the end of the analysis, this approach finally reveals the virtues of property as regards criminal protection
Portier-Duparc, Pascale. "Protection de l'information confidentielle en droit anglais". Montpellier 1, 1998. http://www.theses.fr/1998MON10020.
Testo completoLesaulnier, Frédérique. "L'information nominative". Paris 2, 2005. http://www.theses.fr/2005PA020034.
Testo completoKattan, Imad. "Vie privée et informatique : étude comparative de droit français et droit anglais". Université Robert Schuman (Strasbourg) (1971-2008), 2000. http://www.theses.fr/2000STR30018.
Testo completoIn France, a right of privacy was introduced into the french civil code by the law of 17 july 1970 (a new article 9), which declared that "everyone has the right to trespect for his priv ate life". In England, there is no legal right to privacy as such in the law of England. The protection of privacy is ensured by several cases like (trespass, nuisance, breach of confidence. . . ). The situation of the protection of privacy with regard the computer is different. There is, in France and England, law of data protection with regard to the automatic processing of personal data
Coudray, Ludovic. "La protection des données personnelles dans l'Union européenne". Paris 2, 2005. http://www.theses.fr/2005PA020094.
Testo completoKong, Lingjie. "Législation sur la protection des données personnelles de la Chine : expériences de l'UE et des Etats-Unis". Paris 11, 2010. http://www.theses.fr/2010PA111014.
Testo completoSaunier, Camille, e Camille Saunier. "La protection des données personnelles des utilisateurs d'enceintes connectées «intelligentes» par le Règlement européen no 2016/679, le droit canadien et le droit québécois : approche comparatiste". Master's thesis, Université Laval, 2020. http://hdl.handle.net/20.500.11794/38291.
Testo completoLe présent travail de recherche porte sur la protection des renseignements personnels des utilisateurs d’enceintes connectées « intelligentes ». Au regard de cet objet connecté particulier, l’étude se penchera sur la manière dont la protection des données personnelles est envisagée par le Règlement européen n°2016/679 (RGPD), la Loi sur la protection des renseignements personnels et les documents électroniques (LPRPDE) et la Loi québécoise sur la protection des renseignements personnels dans le secteur privé (LPRPSP) tout au long du cycle de vie de la donnée. Ces différentes législations divergent tant sur leurs dates d’adoption que sur leurs systèmes juridiques. Pourtant, les rapports de faits qui les animent en font une des objets de comparaison particulièrement intéressants. Il ressort de cette étude que l’enceinte connectée « intelligente » met en évidence les insuffisances des législations étudiées vis-à-vis du rapport au temps, de la masse de données collectées mais aussi de l’opacité de la machine.
Jalal, Hind. "L'apport des conventions internationales à la protection juridique des logiciels". Nice, 1996. http://www.theses.fr/1996NICE0037.
Testo completoAlenezi, Mordhi. "Contrat électronique et protection du consommateur en droit français et en droit koweïtien". Strasbourg, 2010. http://www.theses.fr/2010STRA4001.
Testo completoThe interest which dresses the e-commerce in a globalized economy makes no more doubt. Rules applicable to the electronic contract are henceforth known. However when the notion of electronic contract is evoked, it is impossible to neglect the protection of the cyber consumer. He is all the more vulnerable as he is going to make a commitment in a dematerialized and international environment. The guarantee of legal security which owes datum to the cyber consumer gets free throughout the contractual process. The consumer protection has to be made during the offer and the electronic acceptance in particular by the obligation of information and the proof of the consent of the consumer. Secondly, it is made during the execution of the mutual obligations of the parties and during the birth of disputes. These disputes have an international vocation due to the absence of any physical contact of the parties on the Internet network, where from the importance of the determination of the applicable law and that of the competent jurisdiction
Furon, Teddy. "Application du tatouage numérique à la protection de copie". Paris, ENST, 2002. http://www.theses.fr/2002ENST0014.
