Siga este link para ver outros tipos de publicações sobre o tema: Data protection.

Artigos de revistas sobre o tema "Data protection"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Data protection".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.

1

Gama, Cruz. "Data protection and personal data protection". Brazilian Journal of Clinical Medicine and Review 1, Suppl.1 (15 de abril de 2023): 18. http://dx.doi.org/10.52600/2965-0968.bjcmr.2023.1.suppl.1.18.

Texto completo da fonte
Resumo:
In Angola, the right to privacy is one of the fundamental rights enshrined in the Constitution of the Republic. In addition to the Constitution, the legal framework on the protection of personal data is complemented by other laws, with regard to the Personal Data Protection Law, No. 22/11 of 17 June, which establishes legal rules for the processing of such data and establishes Data Protection (DPA), as the public authority responsible for monitoring compliance with those rules and exercising. The unequivocal and express consent of the data subject or his legal representative and prior notification to the APD are the general requirements for the processing of personal data, without prejudice to the principles and other specific requirements applicable to sensitive data. Only health professionals registered in the respective professional associations are qualified to process health data, and must observe professional secrecy. Data holders are assured the exercise of their rights to information, access, rectification, updating and deletion of their data. Security measures must be implemented to ensure confidentiality, integrity and availability of information. In conclusion, in Angola there is no prohibition on the processing of personal data, what the legislator imposes is that it be done with transparency and legality, aiming at protecting its holders from situations of vulnerability, including stigmatization, discrimination, observing dignity of the human person as one of the fundamental principles of ethics, especially in scientific research.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Chamberlain, Johanna, e Andreas Kotsios. "Data protection beyond data protection regulation". Stiftelsen Juridisk Fakultetslitteratur, n.º 2024 2 (17 de janeiro de 2024): 397–424. http://dx.doi.org/10.53292/bd1fa11c.282687ef.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Alhababi, Hamad Hamed. "Cross-Border Data Transfer between the gcc Data Protection Laws and the gdpr". Global Journal of Comparative Law 13, n.º 2 (7 de agosto de 2024): 178–200. http://dx.doi.org/10.1163/2211906x-13020003.

Texto completo da fonte
Resumo:
Abstract This article explores the procedures related to data protection laws in the Gulf Cooperation Council States (gcc) and the European Union (EU) regarding the General Data Protection Regulation (gdpr). It draws conclusions about the rules governing the transfer of personal information outside of a country. Transfers of personal data to foreign countries or international organizations are discussed, specifically, transfers based on an ‘adequacy’ judgment, or transfers subject to suitable protections. The article also highlights the primary modifications made to safeguard the outbound transmission of personal information in the EU and the gcc states. The article shows that the gcc nations are concerned about protecting citizens and residents’ personal information and that there is room for development in the legislative process regarding the improvement of personal data protection regulations.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Walker-Osborn, C., L. Fitzsimons e J. Ruane. "Data Protection". ITNOW 55, n.º 3 (28 de agosto de 2013): 38–39. http://dx.doi.org/10.1093/itnow/bwt050.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Rowe, Heather, e Robin McGilligan. "DATA PROTECTION". Computer Law & Security Review 17, n.º 5 (setembro de 2001): 333–35. http://dx.doi.org/10.1016/s0267-3649(01)00511-8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Dinant, Jean-Marc, e Ewout Keuleers. "Data protection". Computer Law & Security Review 20, n.º 1 (janeiro de 2004): 22–28. http://dx.doi.org/10.1016/s0267-3649(04)00005-6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Chalton, Simon. "Data protection". Computer Law & Security Review 13, n.º 6 (novembro de 1997): 425–28. http://dx.doi.org/10.1016/s0267-3649(97)89792-0.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Sizer, Richard. "Data protection". Computer Law & Security Review 2, n.º 5 (janeiro de 1987): 13–15. http://dx.doi.org/10.1016/0267-3649(87)90007-0.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Reynolds, Chris. "Data protection". Computer Law & Security Review 5, n.º 6 (março de 1990): 19–22. http://dx.doi.org/10.1016/0267-3649(90)90059-k.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Clark, Robert. "Data protection". Computer Law & Security Review 6, n.º 6 (março de 1991): 16–19. http://dx.doi.org/10.1016/0267-3649(91)90172-r.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
11

