• No results found

[PDF] Top 20 Data protection. Data sharing code of practice

Has 10000 "Data protection. Data sharing code of practice" found on our website. Below are the top 20 most common "Data protection. Data sharing code of practice".

Data protection. Data sharing code of practice

Data protection. Data sharing code of practice

... When it becomes clear that the takeover or merger is going ahead you should consider when and how you will make individuals aware of what is happening. In some cases publicising the change will be sufficient, for example ... See full document

59

Data protection. The employment practices code

Data protection. The employment practices code

... Running a business necessarily involves keeping records about workers. Such records will contain information that is personal in nature and can affect a worker’s privacy. The Act does not prevent an employer from ... See full document

96

Code of practice for archivists and records managers under Section 51(4) of the Data Protection Act 1998

Code of practice for archivists and records managers under Section 51(4) of the Data Protection Act 1998

... of data subjects to block, erase or order the destruction of personal data they believe to be false (section 12A and section ...manual data processed only for historical research in accordance with ... See full document

67

Legal assessment tool (LAT): an interactive tool to address privacy and data protection issues for data sharing

Legal assessment tool (LAT): an interactive tool to address privacy and data protection issues for data sharing

... or sharing of human data, researchers are confronted with a lack of uniformity of legal requirements and differences in the use of legal ter- ...of data usage licenses and additional restrictions on ... See full document

19

Data Integrity Protection and Key Aggregation for Data Sharing In Cloud Computing

Data Integrity Protection and Key Aggregation for Data Sharing In Cloud Computing

... for code chunks, it also guarantees that the generated linear combinations always satisfy the MDS property to ensure data availability, even after iterative ...MDS code for general ... See full document

6

Linked Data Contracts to Support Data Protection and Data Ethics in the Sharing of Scientific Data

Linked Data Contracts to Support Data Protection and Data Ethics in the Sharing of Scientific Data

... personal data. GDPR addresses the processing and move- ment of personal data, replacing the 1995 Data Protection ...personal data as “information relating to an identified or ... See full document

8

Framework code of practice for sharing personal information

Framework code of practice for sharing personal information

... good practice in the handling of personal information. ‘Good practice’ means practice that appears to the Commissioner to be desirable, having regard to the interests of individuals and the ... See full document

24

Department of Education and Skills. Protection of Personal Data. Code of Practice

Department of Education and Skills. Protection of Personal Data. Code of Practice

... the data could be said to be not readily ...the data subject would need to be able to identify particular data by fil reference or date so that on a reasonable view of things the data coul be ... See full document

26

FARMAINDUSTRIA S STANDARD CODE ON PERSONAL DATA PROTECTION IN CLINICAL RESEARCH AND PHARMACOVIGILANCE

FARMAINDUSTRIA S STANDARD CODE ON PERSONAL DATA PROTECTION IN CLINICAL RESEARCH AND PHARMACOVIGILANCE

... the data were correctly recorded, analysed and reported in accordance with the study Protocol, Standard Operating Procedures (SOP), the rules on Good Clinical Practice and regulatory ...Personal Data ... See full document

156

MANAGING AND SHARING DATA

MANAGING AND SHARING DATA

... encrypting data to enable secure data transmission from government departments to the Archive, the UK Data Archive recommends the use of Pretty Good Privacy (PGP), an industry-standard encryption ... See full document

40

Five key strategic priorities of integrating patient generated health data into United Kingdom electronic health records

Five key strategic priorities of integrating patient generated health data into United Kingdom electronic health records

... Ideally, the way information is presented is flexible and sensitive to individual contexts/roles so that different clini- cal users only see patient-generated information they need for the task at hand. In this respect, ... See full document

6

Sharing geographic data

Sharing geographic data

... if data is to be successfully translated from one schema to another, manually or ...for sharing geographic data should be developed, based upon current and future standards for both data ... See full document

14

Data sharing framework for naturalistic driving data

Data sharing framework for naturalistic driving data

... proposed Data Sharing Framework for data collected in Field Operational Tests and in Naturalistic Driving ...gather data regarding the driver behaviour in relation to the vehicle, ITS and ... See full document

8

Innovations and Data Sharing

Innovations and Data Sharing

... Data: Mission Possible Providers  Enrollment  Attendance  Child Health  Staff Credentials  Payment data  Child Assessment Data Trust Agency  Contractual Agreements?.  What data[r] ... See full document

34

Data Sharing in the US

Data Sharing in the US

... FOT data, the US DOT is using its Saxton Transportation Operations Laboratory at the Turner Fairbank Highway Research Center (TFHRC) as a secure repository, with access granted to researchers and interested ... See full document

31

data sharing review

data sharing review

... 3.2 For practitioners dealing with everyday questions about whether or not to share information, the picture is often confused. The absence of clear legal advice either specifically sanctioning or preventing information ... See full document

5

DATA PROTECTION: TOP THREATS TO DATA PROTECTION AND  SOLUTIONS

DATA PROTECTION: TOP THREATS TO DATA PROTECTION AND SOLUTIONS

... including data object contents, time and location of the access, purpose of the ...improper data accesses and the opportunities for insiders to steal ...restrict data accesses with respect to time ... See full document

5

Survey on Personal Data Protection in the IoT

Survey on Personal Data Protection in the IoT

... a data sanitization method collectively manipulating user profile and friendship ...various data-manipulating ...various data manipulating methods to guarantee sanitizing user data does not ... See full document

5

A Platform for sharing data from field operational tests

A Platform for sharing data from field operational tests

... in data sharing concern procedures for application and approval, and templates for application, data re-use in consent forms, data sharing agreements and data sharing ... See full document

5

An Emerging Trend of Big Data for High Volume and Varieties of Data to Search of Agricultural Data

An Emerging Trend of Big Data for High Volume and Varieties of Data to Search of Agricultural Data

... The data in amount of large size in world is growing day by day. Data is growing because of use of digitization, internet, smart cell and social media and ...of data sets which is very large in size ... See full document

6

Show all 10000 documents...