Testo completoWe consider in this thesis the use of digital watermarking in the copy protection framework for consumer electronics devices. We describe first the copy protection issue. Then, we build the global system with elementary securityparts such as encryption and digital signature. Yet, contrary to common approaches, the role of the watermark hasbeen reduced to the minimum: it is only a flag warning the devices that the content is protected. It is a kind ofsecond line of defence. Watermarking for copy protection is difficult due to two facts: the protected contents arewatermarked with the same key and the pirates have access to a watermark detector. Three kinds of attacks stemfrom these facts: the watermarked contents only attack, the original/watermarked contents attack and the chosenwatermarked contents attack. Even if we manage to reduced the capacity to one bit, the choice of a watermarkingtechnique is still difficult: an analysis shows that classical spread spectrum techniques do not provide a sufficientlyhigh level of security for this application. This is the reason why we invent a new class of methods known asasymmetric watermarking. This provides high security level but requires a bigger amount of data to detect thewatermark. To boost the detector, we take advantage of the side information at the embedding stage to optimisethe watermark detection. This gives birth to another new method so-called JANIS. For a small loss in the securitylevel, the detector is much more efficient. To conclude, these new methods may justify the Kerckhoffs principle in watermarking for copy protection
Marco, Estelle de. "L'anonymat sur internet et le droit". Montpellier 1, 2005. http://www.theses.fr/2005MON10067.
Testo completoChen, Szu-Ting. "Droit d'auteur et protection technique des oeuvres : étude de droit comparé européen et asiatique". Nantes, 2010. http://www.theses.fr/2010NANT4024.
Testo completoDigital technology reinforces to the protection of works against piracy; in turn, copyright law mitigates the vulnerability of technology by prohibiting the circumvention of technological measures protecting the works. The WIPO Treaties of 1996 required merely signatory States to establish an appropriate legal protection of technological measures. What does the “appropriate ” legal protection mean? It generally consists of anti-circumvention provisions: how are they being received in copyright law? An analysis of these measures shows that European (French) and Asian (Taiwanese, Chinese and Japanese) legislations are disparate on the modes and the intensity of the protection of technological measures. Overprotection of these measures allows a control of access to work, which is foreign to copyright law. A study of the modes for limiting the legal protection of technological measures confirms the need to maintain a balance of interests, through various mechanisms which moderate undesirable effects of these measures on exceptions author’s rights and other interests. It is in this balance that we will find an “appropriate ” protection of technological measures
Tatsos, Patrice Rousseaux Francis. "Utilisation d'une ontologie différentielle pour l'élaboration de licences d'exploitation de contenus numériques : du formalisme à la transparence cognitive". Reims : S.C.D. de l'Université, 2007. http://scdurca.univ-reims.fr/exl-doc/GED00000732.pdf.
Testo completoAly, Walid Mohammed. "La protection des programmes d'ordinateur en Égypte et dans les pays arabes sous l'éclairage du droit international". Montpellier 1, 2004. http://www.theses.fr/2004MON10030.
Testo completoHotait, Mazen. "Protection du consommateur dans les contrats conclus sur Internet". Paris 2, 2008. http://www.theses.fr/2008PA020038.
Testo completoDauverchain, Mathieu. "Le consentement dans le contexte du traitement de données personnelles sur les sites de réseautage social". Master's thesis, Université Laval, 2018. http://hdl.handle.net/20.500.11794/29484.
Testo completoBlanc-Gonnet, Jonason Patricia. "Protection de la vie privée et transparence à l'épreuve de l'informatique : droit français, droit suédois et directive 95/46/CE du Parlement européen et du Conseil du 24 octobre 1995". Paris 12, 2001. http://www.theses.fr/2001PA122001.
Testo completoCirre, Françoise. "Les fraudes à la carte bancaire". Montpellier 1, 2008. http://www.theses.fr/2008MON10029.
Testo completoDelpech, Vincent. "Dématérialisation et sécurité des transactions". Bordeaux 4, 1996. http://www.theses.fr/1996BOR40029.