George, R. E. "Data protection". Physics Bulletin 37, n.º 9 (setembro de 1986): 363. http://dx.doi.org/10.1088/0031-9112/37/9/001.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
12

Saxby, S. "Data protection". Computer Law & Security Review 21, n.º 3 (janeiro de 2005): 277. http://dx.doi.org/10.1016/j.clsr.2005.01.012.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
13

Rowe, Heather. "Data protection". Computer Law & Security Review 10, n.º 1 (janeiro de 1994): 47. http://dx.doi.org/10.1016/0267-3649(94)90092-2.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

Mishra, Amit. "Fundamental Rights and Data Protection (Balancing Innovation and Privacy in Light of Digital Personal Data Protection Act, 2023)". International Journal of Science and Research (IJSR) 13, n.º 5 (5 de maio de 2024): 332–37. http://dx.doi.org/10.21275/mr24504204804.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
15

Begum, Shameena, V. Ratna Vasuki e K. V. V. Srinivas K.V.V.Srinivas. "Data Security and Protection in Cloud Computing". International Journal of Scientific Research 1, n.º 2 (1 de junho de 2012): 31–34. http://dx.doi.org/10.15373/22778179/jul2012/9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

Aruna, K. B., A. LallithaShri, Aravindh ., Jayakumar . e Jayasurya . "Protection for Multi Owner Data Sharing Scheme". Bonfring International Journal of Advances in Image Processing 7, n.º 1 (31 de março de 2017): 01–05. http://dx.doi.org/10.9756/bijaip.10485.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
17

-. "Data Protection Agreement". ASA Bulletin 37, Issue 4 (1 de dezembro de 2019): 838–52. http://dx.doi.org/10.54648/asab2019076.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
18

Blackwell, D. "Data protection countdown". Computer Bulletin 40, n.º 3 (1 de maio de 1998): 22–23. http://dx.doi.org/10.1093/combul/40.3.22.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
19

Gossman, P., e J. R. Wilkinson. "Data Protection Act." BMJ 295, n.º 6610 (28 de novembro de 1987): 1418. http://dx.doi.org/10.1136/bmj.295.6610.1418.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
20

Jakobs, Kai. "Data protection dangers". Science and Public Policy 29, n.º 2 (abril de 2002): 149–50. http://dx.doi.org/10.1093/spp/29.2.149.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
21

BLUME, PETER. "Practical data protection". International Journal of Law and Information Technology 2, n.º 2 (1994): 194–209. http://dx.doi.org/10.1093/ijlit/2.2.194.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
22

Priest, R. G. "Data Protection Act". Psychiatric Bulletin 12, n.º 5 (1 de maio de 1988): 204. http://dx.doi.org/10.1192/pb.12.5.204.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
23

Dhont, Jan, e Yves Poullet. "Data protection — Belgium". Computer Law & Security Review 16, n.º 1 (fevereiro de 2000): 5–19. http://dx.doi.org/10.1016/s0267-3649(00)87063-6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
24

Rowe, Heather. "EU data protection". Computer Law & Security Review 16, n.º 1 (fevereiro de 2000): 41–42. http://dx.doi.org/10.1016/s0267-3649(00)87072-7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

Jackson, Margaret. "DATA PROTECTION - AUSTRALIA". Computer Law & Security Review 16, n.º 3 (junho de 2000): 166–69. http://dx.doi.org/10.1016/s0267-3649(00)88911-6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
26

Bygrave, Lee A. "EUROPEAN DATA PROTECTION". Computer Law & Security Review 16, n.º 4 (agosto de 2000): 252–57. http://dx.doi.org/10.1016/s0267-3649(00)89134-7.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
27

