• No results found

Privacy Data Protection Law

The European Union’s balancing between security objectives and data protection : the case of Passenger Name Record data

The European Union’s balancing between security objectives and data protection : the case of Passenger Name Record data

... of law) accountable ...of data protection safeguards in the PNR Directive has benefited from developments on data privacy in the domain of ...better data protection ...

60

Legal Protection of Personal Data and Privacy in the Function of the Protection of Human  Rights and Freedoms

Legal Protection of Personal Data and Privacy in the Function of the Protection of Human Rights and Freedoms

... of privacy and family rights first in the global plane and then in a more narrower perspective continues to be a challenge not only from the practical but also the normative point of ...personal data ...

11

Privacy and Data Protection in Cyberspace in Indian Environment

Privacy and Data Protection in Cyberspace in Indian Environment

... of privacy as it has been discussed above, though India has no codified law to deal with privacy but all the major privacy issue is handled through IPC [9], ITA Act2008 [22], Copyright act ...

10

European labour law and the protection of workers' privacy : a loophole?

European labour law and the protection of workers' privacy : a loophole?

... the data subject is not sufficient to justify any intrusion into the right to privacy ...the data subject and the controller ...the protection of workers' personal ...personal data in ...

50

Creating a National Data Privacy Law for the United States

Creating a National Data Privacy Law for the United States

... conflate privacy with cybersecurity because the two are so closely linked. Privacy has to do with the collection, storage, and dissemination of personal ...the protection of systems from intrusion. ...

42

PRIVACY, SECURITY AND DATA PROTECTION IN CROWDSOURCING PLATFORMS:ISSUES AND RECOMMENDATIONS

PRIVACY, SECURITY AND DATA PROTECTION IN CROWDSOURCING PLATFORMS:ISSUES AND RECOMMENDATIONS

... encryption, data backups, privacy-preserving information systems, authentication broadcasting, filtering, cross-checking, verification by the crowd, mask up, forwarding, obfuscation, perturbation, ...

15

Privacy, security and data protection in smart cities : a critical EU law perspective

Privacy, security and data protection in smart cities : a critical EU law perspective

... context, privacy and security are important : if not simply as a fundamental right, then instrumentally, as a prerequisite to keeping the trust and engagement of smart city ...

37

The Rule of Law and EU Data Protection Legislation

The Rule of Law and EU Data Protection Legislation

... the data processing is necessary for the exercise of a fundamental right, or is otherwise in the public interest, or benefits from recognition in the community ...the data subject and their reasonable ...

16

Data Protection and Privacy for Alternative Data

Data Protection and Privacy for Alternative Data

... a data controller has information about them; 29 to obtain that data within a reasonable time, in an intelligible form, and at a charge that is not excessive; and to challenge the data and, if ...

36

Facebook Under Attack? Privacy – Europe’s Way of Waging War on U.S Giants?

Facebook Under Attack? Privacy – Europe’s Way of Waging War on U.S Giants?

... personal data on a large scale. Indeed, throughout the years, privacy rights were strengthened, due to the increasing data beaches that occurred via social ...of privacy rights, is of course ...

8

'An absolute prerequisite': The importance of user privacy and trust in maintaining academic freedom at the library

'An absolute prerequisite': The importance of user privacy and trust in maintaining academic freedom at the library

... user privacy (Coombes, 2004; Falk, 2004; Shuler, 2004; Bowers, 2006), about which users may not be well-educated (Johns and Lawson, ...user privacy perspectives (Johns and Lawson, 2005) and provide clarity ...

26

Privacy Protection of Data Using Chaos and Biometric Template

Privacy Protection of Data Using Chaos and Biometric Template

... In this paper, the features of biometric security and chaos-based cryptography are exploited to design a bio- chaotic block security system for overcoming the difficulties and vulnerabilities of conventional ...

5

Research on Personal Privacy Protection in Medical Big Data

Research on Personal Privacy Protection in Medical Big Data

... big data theory and technology, medical big data gradually applied to people's ...big data brings convenience and better medical health services, personal privacy issues also ...big ...

7

Sensitive Label Privacy Protection on Social Network Data

Sensitive Label Privacy Protection on Social Network Data

... provide privacy protection while losing as little information and while preserving as much utility as ...between data privacy and utility [16], we evaluate empirically the extent to which the ...

10

Cloudlet based Medical Data Sharing with Privacy Protection

Cloudlet based Medical Data Sharing with Privacy Protection

... of privacy security and sharing broad medical data in cloudlets and the remote ...transmit data to the remote cloud with respect to verify accumulation of data, and also low correspondence ...

5

Privacy Fears on the Increase, warns Data Protection Commissioner

Privacy Fears on the Increase, warns Data Protection Commissioner

... personal privacy, according to a survey published today by the Data Protection Commissioner, Mr Joe ...internet privacy, and a lack of information about Government initiatives have contributed ...

6

A Case Study on Mining Security Issues & Remedies in Privacy Preservation

A Case Study on Mining Security Issues & Remedies in Privacy Preservation

... distributed data mining is a multidisciplinary field and requires close cooperation between researchers and practitioners from the fields of cryptography, data mining, public policy and ...the data ...

7

SAFETY ISSUES IN DATA MINING

SAFETY ISSUES IN DATA MINING

... in data mining technology brings serious threat to the individual ...of privacy preserving data mining (PPDM) is to safeguard the sensitive information contained in the ...of data mining ...

8

Privacy-Preserving Healthcare Architecture Using Blockchain

Privacy-Preserving Healthcare Architecture Using Blockchain

... patient data, preserving the privacy of patients appears to be ...patient data are usually stored in the cloud, which makes it difficult for the users to have enough control over their ...General ...

5

Protection of Sensitive Data for Multi-Level Trust Privacy Preserving Data Mining

Protection of Sensitive Data for Multi-Level Trust Privacy Preserving Data Mining

... Simple K means clustering is used for discovering groups and structures in the data. This algorithm randomly selects k number of objects, each of which initially represents a cluster mean or center. For remaining ...

6

Show all 10000 documents...

Related subjects