Testo completoBecause of the influence of new communication technologies, the written support to contract is gradually removed from drafting of such documents. In the meantime, the exchange of consent finds a new dematerialization on an electronic background. But dematerialization doesn't mean suppression of all sign of existence. Bacause of the need to secure the security of transactions, notably in relation to the rules of evidence, must be enlightened legals means, both statute and contractual, of legitimating computer information. This research is necessary, since those new technics are reliable and adapted to the speed of today's economical relationship. Those technics provide identification of parties, authentification of the contents of the contract and are a guarantee against any attack on their intellectual integrity. Those elements justify an autonomous acknowledgement of new forms of writing, but also a different reading of the traditional concept of what is a written support
Sadde, Gérald. "Sécurité logicielle des systèmes informatiques : aspects pénaux et civils". Montpellier 1, 2003. http://www.theses.fr/2003MON10019.
Testo completoCaloprisco, Flavia. "La construction d'un droit spécifique à la protection des données personnelles dans l'Union Européenne". Thesis, Paris Est, 2019. http://www.theses.fr/2019PESC0011.
Testo completoThe thesis carries out a descriptive and evaluative analysis of the fundamental right to the protection of personal data. This right has been distinguished from other fundamental rights such as the right to respect for private life. In order to measure the impact of this right, the study analyzes the restrictions that may be placed on it when it conflicts with other equally protected individual interests or with the general interest on the basis of the proportionality principle. In fact, the digital revolution on the one hand allows people to exercise some of their rights but, on the other hand, allows the governments to control the individual. The progressive “constitutionalisation” of the right to personal data protection would improve the protection offered to the individual.Furthermore, the fundamental right to the protection of personal data would constitute a means of expressing the identity and values of the European Union.In a context marked by the technologies of surveillance and exchange of personal data, the European Union has chosen a model that respects fundamental rights.the role of the Court of Justice of the European Union appears to be central and strategic, not only at European level, but also globally, guaranteeing the right balance of interests by assessing the necessity and proportionality of the measures adopted. The recognition of the Charter of Fundamental Rights as a source of primary law has made a decisive contribution to the latest developments in its case-law in the matter and a decisive contribution to the process of autonomy with respect to the ECHR
Marot, Pierre-Yves. "Les données et informations à caractère personnel : essai sur la notion et ses fonctions". Nantes, 2007. http://www.theses.fr/2007NANT4012.
Testo completoWhereas the primacy of the person is strongly stated by law, the splitting of the, legal sources devoted to the data and information pertaining to the person (personal data. Nominative information, privacy. . . ) is likely to set the dismantling of the person into as many specific legal statuses as there are data and information. The notion of privacy highly participates to this danger because, if its protection means the protection of an important amount of data and information, their nature doesn't indicate what legal status is to be applied in each case. In this context, it is not surprising to see courts allowing the modification of the civil status (names, surnames, sex. . . ) on the paradoxical rationale of the right of privacy, even if it in large parts depends on state decisions. Facing these conceptual contradictions, we note the emergence of a category of personal data and information which as common criterion holds the identification of the person thus allowed. Starting from this functional category, it becomes possible to explore its practical implication and to give an account of it. As it appears, if the use of personal data and information remains exceptional, it becomes massive as soon as public interest are concerned (e. G. Penal system, public health and public information). It is therefore advised to restore in all, its fullness. The principle of protection for personal data and information by strictly appreciating its exemptions and by relying on the necessary safeguard unavailability provides
Marliac-Négrier, Claire. "La protection des données nominatives informatiques en matière de recherche médicale". Clermont-Ferrand 1, 1999. http://www.theses.fr/1999CLF10211.
Testo completoThe protection of named personal information, direct or indirect, was the object of a passionate debate in France during the 70’s, as information technology advanced, and in so doing exposed devious and aberrant practices. This led to the adoption of the law 6th January 1978 called “Informatique et libertés”. If information technology has allowed uncontestable progress in the treatment and stockage of personal information. The health services, in particular have invested heavily in this technology, especially in research and development, and here the information is particularly sensitive. What are the protections and are they sufficient? There is the problem. The law of 1978 was amended by the law 1st July 1994 so as so legally allow the communication of specific medical information, normally covered by the medical secret, to researchers. It appears that the legislation is insufficient and that this will become even more apparent with the application of the European directive n° 95/46 relative to the protection of the individual with regards to personal information and its free circulation. We propose the solutions reconciling the necessity of medical research and the protection of the individual, by valorizing an active role for the individual concerned
Chassigneux, Cynthia. "L' encadrement juridique du traitement des données personnelles sur les sites de commerce en ligne". Paris 2, 2003. http://www.theses.fr/2003PA020040.