Carey, Peter, e David Berry. "DATA PROTECTION — SECURITY". Computer Law & Security Review 18, n.º 2 (março de 2002): 112–13. http://dx.doi.org/10.1016/s0267-3649(02)03010-8.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
28

Ajana, Btihaj. "Reinventing data protection?" Identity in the Information Society 2, n.º 3 (25 de agosto de 2009): 355–58. http://dx.doi.org/10.1007/s12394-009-0025-3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
29

Davies, David. "Data protection corner". Computer Law & Security Review 1, n.º 5 (janeiro de 1986): 9–11. http://dx.doi.org/10.1016/0267-3649(86)90007-5.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
30

Kolb, Angela. "Data protection — Germany". Computer Law & Security Review 7, n.º 3 (setembro de 1991): 123–26. http://dx.doi.org/10.1016/0267-3649(91)90089-e.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
31

Poullet, Y., e M. H. Boulanger. "Data protection — medicine". Computer Law & Security Review 6, n.º 5 (janeiro de 1991): 18–23. http://dx.doi.org/10.1016/0267-3649(91)90150-t.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
32

Determann, Lothar. "Healthy Data Protection". Michigan Technology Law Review, n.º 26.2 (2020): 229. http://dx.doi.org/10.36645/mtlr.26.2.healthy.

