Literatura científica selecionada sobre o tema "Protection de l'information (informatique) – Droit international"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Protection de l'information (informatique) – Droit international".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Teses / dissertações sobre o assunto "Protection de l'information (informatique) – Droit international"
Florimond, Guillaume. "Droit et internet : approche comparatiste et internationaliste du monde virtuel". Nantes, 2013. http://www.theses.fr/2013NANT4009.
Texto completo da fonteGhaibi, Dhia Moslem Abd Alameer. "La protection pénale de la sécurité de l’information en Irak : Etude juridique au niveau national et international". Thesis, Lille, 2018. http://www.theses.fr/2018LIL2D013.
Texto completo da fonteThe security of information and communication technologies (ICT) and the issue of cybercrime has been a concern for some time. It is only in the recent past that governments have begun to understand the importance of ICT security. Computer crime, like any form of crime, is hard to quantify, and cybercrime may be the least reported form of criminal behavior since the victim often does not know that an offense has even occurred. In addition, the lack of cybersecurity solutions and the lack of common understanding make legal difficulties both nationally and internationally. It is doubtful that common law standards, including those of the criminal law, are sufficient, on the one hand to cover the needs of an effective criminal policy and, on the other hand, the need to deal with the diversity of crimes and the continual evolution of their means. Iraq, like some countries, has suffered information system breaches. But how can Iraq cope with the issues of cybercrime? Are traditional laws sufficient to frame cybersecurity? Does Iraq need new legal rules? In this respect, the contribution of international law is important for the fight against cybercrime. International cyber security conventions and pioneer legislation in this area can inspire the Iraqi legislator. The purpose of this research topic is, in the light of international law, to provide effective legal protection and to develop Iraq's legal framework for cybersecurity
Favero, Luca. "La dimension externe de la protection des données à caractère personnel dans le droit de l'Union européenne". Thesis, Strasbourg, 2013. http://www.theses.fr/2013STRAA012.
Texto completo da fonteThis doctoral thesis deals with the external dimension of the protection of personal data, thus of the mechanisms by which the law of the European Union ensures an adequate level of protection to the personal data that are transferred to third countries. Under this perspective, the aim of the thesis is to underline the achievements of what amounts to a “legislative foreign policy” of the European Union aimed at the protection of personal data as a fundamental right of the individuals
Renaudin, Klervi. "Le spamming et le droit : analyse critique et prospective de la protection juridique des "spammés"". Phd thesis, Université de Grenoble, 2011. http://tel.archives-ouvertes.fr/tel-00821146.
Texto completo da fonteZwolinska, Monika. "Sécurité et libertés fondamentales des communications électroniques en droit français, européen et international". Thesis, Nice, 2015. http://www.theses.fr/2015NICE0038/document.
Texto completo da fonteThe impact of today’s information and communication technologies is essential forthe exercice of human rights, particularly concerning freedom of expression and privacyprotection. With the massive use of Internet, mobile phones and – more recently – other smart objects and digital services, the tension mounts with respect to establishing the limit between public and private space online. Likewise, the freedom of expression, communication and information are at risk as - under the pretext of fighting cybercrime and cyber terrorism, as well as maintaining public order - public authorities interfere with online contents by controlling, monitoring, restraining or prohibiting it. Especially as both States’ and private companies’ capacities in creating extremely precise databases identifying information on persons’ consumption habits, itineraries, thoughts and opinions gradually increase. Therefore, the need to redefine the way in which the respect of fundamental freedoms is taken into consideration in the context of digital environment becomes urgent
Khalifa, Otman. "La protection de la vie privée à l’ère des nouvelles technologies : une protection relative". Thesis, Paris 10, 2019. http://www.theses.fr/2019PA100023.