Testo completoBohoussou, Denis Loukou. "L'obligation de garantie dans les contrats relatifs à l'informatique". Montpellier 1, 1993. http://www.theses.fr/1993MON10012.
Testo completoThe informatics immaterials creations protection by intellectual property right, specially by the copyright, disturb the fulfilment of warranty (with reference to goods) in contracts which deal with those creations. According to the redhibitory (concealed) defect theory, disturbance results from that concealed defect concerns the content of the creation while property right, wich in some cases determine the object or the purpose of the contract, concerns only the creation's form in conformity to copyright (droit d'auteur) principles. The fulfilment of dispossession warranty (garantie d'eviction) is also distureed by the rights conceded to the warrantor in application of intellectuel property rules and by the rules of the action for infringment of intellectuel property right
Howard, Nouara. "La reconnaissance constitutionnelle d'un droit à la protection de l'identité numérique". Thesis, Aix-Marseille, 2018. http://www.theses.fr/2018AIXM0201.
Testo completoWith the lightening development ouf World wide web, the violations and abuses against datas about citizen’s digital identity are threatens due to insufficient legislativs provisions and légal textile outdated. That’s why this study supports the thesis that the légitimity of constitutionnal protection of a rigotte of digital identity which it will be considered the fundments, the outlines but also the limits
Perrin, Herwann. "La gestion des DRM en perspective". [Bagneux] : Numilog, 2004. http://www.numilog.com/bibliotheque/univ-lille1.
Testo completoFaria, Maria Paula Marçal Grilo Lobato de. "Données génétiques informatisées : un nouveau défi à la protection du droit à la confidentialité des données personnelles de santé". Bordeaux 4, 1996. http://www.theses.fr/1996BOR40030.
Testo completoAfter a description of the dangers posed to human privacy by "new genetics" and informatics, this thesis leads to the conclusion, by means of an analysis of the portuguese juridical framework, in a compared law perspective, of the right to confidentiality, medical secrecy and personal data protection laws, that contemporary law needs a special legal statute to rule the confidentiality of personal health genetic data without which fundamental human rights will be in threat
Mankabadi, Dina El. "La protection du consommateur et l'instauration de la confiance dans le commerce électronique : (Etude comparée France-Egypte)". Montpellier 1, 2009. http://www.theses.fr/2009MON10008.
Testo completoCrépin, Ludivine. "Les systèmes multi-agents hippocratiques : mécanismes sociaux entre agents pour la protection de la sphère privée". Saint-Etienne, 2009. http://www.theses.fr/2009STET4019.
Testo completoWith the explosion of the Web and multi-agent technologies, the current evolution of information systems leads to an automatic processing of users' data. The development of user centered multi-agent systems brings a new research topic : the management and the protection of users' sensitive data in order to preserve privacy. This thesis focuses on privacy management coming from the user's delegation to an agent of his sensitive data. Interaction between agents being one of the main feature of a multi-agent system, the possible risks for the sensitive data become more and more important in terms of disclosure, alteration, etc. This thesis primarly focuses on sensitive data communications and on the sensitive data becoming after being sent. In order to consider these important questions about the privacy preservation, we propose the model of Hippocratic Multi-Agent System (HiMAS). This model gives to agent the capacity to manage the sensitive users' data thanks to the notion of private sphere, and to protect this kind of data against suspicious behavior thanks to a specific interaction protocol and some mechanisms for the regulation of the agent behavior as trust and reputation. Our approach is based on a moral and ethic focus in order to assist the many propositions on these problems in security and network research
Chemlali, Laroussi. "Protection du consommateur et commerce électronique : droit français, européen et tunisien". Thesis, Paris Est, 2011. http://www.theses.fr/2011PEST0049.