Texto completo da fonte
Resumo:
Modern medicine is evolving at a tremendous speed. On a daily basis, we learn about new treatments, drugs, medical devices, and diagnoses. Both established technology companies and start-ups focus on health-related products and services in competition with traditional healthcare businesses. Telemedicine and electronic health records have the potential to improve the effectiveness of treatments significantly. Progress in the medical field depends above all on data, specifically health information. Physicians, researchers, and developers need health information to help patients by improving diagnoses, customizing treatments and finding new cures. Yet law and policymakers are currently more focused on the fact that health information can also be used to harm individuals. Even after the outbreak of the COVID-19 pandemic (which occurred after the manuscript for this article was largely finalized), the California Attorney General Becera made a point of announcing that he will not delay enforcement of the California Consumer Privacy Act (“CCPA”), which his office estimated imposes a $55 billion cost (approximately 1.8% of California Gross State Product) for initial compliance, not including costs of ongoing compliance, responses to data subject requests, and litigation. Risks resulting from health information processing are very real. Contact tracing and quarantines in response to SARS, MERS, and COVID-19 outbreaks curb civil liberties with similar effects to law enforcement investigations, arrests, and imprisonment. Even outside the unusual circumstances of a global pandemic, employers or insurance companies may disfavor individuals with pre-existing health conditions in connections with job offers and promotions as well as coverage and eligibility decisions. Some diseases carry a negative stigma in social circumstances. To reduce the risks of such harms and protect individual dignity, governments around the world regulate the collection, use, and sharing of health information with ever-stricter laws. European countries have generally prohibited the processing of personal data, subject to limited exceptions, for which companies have to identify and then document or apply. The General Data Protection Regulation (“GDPR”) that took effect in 2018 confirms and amplifies a rigid regulatory regime that was first introduced in the German State Hessen in 1970 and demands that organizations minimize the amount of data they collect, use, share, and retain. Healthcare and healthtech organizations have struggled to comply with this regime and have found EU data protection laws fundamentally hostile to data-driven progress in medicine. The United States, on the other hand, has traditionally relied on sector- and harm-specific laws to protect privacy, including data privacy and security rules under the federal Health Insurance Portability and Accountability Act (“HIPAA”) and numerous state laws including the Confidentiality of Medical Information Act (“CMIA”) in California, which specifically address the collection and use of health information. So long as organizations observe the specific restrictions and prohibitions in sector-specific privacy laws, they may collect, use, and share health information. As a default rule in the United States, businesses are generally permitted to process personal information, including health information. Yet, recently, extremely broad and complex privacy laws have been proposed or enacted in some states, including the California Consumer Privacy Act of 2018 (“CCPA”), which have a potential to render compliance with data privacy laws impractical for most businesses, including those in the healthcare and healthtech sectors. Meanwhile, the People’s Republic of China is encouraging and incentivizing data-driven research and development by Chinese companies, including in the healthcare sector. Data-related legislation is focused on cybersecurity and securing access to data for Chinese government agencies and much less on individual privacy interests. In Europe and the United States, the political pendulum has swung too far in the direction of ever more rigid data regulation and privacy laws, at the expense of potential benefits through medical progress. This is literally unhealthy. Governments, businesses, and other organizations need to collect, use and share more personal health information, not less. The potential benefits of health data processing far outweigh privacy risks, which can be better tackled by harm-specific laws. If discrimination by employers and insurance companies is a concern, then lawmakers and law enforcement agencies need to focus on anti-discrimination rules for employers and insurance companies - not prohibit or restrict the processing of personal data, which does not per se harm anyone. The notion of only allowing data processing under specific conditions leads to a significant hindrance of medical progress by slowing down treatments, referrals, research, and development. It also prevents the use of medical data as a tool for averting dangers for the public good. Data “anonymization” and requirements for specific consent based on overly detailed privacy notices do not protect patient privacy effectively and unnecessarily complicate the processing of health data for medical purposes. Property rights to personal data offer no solutions. Even if individuals - not companies creating databases - were granted property rights to their own data originally, this would not ultimately benefit individuals. Given that transfer and exclusion rights are at the core of property regimes, data property rights would threaten information freedom and privacy alike: after an individual sells her data, the buyer and new owner could exercise his data property rights to enjoin her and her friends and family from continued use of her personal data. Physicians, researchers, and developers would not benefit either; they would have to deal with property rights in addition to privacy and medical confidentiality requirements. Instead of overregulating data processing or creating new property rights in data, lawmakers should require and incentivize organizations to earn and maintain the trust of patients and other data subjects and penalize organizations that use data in specifically prohibited ways to harm individuals. Electronic health records, improved notice and consent mechanisms, and clear legal frameworks will promote medical progress, reduce risks of human error, lower costs, and make data processing and sharing more reliable. We need fewer laws like the GDPR or the CCPA that discourage organizations from collecting, using, retaining, and sharing personal information. Physicians, researchers, developers, drug companies, medical device manufacturers and governments urgently need better and increased access to personal health information. The future of medicine offers enormous opportunities. It depends on trust and healthy data protection. Some degree of data regulation is necessary, but the dose makes the poison. Laws that require or intend to promote the minimization of data collection, use, and sharing may end up killing more patients than hospital germs. In this article, I promote a view that is decidedly different from that supported by the vast majority of privacy scholars, politicians, the media, and the broader zeitgeist in Europe and the United States. I am arguing for a healthier balance between data access and data protection needs in the interest of patients’ health and privacy. I strive to identify ways to protect health data privacy without excessively hindering healthcare and medical progress. After an introduction (I), I examine current approaches to data protection regulation, privacy law, and the protection of patient confidentiality (II), risks associated with the processing of health data (III), needs to protect patient confidence (IV), risks for healthcare and medical progress (V), and possible solutions (VI). I conclude with an outlook and call for healthier approaches to data protection (VII).
Estilos ABNT, Harvard, Vancouver, APA, etc.
33

Priest, R. G. "Data Protection Act". Bulletin of the Royal College of Psychiatrists 12, n.º 5 (maio de 1988): 204. http://dx.doi.org/10.1192/s0140078900020162.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
34

McIntyre, T. J. "Reinventing data protection?" Computer Law & Security Review 26, n.º 6 (novembro de 2010): 673–76. http://dx.doi.org/10.1016/j.clsr.2010.07.003.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
35

Hallinan, D. "Opinions ∙ Data Protection without Data: Could Data Protection Law Apply without Personal Data Being Processed?" European Data Protection Law Review 5, n.º 3 (2019): 293–99. http://dx.doi.org/10.21552/edpl/2019/3/5.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
36

Garg, Dr Ajay Kumar, e Shikha Kuchhal. "Data Protection Laws in India: A Comparative Study". Indian Journal of Applied Research 3, n.º 1 (1 de outubro de 2011): 75–76. http://dx.doi.org/10.15373/2249555x/jan2013/30.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
37

Shahul Ikram, Nur Adlin Hanisah. "DATA BREACHES EXIT STRATEGY: A COMPARATIVE ANALYSIS OF DATA PRIVACY LAWS". Malaysian Journal of Syariah and Law 12, n.º 1 (15 de abril de 2024): 135–47. http://dx.doi.org/10.33102/mjsl.vol12no1.458.