Texto completo da fonteThe right to respect private life is a fundamental right, which is fully protected by the provisions of the law and the provisions of the judiciary at the national and international levels. This fundamental nature requires the state to provide effective methods that protect this right against the dangers surrounding it, the most important of which is the threat of modern information and communication technology. The French and European legislators enacted several legislations that would limit the illegal uses of this technology to private life. However, in recent years, justifications for the security and interests of the state have passed legislation authorizing public authorities to use high-tech devices to spy on people's lives and to monitor their private communications without adequate legal safeguards, which has increasingly weakened the scope of privacy protection. Moreover, the dominant Internet companies are now a real threat to the privacy of Internet users. The violations carried out by these companies outweigh the danger of states and legally and realistically exclude the authority of the French and European control bodies. Finally, the actual legal protection mechanisms, in the absence of financial and technical possibilities and the absence of a binding international convention on privacy, would not be able to provide effective legal protection to this fundamental right
Di, Maggio Antonia. "Les atteintes aux systèmes de traitement automatisé de données : harmonisation et coopération en Europe". Electronic Thesis or Diss., Corte, 2022. http://www.theses.fr/2022CORT0014.
Texto completo da fonteComputer systems are essential parts of political, social, and economic interaction and have become fundamental for development and innovation. However, these systems are as many resources as they can be a threat to the security, the rights and the freedoms of users. Indeed, attacks on automated data processing systems consist in various criminal processes, carried out by several categories of offenders and affecting many different victims such as individuals, companies, or even States. The study of the punishment of such offences leads us to the question of the relevance of French legislation concerning that through a double examination. The first one, on the one hand, consisting of comparing, through a horizontal analysis, the substantive and formal special criminal law, from the angle of comparative law (Belgium and Italy), and, on the other hand, in examining, through a vertical analysis, their consistency with European standards. From this point of view, the study discloses the existence of a legislative corpus which is dense but also unclear because of its technicality. The study also notes that there is a fragile border in procedural matters regarding to the development of techniques which are effective but also likely to affect individual freedoms. The second examination focuses on the overall policy implemented by States to prevent and combat these computer attacks. On this point, cooperation between States is a corollary of the effectiveness of repression in this area. However, in practice, the choices made to promote such collaboration encounter major application difficulties. Added to these difficulties are those linked to the commission of cyberattacks by the States themselves, since cyberspace now appears as a new field of political and military conflict. That being stated, while it seemed that these state cyberattacks were carried out in an area of lawlessness, it turns out, on the contrary, that criminal law has a certain potential for their repression
Hubschwerlin, Marie-Odile. "Utilisation des données continues dans le système d'information Schengen : analyse des tensions entre système d'information Schengen, système commun, et disparités dans l'utilisation de ce système". Strasbourg, 2010. http://www.theses.fr/2010STRA4010.
Texto completo da fonteThe Schengen Information System’s (SIS) strategic objectives are the protection of public order and security; to ensure the good implementation of the provisions on free movement as well as the management of migratory flows. Legislative acts telling us who are the people that can enter an alert in the system and consult the available data on it allow for a theoretical achievement of these objectives. The same goes for people and objects that can be subject to an alert and the consequences of such an alert. Yet, the example of the United Kingdom - and its "personal" use of the file - undermines the realization of these objectives and creates tensions. This is not an isolated case; this practice is common to all Member States who give prevalence to their interests over strategic objectives of the SIS. The SIS efficiency could therefore be jeopardized. Facts show that its objectives could only be successfully achieved through a homogeneous use of the SIS (by the Schengen Member States). As these objectives are crucial for states, its successes only make the SIS more attractive. The Swiss example clearly illustrates that the SIS is essential. Efficiency problems cannot carry on. Can the SIS II be a solution? What about grouping together the SIS with Eurodac and the VIS? Among other things the increase of data, technological improvements do not end issues with data quality, disparity of the use of SIS and unfamiliarity with the system. Tensions continue. The success of the SIS relies on a homogenous use; in order to wipe out tensions training of its users is essential
Bouthier, Corinne. "Le droit comme outil de développement du commerce électronique". Thesis, Lyon, 2019. http://www.theses.fr/2019LYSES049.