Testo completoB to C e-commerce is increasingly gaining popularity. The number of its followers has seen a drastic surge throughout the few recent years. Its advantages in terms of speed, convenience and proximity are not any more questionable by consumers. Nevertheless, the characteristic of this medium used to carry out online transactions as well as the specificities of the electronic environment - in particular the immateriality, the interactivity and internationality - influence considerably cyber-consumers confidence. Simultaneously, they increase their vulnerability. Thus, the need for an appropriate legal framework to regulate the rise of B to C e-commerce and protect cyber-consumers. Taking into account these requirement, community, French and Tunisian legislators set up a number of measures to reassure the latter and allow them to engage confidently in online commerce transactions. These measures have two targets: some of them were intended to grant cyber-consumers an intrinsic protection in the process of the online transaction. This protection is set to be an upstream transaction protection at the pre-contractual phase as well as during the contractual period; i.e. at the level of on line transaction finalization and execution. The others aim to guarantee the consumer an extrinsic protection throughout the process of e-commerce transaction. In this respect, two aspects are taken into account, namely: personal data processed during transactions and the aspects of private international law of cyber-consumer protection
Lechevalier, Fabien. "Les fiducies de données personnelles de santé : étude illustrée des enjeux et bénéfices d’une gestion collective de la propriété des données personnelles de santé". Master's thesis, Université Laval, 2020. http://hdl.handle.net/20.500.11794/67590.
Testo completoLanna, Maximilien. "La protection des données à caractère personnel à l’épreuve de l’automesure connectée". Thesis, Paris 2, 2019. http://www.theses.fr/2019PA020026.
Testo completoPersonal data protection law is today at a turning point : its core principles are weakened by self-tracking technologies, thus reducing protection of individuals. In order to determine how new technologies affect the law, this study aims to figure ou the paradigm shift that has been implemented by the new RGPD and its consequences on personal data protection
Preuss-Laussinotte, Sylvia. "Les fichiers et les étrangers au coeur des nouvelles politiques de sécurité". Paris 10, 1998. http://www.theses.fr/1998PA100014.
Testo completoTeresi, Laurent. "La commercialisation des données publiques". Aix-Marseille 3, 2007. http://www.theses.fr/2007AIX32070.
Testo completoSingara, Julius Indra Dwipayono. "La confrontation des droits indonésien et français de la preuve sur support électronique". Montpellier 1, 2008. http://www.theses.fr/2008MON10045.
Testo completoLacoste-Vaysse, Guillaume. "La protection des données de santé à caractère personnel : pour la reconnaissance des droits du patient". Thesis, Toulouse 1, 2016. http://www.theses.fr/2016TOU10047/document.
Testo completoPersonal data is omnipresent on the internet and their economic importance is growing. For the information society services such as search engines, social networks, or online shopping sites, they have become indispensable. These services appear as essentially free for users, but actually have a particular economic model: the monetization of personal data of users in exchange for free access. The new data processing necessity an original governance by law
Mattatia, Fabrice. "La protection des données à caractère personnel face aux usages illicites, déloyaux et frauduleux". Thesis, Paris 10, 2010. http://www.theses.fr/2010PA100099.
Testo completoThe widespread digital services give the user the possibility to access to information, procedures or entertainment, anywhere, at any time. This evolution is accompanied by an increase in the collection of personal data, in order, on the one hand, to offer the user the service most suited to its needs, and on the other hand, to fund the free services by behavioral marketing. This results in an ever-increasing risk of misuse or disclosure of such data, whether made by firms seeking to maximize their profits, or by cybercriminals seeking to exploit these data to commit frauds. The study of case law shows that the protection of the European data protection principles, as transposed in the French Data Protection Act, by the judiciary is relatively inadequate: prejudice is often insufficient to motivate action, offenses are too numerous, and the fraudster can act from abroad. Such a situation requires the use of a specialized regulator as the CNIL (French data protection authority), which has the ability to accumulate expertise and to adapt quickly to changes in its sector. Moreover, the involvement of the different actors in the frame of co-regulation or of self-regulation, is also desirable, to allow for a maximum dissemination of good practices and to prevent protection breaches. Digital services can also deal directly with their users
Le, Clainche Julien. "L' adaptation du droit des données à caractère personnel aux communications électroniques". Montpellier 1, 2008. http://www.theses.fr/2008MON10063.
Testo completo