Texto completo da fonte
Resumo:
Data has become highly valuable in the era of digitalisation and is the main target of cybercriminals. Cybercriminals steal data by exploiting system vulnerabilities. The rise of catastrophic data breach incidents affects business operations, reputation and legal standing, leading to business disruptions, financial loss and reputation damage. These incidents have raised data security concerns. The frequent incident is partly due to insufficient security measures in place. This article employs doctrinal research focusing on legal principles based on legislation to analyse Malaysia’s legal framework for protecting personal data in Malaysia and a comparison with other jurisdictions, i.e. the European Union General Data Protection Regulation (GDPR), the Singapore Personal Data Protection Act 2012 and the China Personal Information Protection Law (PIPL). The findings show that Malaysia’s data protection laws fall short of the international norm in some areas. This article suggests that Malaysian policymakers may amend the Personal Data Protection Act 2010 to align with international data protection standards to strengthen data security measures in preventive, detective and responsive data breaches. Consequently, this article provides an analysis of data protection laws in Malaysia and compares them with other advanced jurisdictions. It offers valuable insights into the challenges and opportunities involved in safeguarding personal data, the legal framework, and organisational strategies related to data privacy and security.
Estilos ABNT, Harvard, Vancouver, APA, etc.
38

Mendes de Leon, Pablo. "The Fight Against Terrorism Through Aviation: Data Protection Versus Data Protection". Air and Space Law 31, Issue 4/5 (1 de setembro de 2006): 320–30. http://dx.doi.org/10.54648/aila2006027.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
39

Hu, Pengnian, e Qian Wei. "Research on Personal Data Protection of EU General Data Protection Regulation". IOP Conference Series: Materials Science and Engineering 806 (5 de maio de 2020): 012003. http://dx.doi.org/10.1088/1757-899x/806/1/012003.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
40

Hemmings, Nicholas, e Joseph Noar. "Data protection is changing − the new general data protection regulations (GDPR)". Orthodontic Update 11, n.º 3 (2 de julho de 2018): 110–14. http://dx.doi.org/10.12968/ortu.2018.11.3.110.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
41

Miño-Vásquez, Verónica. "The Protection of Genetic Data under the General Data Protection regulation". Datenschutz und Datensicherheit - DuD 43, n.º 3 (25 de fevereiro de 2019): 154–58. http://dx.doi.org/10.1007/s11623-019-1083-9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
42

Guzmán-Rodríguez, Héctor E. "Data Protection in Mexico: One Right, Two Systems, Different Protections and Uncontrolled Data Breaches". Global Privacy Law Review 2, Issue 2 (1 de junho de 2021): 149–54. http://dx.doi.org/10.54648/gplr2021019.

Texto completo da fonte
Resumo:
To obtain a complete understanding of how data protection laws apply in Mexico, readers must start with the following fact: There are two main data protection laws in Mexico. One applies to companies and individuals processing personal data for non-household activities, the other provides the framework that all Mexican States shall follow to regulate data processing by public entities identified as ‘sujetos obligados’ or ‘obligated subjects’. Even when both laws regulate ‘data protection’ in a very similar way, a close look into them reveals that they provide different rights to data subjects and different obligations for data controllers. As we will indicate, this situation may lead to problems on the differentiated protections and obligations when citizens’ rights are processed by two types of data controllers that otherwise should not have different obligations when processing this information. Mexico, Data Protection, Data Subjects, Portability, Impact Assessment, Breach, Security
Estilos ABNT, Harvard, Vancouver, APA, etc.
43

Noor Sureani, Nurkhairina Binti, Atikah Shahira Binti Awis Qurni, Ayman Haziqah Binti Azman, Mohd Bahrin Bin Othman e Hariz Sufi Bin Zahari. "The Adequacy of Data Protection Laws in Protecting Personal Data in Malaysia". Malaysian Journal of Social Sciences and Humanities (MJSSH) 6, n.º 10 (10 de outubro de 2021): 488–95. http://dx.doi.org/10.47405/mjssh.v6i10.1087.