Texto completo da fonteE-commerce is considered to be a source of economic growth. If it has developed thanks to the new information and communication technologies, a legal framework is nevertheless needed to promote its growth. Our study will seek, by considering the multiple sources of regulation, mainly European and national, to demonstrate that the latter is oriented along two main axes: ensuring, on the one hand, the freedom of electronic commerce, and, on the other, confidence in this new mode of commerce. We shall establish that the freedom of its exercise cannot be absolute, and that this is indissociable from the interest of the consumer. As soon as a legal framework is absent or inappropriate, the freedom of e-commerce is weakened. Finally, the study will focus on the rules that create the confidence of the participants in e-commerce: their joint confidence in electronic transactions secured within a legal framework; their singular trust, regarding their respective interests, whether it concerns the protection of the intangible assets of the company, or the consent of e-consumers, during their act of purchase as well as in the processing of their personal data
Laspiti, Vassiliki. "La coopération Europe-Etats-Unis en matière de lutte contre le terrorisme et la protection des libertés". Paris 13, 2013. http://scbd-sto.univ-paris13.fr/secure/ederasme_th_2013_laspiti.pdf.
Texto completo da fonteLivros sobre o assunto "Protection de l'information (informatique) – Droit international"
Benyekhlef, Karim. La protection de la vie privée dans les échanges internationaux d'informations. Montréal, Qué: Éditions Thémis, 1992.
Encontre o texto completo da fonteInternational Seminar on Statistical Confidentiality (1992 Dublin, Ireland). Internationales Seminar über die statistische Geheimhaltung: Protokolle = International Seminar on Statistical Confidentiality : proceedings, 8-10 September 1992, Dublin, Ireland. Luxembourg: Office des publications officielles des Communautés européennes, 1993.
Encontre o texto completo da fonteOntario. Esquisse de cours 12e année: Le droit canadien et international cln4u cours préuniversitaire. Vanier, Ont: CFORP, 2002.
Encontre o texto completo da fonteCanada. Task Force on Electronic Commerce. The protection of personal information : building Canada's information economy and society =: La protection des renseignements personnels : pour une économie et une société de l'information au Canada. Ottawa, Ont: Industry Canada = Industrie Canada, 1998.
Encontre o texto completo da fonteCanada, Canada Industry, e Canada. Task Force on Electronic Commerce., eds. The protection of personal information: Building Canada's information economy and society. Ottawa: Industry Canada, 1998.
Encontre o texto completo da fonteOffice, International Labour, ed. Workers' privacy. Geneva: International Labour Office, 1992.
Encontre o texto completo da fonteBraibant, Guy. Données personnelles et société de l'information: Transposition en droit français de la directive no 95/46 : rapport au Premier ministre. Paris: Documentation française, 1998.
Encontre o texto completo da fonteVermeys, Nicolas W. Responsabilité civile et sécurité informationnelle. Cowansville (Québec): Éditions Yvon Blais, 2010.
Encontre o texto completo da fonteInstituts de recherche en santé du Canada., ed. Re cueil des dispositions législatives canadiennes sur la protection des renseignements personnels dans le contexte de la recherche en santé. Ottawa, Ont: Instituts de recherche en santé du Canada, 2000.
Encontre o texto completo da fonteA, Qureshi Anique, e Siegel Joel G, eds. The international handbook of computer security. Chicago: Glenlake Pub. Co., Ltd., 2000.
Encontre o texto completo da fonteRelatórios de organizações sobre o assunto "Protection de l'information (informatique) – Droit international"
Castets-Renard, Céline, Pierre-Luc Déziel e Lyse Langlois. Observations sur le document d'orientation sur la protection de la vie privée à l'intention des services de police relativement à la reconnaissance faciale. Observatoire international sur les impacts sociétaux de l’intelligence artificielle et du numérique, junho de 2021. http://dx.doi.org/10.61737/axib9435.
Texto completo da fonte