Texto completo da fonte
Resumo:
With the burgeoning technology, Malaysia has seen a staggering number of data breaches and data leaks within this past decade alone, with no signs of the trend decreasing. This has raised questions on whether the Personal Data Protection Act 2010 (PDPA) adequately protects the personal data of Malaysians. With the recent COVID-19 pandemic, data has been collected on a larger scale than before, with more frequent data leaks occurring. Hence, this study aims to analyse the adequacy of the PDPA by benchmarking it to the United Kingdom’s (UK) Data Protection Act 2018, which have seen a decrease in data breaches since the implementation of the new legislation. In this context, personal data refers to information processed or recorded that relates directly or indirectly to a data subject, who may be identified from the information and may include sensitive personal data. The study uses a doctrinal analysis methodology to best explore the ideas and concepts within the literature available regarding the protection of personal data. The study also employs a comparative analysis methodology by comparing the scope and application of Malaysian and UK legislation for benchmarking. The findings suggest that there are improvements to be made for the PDPA to be adequate.
Estilos ABNT, Harvard, Vancouver, APA, etc.
44

Li, Zhiping, Jiagui Xie, Likun Gao e Fanjie Nie. "Data Privacy Protection in Data Fusion". Journal of Physics: Conference Series 2033, n.º 1 (1 de setembro de 2021): 012179. http://dx.doi.org/10.1088/1742-6596/2033/1/012179.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
45

Tahim, Arpan, Sanjeeve Sabharwal, Rakesh Dhokia, Rajiv Bajekal e Steve Kyriacou. "Data protection training improves data handling". Clinical Teacher 9, n.º 6 (20 de novembro de 2012): 403–7. http://dx.doi.org/10.1111/j.1743-498x.2012.00557.x.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
46

Supriyadi, Daniar. "The Regulation of Personal and Non-Personal Data in the Context of Big Data". Journal of Human Rights, Culture and Legal System 3, n.º 1 (14 de fevereiro de 2023): 33–69. http://dx.doi.org/10.53955/jhcls.v3i1.71.

Texto completo da fonte
Resumo:
Data protection laws provide minimum protections for personal data, as well as facilitate the free flow of such data, by setting out principles and rules for legitimate data processing. In the big data context, personal data may not be as easy to distinguish as in traditional data processing, and that makes policy-makers and businesses turn to the identifiability concept: in other words, what data are personal. This research is based on doctrinal legal researchon the legal theory (concepts, rules, and principles) concerning data protection in the EU and Indonesia. The results of the research show that the understand such paramount terminology in data protection law, relevant factors are presented to assess the direct or indirect identification of a natural person. In the EU data protection law, the test entails, for example, risk-based measures and technological development, whereas Indonesian law on data protection has not yet established such assessments. Data within big data operations traditionally falls under the scope of data protection laws only if it discloses the private life of individuals, such as names or other civil identities, but without further conditions to ascertain whether the data can be indirectly identified with an individual.
Estilos ABNT, Harvard, Vancouver, APA, etc.
47

Colangelo, Giuseppe, e Mariateresa Maggiolino. "Data Protection in Attention Markets: Protecting Privacy through Competition?" Journal of European Competition Law & Practice 8, n.º 6 (10 de maio de 2017): 363–69. http://dx.doi.org/10.1093/jeclap/lpx037.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
48

Bogosavljević, Mirjana. "Protection of Personal Data in Documents: Application of the Law on Personal Data Protection in Serbia and Abroad". Moderna arhivistika 2, n.º 1 (1 de maio de 2019): 106–15. http://dx.doi.org/10.54356/ma/2019/ghkv7413.

Texto completo da fonte
Resumo:
The rapid and continuous development of information technologies that encompasses almost all spheres of social life, imposes the key issue of protecting the privacy personal data, the issue of their availability, the way of their storage, processing, transmission and use. The contemporary concept of privacy puts emphasis on information control, security and data protection in computer information systems. Protection of privacy primarily concerns the issue of protection against abuse, fraud, embezzlement and deliberate or accidental damage. This paper covers several key issues: what are the mechanisms for protecting personal data in documents; is it feasible to achieve higher security of computer systems in terms of data protection; is it possible to limit the distribution of certain types of data (medical reports, financial institutions, schools); what is done regarding data protection in terms of establishing laws, regulations and standards. From the point of view of archivists and archival staff in the era of digitalization of archival material when it becomes accessible and available for use, the protection of personal data in documents is certainly an issue that deserves special attention and consideration. The paper shall provide an overview on the up to date achievements in this field within the archival services in our country and abroad.
Estilos ABNT, Harvard, Vancouver, APA, etc.
49

Starkbaum, Johannes, e Ulrike Felt. "Negotiating the reuse of health-data: Research, Big Data, and the European General Data Protection Regulation". Big Data & Society 6, n.º 2 (julho de 2019): 205395171986259. http://dx.doi.org/10.1177/2053951719862594.

Texto completo da fonte
Resumo:
Before the EU General Data Protection Regulation entered into force in May 2018, we witnessed an intense struggle of actors associated with data-dependent fields of science, in particular health-related academia and biobanks striving for legal derogations for data reuse in research. These actors engaged in a similar line of argument and formed issue alliances to pool their collective power. Using descriptive coding followed by an interpretive analysis, this article investigates the argumentative repertoire of these actors and embeds the analysis in ethical debates on data sharing and biobank-related data governance. We observe efforts to perform a paradigmatic shift of the discourse around the General Data Protection Regulation-implementation away from ‘protecting data’ as key concern to ‘protecting health’ of individuals and societies at large. Instead of data protection, the key risks stressed by health researchers became potential obstacles to research. In line, exchange of information with data subjects is not a key concern in the arguments of biobank-related actors and it is assumed that patients want ‘their’ data to be used. We interpret these narratives as a ‘reaction’ to potential restrictions for data reuse and in line with a broader trend towards Big Data science, as the very idea of biobanking is conceptualized around long-term use of readily prepared data. We conclude that a sustainable implementation of biobanks needs not only to comply with the General Data Protection Regulation, but must proactively re-imagine its relation to citizens and data subjects in order to account for the various ways that science gets entangled with society.
Estilos ABNT, Harvard, Vancouver, APA, etc.
50

Erdos, David. "EUROPEAN UNION DATA PROTECTION LAW AND MEDIA EXPRESSION: FUNDAMENTALLY OFF BALANCE". International and Comparative Law Quarterly 65, n.º 1 (janeiro de 2016): 139–83. http://dx.doi.org/10.1017/s0020589315000512.

Texto completo da fonte
Resumo:
AbstractThe European Data Protection Directive 95/46/EC requires all European Economic Area (EEA) jurisdictions to provide an equivalent regime protecting the privacy and other fundamental rights and freedoms of natural persons in relation to personal data processing, whilst also shielding media expression from the default substantive requirements as necessary to ensure a balance between fundamental rights. Through a comprehensive coding of the derogations set out in each jurisdiction's data protection laws, this article provides the first systematic analysis of whether this has in fact been achieved. It is demonstrated that there is a total lack of even minimal harmonization in this area, with many laws providing for patently unbalanced results especially as regards the publication of sensitive information, which includes criminal convictions and political opinion, and the collection of information without notice direct from the data subject. This reality radically undermines European data protection's twin purposes of ensuring the free flow of personal data and protecting fundamental rights, an outcome which remains largely unaddressed by the proposed new Data Protection Regulation. Practical suggestions are put forward to ameliorate these troubling inconsistencies within the current process of reform.
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia