4,844 results on '"personal data"'
Search Results
202. Educational Sovereignty and Artificial Intelligence Challenges: The Case of Morocco
- Author
-
Hajji, Said, Yu, Shengquan, Series Editor, Bittencourt, Ig Ibert, Series Editor, and Roumate, Fatima, editor
- Published
- 2023
- Full Text
- View/download PDF
203. Legal Protection of Borrower’s Personal Data in Online Loan Application Services
- Author
-
Kurnianta, I Komang Bintang, Sastrawan, I Made Indra, Mahaputra, I. B. Gede Agustya, Striełkowski, Wadim, Editor-in-Chief, Black, Jessica M., Series Editor, Butterfield, Stephen A., Series Editor, Chang, Chi-Cheng, Series Editor, Cheng, Jiuqing, Series Editor, Dumanig, Francisco Perlas, Series Editor, Al-Mabuk, Radhi, Series Editor, Scheper-Hughes, Nancy, Series Editor, Urban, Mathias, Series Editor, Webb, Stephen, Series Editor, Budiartha, I Nyoman Putu, editor, Saptomo, Ade, editor, Verhezen, Peter, editor, Idris, Siti Hafsyah, editor, Angela Soares, Cesaltina, editor, Lisdiyono, Eddy, editor, Santiago, Faisal, editor, Pratomo, Eddy, editor, Sudiro, Ahmad, editor, and Susanto, Anthon Freddy, editor
- Published
- 2023
- Full Text
- View/download PDF
204. Data Protection and Freedom of Information
- Author
-
Abela, Stefan and Abela, Stefan
- Published
- 2023
- Full Text
- View/download PDF
205. SGRC System as a Basis for Building Business Processes and Measuring the Digital Sustainability of a Business
- Author
-
Yashkin, Vyacheslav V., Kesel, Sergey A., Makovey, Sergey O., Domnikov, Alexandr S., Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Silhavy, Radek, editor, Silhavy, Petr, editor, and Prokopova, Zdenka, editor
- Published
- 2023
- Full Text
- View/download PDF
206. Open Banking, Access to Account Rule and (Free) Marketability of Banking Data
- Author
-
Foà, Daniel, Busch, Danny, Series Editor, Gortsos, Christos V., Series Editor, Sciarrone Alibrandi, Antonella, Series Editor, Böffel, Lukas, editor, and Schürger, Jonas, editor
- Published
- 2023
- Full Text
- View/download PDF
207. The Existence of Financial Services Authority in Protecting Personal Data Users of Peer-to-Peer Lending Financial Technology
- Author
-
Ramadhani, Dwi Aryanti, Sakti, Muthia, Wahyuningsih, Yuliana Yuli, Putri, Nabila Amelia, Striełkowski, Wadim, Editor-in-Chief, Black, Jessica M., Series Editor, Butterfield, Stephen A., Series Editor, Chang, Chi-Cheng, Series Editor, Cheng, Jiuqing, Series Editor, Dumanig, Francisco Perlas, Series Editor, Al-Mabuk, Radhi, Series Editor, Scheper-Hughes, Nancy, Series Editor, Urban, Mathias, Series Editor, Webb, Stephen, Series Editor, Meliala, Aurora Jillena, editor, Azaria, Davilla Prawidya, editor, Lydia, Jennifer, editor, Maratovich, Adibæv Açet, editor, Brown, Collie, editor, and Cason, Christopher, editor
- Published
- 2023
- Full Text
- View/download PDF
208. The Metaverse as a New Space for Political Communication
- Author
-
Ricoy-Casas, Rosa María, Howlett, Robert J., Series Editor, Jain, Lakhmi C., Series Editor, López-López, Paulo Carlos, editor, Barredo, Daniel, editor, Torres-Toukoumidis, Ángel, editor, De-Santis, Andrea, editor, and Avilés, Óscar, editor
- Published
- 2023
- Full Text
- View/download PDF
209. User Data Protection in Computer Networks
- Author
-
Borisov, Alexey, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, and Guda, Alexander, editor
- Published
- 2023
- Full Text
- View/download PDF
210. Facial Recognition Technology and Ensuring Security of Biometric Data: Comparative Analysis of Legal Regulation Models
- Author
-
D. Utegen and B. Zh. Rakhmetov
- Subjects
biometric authentication ,biometric data ,digital technologies ,facial recognition ,technologies ,identification ,law ,legal regulation ,personal data ,privacy ,security ,Law - Abstract
Objective: to specify the models of legal regulation in the sphere of biometric identification and authentication with facial recognition technology in order to elaborate recommendations for increasing information security of persons and state-legal protection of their right to privacy.Methods: risk-oriented approach in law and specific legal methods of cognition, such as comparative-legal analysis and juridical forecasting, are significant for the studied topic and allow comparing the legal regulation models used in foreign countries and their unions in the sphere of biometric identification and authentication with facial recognition systems, forecasting the possible risks for the security of biometric data, taking into account the prospects of further dissemination of the modern facial recognition technology, and to shape recommendations on legal protection of biometric data.Results: the ways are proposed to further improve legislation of the Republic of Kazakhstan and other countries currently developing the legal regulation of biometric data, regarding the admissible criteria for using the facial recognition technology, the elaboration of categorization of biometric systems with a high and low risk levels (by the example of the experience of artificial intelligence regulation in the European Union), and the necessity to introduce a system of prohibitions of mass and unselective surveillance of humans with video surveillance systems, etc.Scientific novelty: consists in identifying a positive advanced foreign experience of developing legal regulation in the sphere of facial recognition based on biometry (European Union, the United States of America, the United Kingdom of Great Britain and Northern Ireland), which can be used for further improvement of the national legislation in order to create more effective mechanisms of legal protection of personal data, including biometric information.Practical significance: based on risk-oriented approach and comparative analysis, the research allows elaborating measures for enhancing the legal protection of biometric data and ensuring effective protection of civil rights and freedoms by forecasting further expansion of the modern facial recognition technology.
- Published
- 2023
- Full Text
- View/download PDF
211. Data Identification in Current Population Accounting
- Author
-
A. V. Zhivitsa
- Subjects
information and communication technologies ,personal data ,identification ,population accounting ,management ,digital economy ,Information technology ,T58.5-58.64 - Abstract
The article considers issues related to the use of data identifiers in current population accounting. The author’s classification of methods for identifying personal data a with an indication of their advantages and disadvantages is presented. The dangers of using identification numbers are defined. Particular attention is paid to the problem of repeated formation of identification numbers and ways to prevent it and stop the consequences. Proposals on the use of identification numbers in the created information resources are formed.
- Published
- 2023
- Full Text
- View/download PDF
212. Prioritizing Personal Data Protection in Insurance Organizations: A Review
- Author
-
Cosmas Knowen, Lamek Ronoh, and Anne
- Subjects
personal data ,digital twin ,personal management information systems ,personally identifiable information ,data anomalies ,information security ,Criminal law and procedure ,K5000-5582 ,Cybernetics ,Q300-390 - Abstract
This literature review focuses on the importance of prioritizing personal data security in insurance organizations in the context of Web 2.0 and the fourth industrial revolution. With the increasing use of digital transactions and data sharing, there is a need for improved data security postures to mitigate vulnerability issues. Personal data is a valuable asset that is targeted by malicious individuals, which highlights the importance of establishing proactive and trustworthy security frameworks. The study evaluates the security threats associated with the collection, processing, storage, and retention of personal data in insurance organizations, and examines the legal and technical provisions for its protection. Through an analytical review methodology, this paper highlights the urgent need to establish robust data security measures to ensure that personal data is secure when held in the custody of insurance organizations and personal management information systems.
- Published
- 2023
- Full Text
- View/download PDF
213. Legal support for the development of sustainable and secure information and telecommunications infrastructure
- Author
-
Andrey L. Belousov
- Subjects
information ,security ,critical infrastructure ,regulation ,digitalization ,internet ,personal data ,Law - Abstract
The relevance of the work is due to the need to adapt regulatory mechanisms to the actively developing digitalization processes. On the other hand, in the context of growing cyber threats and increasing dependence of public relations on information and telecommunications technologies, the directions for the development of legislation that ensure stability and security of the relevant infrastructure are subject to a certain rethinking in the legal aspect. The subject of the study is the legal support for the development of a sustainable and secure information and telecommunications infrastructure. The purpose of the work is to identify key areas for improving legal regulation in the field of functioning and development of sustainable and secure information and telecommunications infrastructure. The study applies methods of analysis, synthesis and comparison, as well as literal and systematic interpretation of the norms of the current legislation in the field of functioning and developing sustainable and secure information and telecommunications infrastructure. Finally, conclusions are formulated regarding the need for the development of legal regulation in this area. The research outlines the specific directions for changing the legal field, which ensure the sustainable development of information and telecommunications infrastructure in the Russian Federation.
- Published
- 2023
- Full Text
- View/download PDF
214. Big Data Profiling and Predictive Analytics from the Perspective of GDPR
- Author
-
Maciej Siwicki
- Subjects
gdpr ,personal data ,profiling ,big data ,predictive analytics ,Law ,Political institutions and public administration (General) ,JF20-2112 - Abstract
The text analyses the normative regulations adopted by the Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (GDPR) in order to answer the question whether the said regulations properly balance the interests of both entities that use predictive analytics and profiling in their economic activity, and of persons whose data they process. As this type of processing is based on big data, the proper analysis of this issue had to begin with determining which types of data processed in such sets can be considered personal information and in what conditions they can be treated as such. Based on these findings, the study analyzed the duties imposed by the GDPR on entities processing personal data in situations when such information has been obtained from big data. This in turn made it possible to assess the adopted normative regulations as well as point to the possible solutions and development paths.
- Published
- 2023
- Full Text
- View/download PDF
215. Protection of personal data of the employee
- Author
-
S. M. Gusarov and K. Yu. Melnyk
- Subjects
personal data ,rights protection ,legal guarantees ,employee ,employer ,employment contract ,information. ,Law in general. Comparative and uniform law. Jurisprudence ,K1-7720 - Abstract
The article draws attention to the fact that today, in the conditions of a developed information environment, the wide spread and use of various information technologies and systems, the maintenance of automated databases, on the one hand, significantly simplifies the provision and use of information, on the other hand, the risk of illegal interference in personal data increases and family life of a person and misuse of his personal data. The entry into employment is preceded by the work of the employer’s personnel service on personnel selection, within which personal information is received from job applicants. The personnel service is also responsible for the collection, processing, storage and use of data about employees. Today, the use of various telecommunication systems and automated databases in this process increases the risks of disclosure of the employee’s personal information, which may cause him material or moral harm. So, modernity presents authorized state bodies and employers with the task of ensuring reliable protection of personal data of employees. The article examines the views of scientists regarding the categories “human rights protection” and “employee personal data”. Problematic aspects of the Code of Labor Laws of Ukraine, the Law of Ukraine “On Protection of Personal Data” and the draft Law of Ukraine “On Labor” regarding the completeness of legal regulations on the protection of personal data of employees are outlined. An author's definition of the terms “employee personal data” and “employee personal data protection” is proposed. Personal data of an employee is any information related to a specific natural person working on the basis of an employment contract, provided to the employer or collected by him in accordance with the law. The protection of personal data of an employee is the use of opportunities (tools) provided by law for the prevention of offenses in the field of collection, storage, use, destruction, dissemination of information related to a specific natural person working on the basis of an employment contract, termination of the specified offenses and renewal of violated rights in this area. Proposals for improving national legislation in the field of protection of personal data of employees are provided. In particular, it is proposed to supplement the Code of Labor Laws of Ukraine and the draft Law of Ukraine “On Labor” with a separate article “Protection of employee’s personal data”, which provides for the definition of the terms “employee’s personal data” and “employee’s personal data protection”; establish a list of information that is the employee’s personal data; establish the employer's obligation to protect the employee's personal data; establish disciplinary and material liability for employees performing work related to personal data processing for violation of personal data protection legislation, as well as material liability for employers for violation of personal data protection legislation.
- Published
- 2023
- Full Text
- View/download PDF
216. The Essence of Legal Protection of Personal Data of Customers In Banking Transactions
- Author
-
Nancy Silvana Haliwela
- Subjects
personal data ,banking ,legal protection ,Law - Abstract
Introduction: Banks as an institution are not only required to protect customer funds but are also obliged to maintain the confidentiality of customer personal data. Purposes of the Research: This paper aims to examine the regulations governing the protection of customers' personal data and to examine the supervision and law enforcement of the protection of banking customers' personal data. Methods of the Research: This research uses normative legal research methods with a statutory approach, conceptual approach, and case approach. The statutory approach relates to legislation on personal data protection and banking. The conceptual approach relates to the concepts of banking and personal data protection. The case approach relates to cases of supervision and law enforcement of violations or crimes of personal data of banking customers. Results of the Research: The results show that regulations governing customer data protection are contained in various laws and regulations related to personal data protection and banking and other technical regulations. In addition, the study results also show that supervision of the protection of personal data of banking customers has been carried out by three institutions that have supervisory authority, namely Bank Indonesia, the Financial Services Authority, and the Deposit Insurance Corporation. Law enforcement against violations and crimes against customers' personal data still faces challenges, because although there are many cases of crimes using customers' personal data, only a few can be enforced against crimes against customers' personal data.
- Published
- 2023
- Full Text
- View/download PDF
217. ZAŠTITA LIČNIH PODATAKA DJECE U EVROPSKOJ UNIJI.
- Author
-
Fetić, Derviša and Imamović, Emina
- Abstract
Copyright of Proceedings on Quality is the property of University of Zenica, Faculty of Mechanical Engineering and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
218. الحماية الجنائية لحق الإنسان في الخصوصية الرقمية دراسة تحليلية مقارنة ".
- Author
-
وليد سمير المعدا
- Subjects
INFORMATION technology ,DIGITAL technology ,SOCIAL media ,DATA privacy ,INTERNET security ,PERSONALLY identifiable information - Abstract
Copyright of Police Thought is the property of Sharjah Police Research Center and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
219. PRIVACY-SHIELDING AUTONOMOUS SYSTEMS FOR NATURAL DISASTER MANAGEMENT (NDM): Targeted Regulation of the use of Autonomous Systems for Natural Disaster Management Goals before the Materialization of the Privacy Harm.
- Author
-
BOUCHAGIAR, Georgios, MYGDALIS, Vasileios, and PITAS, Ioannis
- Subjects
- *
EMERGENCY management , *MATERIALIZATION , *DATA protection , *GENERAL Data Protection Regulation, 2016 - Abstract
This contribution aims to recommend a fully-fledged privacy-assessment applicable to future uses of Autonomous Systems (AS) for Natural Disaster Management (NDM) purposes. It claims that certain implementations may interfere with the right to privacy and the protection of personal data and analyses challenges stemming from (non-) compliance with the General Data Protection Regulation (GDPR). Moreover, it subjects the use of autonomous systems to the European Court of Human Rights’(ECtHR) Legality – Legitimacy – Necessity testing (LLN-check). On this basis, it proposes a targeted and ex ante privacy-assessment to address legal uncertainty, resulting from the GDPR’s tech-neutrality and case law’s ex post (after the harm) adjudication. The recommended scheme, ideally involving experts from various disciplines who would moreover be independent, could apply before the actual use of any AS and give a ‘proceed’, a ‘proceed with conditions’ or a ‘do not proceed’ decision. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
220. The data subject’s right to access to information under GDPR and the right of the data controller to protect its know-how
- Author
-
Dominika Kuźnicka-Błaszkowsk
- Subjects
data access ,know-how ,confidential information ,personal data ,GDPR ,Law - Abstract
The data subject’s right to access information on data processing has a very broad meaning. Considering the latest developments in this field (mainly the CJEU ruling on Austrian posts and EDPB guidelines) one can draw the conclusion that the controller’s right to protect its confidential in-formation is limited and less valuable than the data subject’s rights. However, this may lead to unfair and unequal treatment of companies and data subjects. When looking at this right in a more systematic perspective, it seems that the model of the protection of personal data may go hand in hand with the controllers’ business interests. A different interpretation may lead to the discouragement of entrepreneurs, both EU and foreign, from conducting business in the European Union. This is not conducive to the development of the European market and certainly will not attract foreign capital.
- Published
- 2023
- Full Text
- View/download PDF
221. Platform landlords: Renters, personal data and new digital footholds of urban control
- Author
-
Megan Nethercote
- Subjects
Corporate landlords ,Rental housing ,Platforms ,Build to rent ,Data subjects ,Personal data ,Geography (General) ,G1-922 ,Social sciences (General) ,H1-99 - Abstract
Under digital capitalism, the interests of landed property and digital platforms are converging. This article explores this dynamic in rental homes operated by corporate landlords by querying how private equity, pension funds and other institutional investors mobilise renters’ personal data to extract value from their assets. This article argues that as corporate landlords embrace the logics of rentier platforms, data offers a new frontier of accumulation. ‘Double threat’ enclosure describes how the traditional material enclosure of real property and extraction of monetary rents combines with the digital enclosure of renter subjects and extraction of data rents to drive returns on rental investments. To make this argument, I dissect the corporate landlord as a rentier platform. This dissection foregrounds its digital infrastructures, data as the lifeblood of platforms, and datafication as the process of mobilising data to capture data rents. Build to rent (multifamily) provides a compelling case study as a growing global asset class. I show how corporate landlords compile sophisticated renter profiles, convert renter data into ‘operational metrics’, and leverage recursive feedback to drive operational efficiencies in asset management. Double threat enclosure effectively revises tenant/landlords relations in its attempts to: (1) transform renters into techno-economic objects (assets) increasingly legible only in these terms; (2) score, sort and stratify renters based on asset management imperatives of operational efficiency; (3) monitor, discipline and monetise renters with unprecedented intensity; and (4) exclude and invisibilise those who are unviable techno-economic objects. Double threat enclosure, with its new digital tools and sites (ie. renters; tech stacks) of accumulation, augments the financialization of housing and exacerbates risks to renters. The ramping up of private control over (data about) city residents/renters, expands concerns to include the way rental homes risks becoming a foothold for exercising power, not just extracting rents.
- Published
- 2023
- Full Text
- View/download PDF
222. The challenges of sharing data at the intersection of EU data protection and electricity market legislation: lessons from the Netherlands.
- Author
-
Espinosa Apráez, Brenda
- Subjects
- *
ELECTRICITY markets , *DATA protection , *INFORMATION sharing , *GENERAL Data Protection Regulation, 2016 , *DATA protection laws , *ELECTRICITY - Abstract
This article examines the interplay between the General Data Protection Regulation and the rules for access to consumer data introduced by the Recast Electricity Directive (2019/944). It brings insights from practice regarding the complexities of applying these two legal frameworks simultaneously by analysing a case from the Dutch electricity market. The case is constructed around a court decision that led Dutch distribution system operators to stop sharing consumers’ ‘personal data with suppliers for the purposes of preparing ‘personalised offers’. The article extracts lessons that can help EU member states when laying down or revising existing legal frameworks for access to consumer data on two main fronts: substantial alignment between data protection legislation and electricity market legislation, and the importance of strengthening cooperation between data protection authorities and energy regulators. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
223. ПЕРСОНАЛЬНІ ДАНІ: ДОКТРИНАЛЬНЕ ТЛУМАЧЕННЯ КАТЕГОРІЇ У НАУКАХ АДМІНІСТРАТИВНОГО ТА ІНФОРМАЦІЙНОГО ПРАВА.
- Author
-
Лютіков, П. С.
- Abstract
In the article, on the basis of a review of scientific and regulatory sources, an attempt is made to carry out a generalized analysis of doctrinal approaches to the definition of the content of the «personal data» category, to reveal tendencies and emphasis in solving the corresponding scientific task. It is noted that with the rapid development of methods, processes and methods of using computing equipment and communication systems for the creation, collection, transmission, search, processing and distribution of information, the integration of artificial intelligence in all spheres of social life, including technological processes of collection, processing and protection of personal data, the need to review the theoretical foundations of the legal institution of personal data, updating doctrinal approaches to understanding and interpreting the categorical series in this area is becoming more urgent. It is emphasized separately that the features of the legal regime of martial law definitely leave their mark on the personal data protection mechanisms. As a result of a generalized review of doctrinal approaches to defining the content of the «personal data» category, the author recognized the presence of a clear tendency in recognizing the need to detail the legal definition of personal data, as well as making changes to special legislation in this area. As a rule, researchers consider personal data as a special type of information, an object of administrative and/or informational legal relations, an object of protection, etc. In scientific research in the area of the raised issue, emphasis is placed on the importance of developing classification models of personal data with a number of various criteria in order to determine as deeply and systematically as possible all the components of the specified category. In some studies, the thesis about the correctness of the correlation of personal data with other related concepts and categories is emphasized, which has a significant impact not only on the results of scientific research, but also on law enforcement practice in this area. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
224. ЩОДО НЕОБХІДНОСТІ ВРАХУВАННЯ МІЖНАРОДНОГО ДОСВІДУ ПРАВОВОГО РЕГУЛЮВАННЯ У СФЕРІ ЗАХИСТУ ІНФОРМАЦІЇ ПРО ДИТИНУ.
- Author
-
Бочкова, І. І., Врублевська-Місюна, К. М., and Тичина, В. П.
- Abstract
The article examines the relevance of personal data protection, in particular of children, in the context of the rapid development of the Internet and the information sphere. The author analyzes the principles and peculiarities of legal regulation of children's personal data protection as defined by the UN Convention and the Law of Ukraine "On Protection of Childhood". The author assesses the impact of the Data Protection Regulation on Ukrainian legislation and the need for harmonization with European standards for the full protection of children's personal data. Comparison of the provisions of the Regulation with the national legislation reveals significant differences, in particular, the absence of separate regulation of children's personal data and the principles of processing such data. The author expresses a position on the need to harmonize Ukrainian legislation with European standards as an important component of effective personal data protection. The author also analyzes the provisions of the Draft Law No. 8153 "On Personal Data Protection" and concludes that the Draft Law is aimed at establishing compliance with European standards, expanding the principles of data processing and establishing new consent requirements. Important changes relate to terminology, processing rules, protection of children's data, financial responsibility and other aspects, however, the issue of protection of children's personal data as a separate category has not been given due attention. The author concludes that today the issue of personal data protection, in particular of children, is regulated by numerous international and national legal acts. At the same time, it is noted that the EU Regulation provides for special protection of children's rights, which is different from the Law of Ukraine "On Personal Data Protection", and Draft Law No. 8153 leaves aside the issue of protection of personal data of a child specifically. As a result, it is noted that in order to reduce risks, it is necessary to take into account the principles of the Regulation in national legislation, in particular transparency and limitation of settings. It is also important to raise the legal culture of citizens in the field of personal data protection, contributing to the improvement of the regulatory environment [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
225. ГАРАНТІЇ ЗАХИСТУ ПЕРСОНАЛЬНИХ ДАНИХ ВІЙСЬКОВОЗОБОВ'ЯЗАНИХ ПІД ЧАС ЇХ ВИКОРИСТАННЯ В ДЕРЖАВНИХ РЕЄСТРАХ ДЛЯ ВІЙСЬКОВОГО ОБЛІКУ.
- Author
-
Бойко, Б. В.
- Abstract
It is indicated that the guarantees of protection of personal data of conscripts are a system of conditions, principles, legal and organizational means established by law, which ensure the protection of information or a set of information about a person-conscript, who is identified or can be specifically identified for the purpose of implementation by such persons constitutional rights and freedoms in legal relations arising during mobilization training and/or mobilization. The author emphasized that the need to make operational and immediate decisions significantly reduces the potential of the principle of scientificity, the observance and consideration of which is important on the way to the development of the most optimal solution. In particular, in such a difficult situation, in which vital decisions have to be made, quite natural questions arise in the area of timeliness, adequacy of such decisions, their compliance with the Constitution and laws of Ukraine. In the author's opinion, one of the similar issues is the search for ways to ensure the protection of personal data of conscripts during their use in state registers for military registration. Legal and organizational ways aimed at ensuring the protection of personal data of conscripts and other persons during their receipt, processing and use by electronic register tools are proposed, in particular: amend the draft law aimed at avoiding the exchange of data between state registers and their owners and administrators as such, which contradicts the Constitution and laws of Ukraine; clearly define the list of persons (as well as the professional requirements for them) with the right of access to the electronic register in order to reduce the negative impact of the so-called human factor of illegal use or "negligent leakage" of personal data from the register's information bases; by analogy with positive foreign experience, publish certificates and detailed technical information (including the source code) of the corresponding software product, which should confirm the high technical level of protection of the electronic information and telecommunications system; provide for administrative and criminal liability for illegal receipt, distribution and use of personal data of conscripts and other persons, illegal interference in the work of the electronic register, etc. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
226. КОНФІДЕНЦІЙНІСТЬ АДВОКАТСЬКОЇ ДІЯЛЬНОСТІ
- Author
-
Л. А., Остафійчук
- Abstract
The article examines the principle of attorney-client privilege in the system of the principles of the Advocacy and Practice of Law, and also the possibility of using electronic technologies and artificial intelligence by an attorney when providing legal assistance to a client in the context of ensuring compliance with the principle of attorney-client privilege. It is proved that the principles of the advocacy are the central, leading segments of the principles of the Advocacy, but the «principles of organization and operation of the Advocacy» as a legal institution and the «principles of the Practice of Law» on which the professional activities of attorneys-at-law are based can and should be separated from each other . It is established that the general prerequisite for distinguishing any principle of the Practice of Law is its significance, general nature, clarity and comprehensibility. The principle of confidentiality in the practice of law is fundamental since this principle is directly enshrined in Ukrainian legislation. However, in terms of observance of the principle of confidentiality of the Practice of Law, it is required not only from the attorney but also from the client to prevent information leakage to other users when using information technologies. When using the capabilities of artificial intelligence in the provision of legal aid, the author recommends that a separate clause of the contract should be provided for, whether the client allows the attorney to use artificial intelligence technologies in the prov ision of legal aid and to what extent. It is concluded that along with the progress and simplification of procedures, uncontrolled use of artificial intelligence by an attorney-at-law may lead to a violation of the principle of confidentiality of the attorney's practice of law against the will of the attorney-at-law. Under any circumstances, when using artificial intelligence technologies, an attorney-at-law is prohibited from entering any personal data of a client or any other data which may identify the client in order to avoid leakage of confidential information. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
227. Tiny, Always-on, and Fragile: Bias Propagation through Design Choices in On-device Machine Learning Workflows.
- Author
-
HUTIRI, WIEBKE (TOUSSAINT), DING, AARON YI, KAWSAR, Delft FAHIM, and MATHUR, AKHIL
- Subjects
MACHINE learning ,SOFTWARE engineering ,PERSONALLY identifiable information ,EXHIBITION buildings ,WORKFLOW ,DESIGN - Abstract
Billions of distributed, heterogeneous, and resource constrained IoT devices deploy on-device machine learning (ML) for private, fast, and offline inference on personal data. On-device ML is highly context dependent and sensitive to user, usage, hardware, and environment attributes. This sensitivity and the propensity toward bias in ML makes it important to study bias in on-device settings. Our study is one of the first investigations of bias in this emerging domain and lays important foundations for building fairer on-device ML. We apply a software engineering lens, investigating the propagation of bias through design choices in on-device ML workflows. We first identify reliability bias as a source of unfairness and propose a measure to quantify it. We then conduct empirical experiments for a keyword spotting task to show how complex and interacting technical design choices amplify and propagate reliability bias. Our results validate that design choices made during model training, like the sample rate and input feature type, and choices made to optimize models, like light-weight architectures, the pruning learning rate, and pruning sparsity, can result in disparate predictive performance across male and female groups. Based on our findings, we suggest low effort strategies for engineers to mitigate bias in on-device ML. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
228. Data sharing decisions: Perceptions and intentions in healthcare.
- Author
-
Kharlamov, A., Hohmann, R., and Parry, G.
- Abstract
This article aimed to capture and understand individual's intentions to share data, focusing on data individuals perceive as most sensitive: healthcare data. The study reviews literature related to the decision‐making process with regard to sharing personal data. The context is the UK National Health Service, and measures from literature are used to analyze individual's intention to share healthcare data. A scale is developed and applied to evaluate the decision to share healthcare data. Measurement constructs include intention to disclose, perceived protection, benefits, risk, subjective norms, and perception of use. Analysis draws on data from 129 survey respondents. Though numerous measurements are reported in literature and used in this study, two predictors dominate intention to disclose healthcare data: perceived information risk (PIR) and perceived societal benefit (PSB), and both are significant. PIR contributes negatively, whereas PSB contributes positively to predict intention. For personal healthcare, the privacy paradox applies as though risk may outweigh benefit people rarely opt out of data sharing. Individuals consciously or unconsciously consider their perception of the risk and broader benefits of data sharing. Both risk and benefit are both significant and important; perceived risk carries more weight than perceived benefits. Organizations need to develop campaigns to very clearly explain risks and benefits of personal data sharing to ensure that individuals can make truly informed decisions. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
229. Data are in the eye of the beholder: Co‐creation for sustainable personal data value.
- Author
-
Stelmaszak, Marta and Parry, Glenn
- Abstract
Recent scholarship re‐casts the value of data from financial to value in use, where value is a multi‐faceted, dynamic, emergent construct, co‐created by stakeholders. To date, the dynamics of the co‐creation of value from the use of personal data have been investigated from the starting point of use. However, personal data do not have inherent value, rather their value emerges during design against projected future use. We conducted a case study of the development of a personalized e‐book and captured the different perceptions of the value of personal data from firm, intermediary, and customer perspectives, namely means to an end, medium of exchange, and net benefit, respectively. The diversity of perspectives highlights ontological differences in the perception of what data are, which in turn creates epistemological tensions and different expectations of the characteristics of data embedded in value co‐creation. By detailing how the value of personal data is co‐created in practice, we argue that co‐creation during design creates conditions for sustainable data value necessary for the continuing operation of products and services based on personalization. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
230. ENSURING CONSTRUCTION WORKERS LEGAL PROTECTION: A LEGAL ANALYSIS OF CONSTRUCTION COMPETENCY CERTIFICATES UNDER THE LAW ON PERSONAL DATA PROTECTION AND BLOCKCHAIN FRAMEWORKS.
- Author
-
Afrilies, Marlia Hafny, Lina, Angie Angel, Theresia, Maria, Simanjuntak, Efendi, Naili, Yuris Tri, Garunja, Evis, and Aboobaider, Burhanuddin bin Mohd
- Subjects
- *
DATA protection , *PERSONALLY identifiable information , *CONSTRUCTION workers , *DATA protection laws , *ENGINEERING standards , *PUBLIC housing - Abstract
National development towards Indonesia 2045 is massively carried out, based on the Coordinating Minister for Economic Affairs Regulation Number 21 of 2022 that Indonesia has 210 development projects and 12 programs, in December 2022 a total of 152 projects have been implemented and are fully operational. Realizing national development, Construction Service Business Entities require Construction Workers to certify so that the quality and qualifications of the workforce can be recognized and professional accountability is formally clear. However, the security of the professional certificate of construction services is not guaranteed. The research uses normative juridical methods by examining all regulations related to the issues discussed. Determining the qualifications of construction service business entities that are assessed, one of which is the availability of construction labor. The procedures and flow of procedures for implementing construction work competency certificates are regulated in the Regulation of the Minister of Public Works and Public Housing Number 8 of 2022 concerning Procedures for Implementing the Fulfillment of Construction Service Standard Certificates in order to support the ease of business licensing for construction service business actors. Repressive efforts in cybercrime are guaranteed by Law No. 27 of 2022 on Personal Data Protection. To prevent cybercrime in the LPJK data storage system, it can cooperate with the Ministry of Communication and Information Technology regarding the policy of using Blockchain. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
231. Research on Price Discrimination Behavior Governance of E-Commerce Platforms—A Bayesian Game Model Based on the Right to Data Portability.
- Author
-
Yu, Jing and Jia, Wensheng
- Subjects
- *
PRICE discrimination , *PRICE sensitivity , *ELECTRONIC commerce , *BIG data , *PERSONALLY identifiable information , *CONSUMERS - Abstract
The behavior of e-commerce platforms using big data algorithms to implement "big data killing" is not only rejected by regular customers, but also creates many difficulties for supervision by relevant government departments. In order to study how to curb the price discrimination behavior of e-commerce platforms in the case of taking regular customers as the leaders, this paper introduces the right to data portability and considers two types of regular customers with high price sensitivity and low price sensitivity. Then, we build a Bayesian game model between e-commerce platforms and regular customers on the basis of the established general game model. Our experiments show that when the reuse value coefficient of personal data is high, the e-commerce platform will choose a uniform pricing strategy, which indicates that the right to data portability can curb the price discrimination behavior of the e-commerce platform to a certain extent. Moreover, when the proportion of high-sensitivity consumers among regular customers increases, e-commerce platforms will be prompted to choose the uniform pricing strategy, which indicates that consumers can curb price discrimination behaviour on e-commerce platforms by increasing their sensitivity for price change. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
232. Privacy Calculus Theory in the Digital Government Context: The Case of Taiwan's New eID Policy.
- Author
-
Huang, Zong-Xian and Huang, Tong-yi
- Subjects
- *
INTERNET in public administration , *IDENTIFICATION cards , *CALCULUS , *STRUCTURAL equation modeling , *PERSONALLY identifiable information - Abstract
Based on the case of the national electronic identification card (New eID) policy in Taiwan, this study integrated the government's components with a privacy calculus model to analyze factors which affect personal data disclosure intention. Partial least squares structural equation modeling (PLS-SEM) was used to analyze the survey data and explore how citizens balance benefits and risks associated with the New eID issue. The research results suggested that financial compensation, personalized services, and service compatibility can enhance cognition of privacy-related benefits of citizens, while this cognition will further increase willingness to authorize their personal data. Moreover, the impact of government elements on citizens' willingness to authorize their personal information also has statistical backings. Citizens' cognition of privacy-related risks, however, has no statistical effect within the model, which is contrary to findings from previous studies. The study attempted to make contributions to supplementing the connotation of an extant theoretical framework, and discussed the privacy-related questions concerning digital government. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
233. The Internet of Bodies—alive, connected and collective: the virtual physical future of our bodies and our senses.
- Author
-
Boddington, Ghislaine
- Subjects
- *
SOMATIC sensation , *INTERNET , *VIRTUAL reality , *ECONOMIC forecasting , *BEHAVIORAL economics - Abstract
This paper is going to discuss, what will be called, 'The Internet of Bodies'. Our physical and virtual worlds are blending and shifting our understanding of three key areas: (1) our identities are diversifying, as they become hyper-enhanced and multi-sensory; (2) our collaborations are co-created, immersive and connected; (3) our innovations are diverse and inclusive. It is proposed that our bodies have finally become the interface. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
234. Identity Theft, Trust Breaches, and the Production of Economic Insecurity.
- Author
-
Brensinger, Jordan
- Subjects
- *
SOCIAL theory , *SOCIAL networks , *IDENTITY theft , *RACE , *CRIME victims , *EXPERIENCE , *SOCIOECONOMIC factors , *INTERPERSONAL relations , *PSYCHOLOGICAL adaptation , *WORRY , *TRUST , *SECONDARY analysis - Abstract
Across various domains of social life, organizational reliance on personal data and exposure to unanticipated financial hardship have transformed Americans' life chances and access to opportunities. This article examines an area where they intersect: the hardship caused by breakdowns in information systems. I focus on the case of identity theft, showing how that event—experienced by tens of millions of Americans annually—contributes to economic insecurity. To do so, I first develop a theory of insecurity that links feelings of precariousness to breaches of trust at three levels: interpersonal, organizational, and systemic. Drawing on an original qualitative study of identity theft resolution, I find that most victims worried about their financial lives because they could no longer count on certain people, organizations, or systems. Beneath this commonality, race and class informed feelings of insecurity and associated coping strategies following identity theft. Low-income people and people of color tended to direct suspicion at personal networks and report ending relationships and informal assistance. In contrast, middle- and upper-income and White individuals disproportionately blamed organizations and demanded their protection. These findings—along with the trust-based theory that helped make them visible—have important implications for the study of insecurity, inequality, and trust in the information age. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
235. PUBLICITATEA PERSONALIZATĂ ȘI SELECTAREA TEMEIURILOR LEGALE PENTRU PRELUCRAREA DATELOR PERSONALE DE CĂTRE PLATFORMELE DIGITALE.
- Author
-
GOICOVICI, Juanita
- Abstract
Copyright of Studia Universitatis Babes-Bolyai, Iurisprudentia is the property of Babes-Bolyai University, Cluj-Napoca, Romania and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
236. ПРАВА СУБ'ЄКТІВ ПЕРСОНАЛЬНИХ ДАНИХ ЯК СКЛАДОВА ІНФОРМАЦІЙНИХ ПРАВ ЛЮДИНИ
- Author
-
І. І., Бочкова and К. М., Врублевська-Місюна
- Subjects
PERSONALLY identifiable information - Abstract
In the preamble to the Constitution, Ukraine proclaimed its course towards European integration, which, in particular, includes cooperation in the field of information human rights protection - protection of personal data on the basis of approximation of national legislation to the strictest EU regulations. The article analyzes the concept of information human rights in the context of the rule of law, especially in the period of digital transformation. The main focus is on the actual enforcement of citizens' rights and freedoms, including information rights. The article analyzes the state of research in the field of information law, in particular, the concepts of "information rights", "rights to information", "information freedoms", as well as approaches to understanding information rights from the standpoint of various branches of law. The authors come to the conclusion that there are studies of the content of the relevant categories, but there is no study of the rights of data subjects themselves. The article examines the content of human information rights as a component of the legal status of a person in the State on the example of legal regulation of protection of the rights of personal data subjects in Ukrainian legislation and in the legal provisions of the European Union. When comparing the content of legal approaches to the regulation of common ideas in the presence of similar lexical constructions, the differences are revealed in the "spirit" of legal regulation: the European approach is characterized by anthropocentricity, human interests are the priority of regulation, and the grounds for exercising many of the rights of data subjects are their will, unlike national legislation, where the grounds for the emergence and exercise of some rights of personal data subjects are the facts of violation of other rights of these subjects. The article contains an analysis of the existing categories in the field of information rights, and provides a detailed analysis of the content of the elements of the concept of "personal data", in particular, the concepts of: "human identification", "identifiers in real life" and "identifiers in digital space". The study suggests that the transformation of Ukrainian legislation in the field of personal data protection is still ongoing, which opens the way for further research in this area. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
237. DETECTION OF NON-PERSONAL DATA LEADING TO USER IDENTIFICATION, INCLUDING RELATED RECOMMENDATIONS FOR THE FIELD OF AUTONOMOUS MOBILITY.
- Author
-
Lokaj, Zdeněk, Šrotýř, Martin, Vaniš, Miroslav, Janda, Ivo, and Ščerba, Tomáš
- Subjects
AUTONOMOUS vehicles ,DATA protection ,COMPUTER software ,LEGAL services ,DATA analysis - Abstract
This paper introduces the issue of personal and non-personal data in autonomous vehicles. Its main objective is to provide a procedure for determining the processed and retained data, to explain the current legal regulation that must be met, and to propose appropriate recommendations for each data category. Current law (and the regulatory framework which it has produced) generally distinguishes between two basic types of data, i.e. non-personal data and personal data. The phenomenon that a combination of several pieces of non-personal data may, under certain circumstances2, result in processing of personal data, which is subject to significant regulation, is not limited solely to the field of autonomous mobility. This paper deals with data classification in autonomous vehicles, focusing on the challenging cases of non-personal data that can turn into personal data. The initial stage involves identifying the data to be processed, followed by the classification of the identified data. Based on this classification, relevant legal obligations and recommendations are described. The primary objective of this article is to provide guidance to data administrators (or, to use the terminology of data protection laws, data controllers) in autonomous mobility, enabling them to identify data and take appropriate measures to ensure compliance with legal regulations. The ultimate aim is to ensure that data controllers adhere to legal requirements, a goal that is critical for all data controllers. Beyond that, this article should be relevant also for other stakeholders in the autonomous mobility ecosystem, such as vehicle manufacturers and their suppliers, software application and service providers, and others. [ABSTRACT FROM AUTHOR]
- Published
- 2023
238. KİŞİSEL VERİLERİ KORUMA KURULU KARARLARININ YERİNE GETİRİLMEMESİ KABAHATİ.
- Author
-
AŞKIN, Uğur
- Abstract
Copyright of Türkiye Adalet Akademisi Dergisi is the property of Justice Academy of Turkey and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
239. Law and technology: The impact of innovations on the legal system and its regulation.
- Author
-
Zyhrii, Olha, Trufanova, Yuliia, Parashchuk, Liliia, Sampara, Nadiia, and Tsvigun, Iryna
- Subjects
TECHNOLOGICAL innovations ,INFORMATION technology laws ,ARTIFICIAL intelligence ,DIGITAL technology ,DATA privacy ,DATA protection - Abstract
The relevance of this study is due to the introduction of technologies into the legal sphere, as well as their rapid development, which causes the inconsistency of conventional legislation with the emerging social relations. Thus, the purpose of this study was to research the impact of digital technologies on the modern legal society and their legislative regulation to formulate ways to improve and further develop this area. The methods used in this study were the following: historical, comparative legal, statistical, forecasting. The main results of this study are as follows: the concepts of technology, innovation, digitalisation, and artificial intelligence were investigated; the legal regulation of these concepts in both Ukrainian and foreign legislation was examined. The study also identified the main problems and risks associated with the use of digital technologies, including problems related to user security, personal data protection, copyright. Solutions and legislative changes regulating the field of technology were also covered using evidence from the United States of America, Switzerland, Japan, the United Kingdom, Canada. The study analysed the impact of artificial intelligence on the ethical aspects of the work of a lawyer. The study also highlighted the future vision and consequences of the use of technology in various spheres of public life. It was found that digitalisation and the introduction of technology into public spheres of life require flexibility and readiness for change from the legal sphere, as well as the need to strike a balance between innovative changes and the guarantee of fundamental human rights. Considering the international standards that were investigated, it was found that the key area that requires additional protection in the digital age is data privacy and confidentiality. The findings of this study can be used as a basis for improving the legislative framework that governs relations in the field of technology use by lawyers, sociologists, and legislators. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
240. GARANȚII PROCEDURALE DE PROTECȚIE A DATELOR CU CARACTER PERSONAL ÎN CADRUL PROCEDEELOR PROBATORII DIN REPUBLICA MOLDOVA ȘI ROMÂNIA PENTRU CARE NORMELE DE PROCEDURĂ PENALĂ ADMIT IMIXTIUNI ÎN VIAȚA PRIVATĂ.
- Author
-
CRISTEA, DANIEL
- Subjects
DATA protection laws ,DATA protection ,INTEGRITY ,CRIMINAL procedure ,GENERAL Data Protection Regulation, 2016 ,INFORMATION technology security - Abstract
The interest in studying the protection of personal data in the criminal trial is developing and will continue as no references have been made or studied over the years except for the protection of personal data in general, not also in the criminal trial, and the emergence of the new legislative framework of the EU, by adopting EU Regulation No 679/2016 and EU Directive No 680/2016, requires new changes to be made and created in the field of criminal trial, in order to fully ensure the protection of personal data of the parties. EU Regulation 679/2016 on data protection, which has been applied in Romania since 25 May 2018, provides an updated legal framework, based on the responsibility for data protection. It aims to create a unified framework for the protection of personal data of the EU citizens, granting them more rights and control facilities than they previously had over their own data and, therefore, more obligations and responsibilities for the organizations that manage the data. There are mainly two aspects of the regulation: the protection of the rights of the persons concerned and the confidentiality of their data. Both aspects have technological implications. In order to cope with the complexity of the types of threats regarding information security and because information security is permanent, an information security management system must be established, implemented and maintained, focusing on the three concepts of information: security/privacy, integrity and availability. EU Regulation 679/2016 is a big step forward in personal data protection legislation. By replacing Directive 95/46/CE, a uniform legislative framework was ensured throughout the EU and beyond, considered less vulnerable to the interpretations of the member states. It brings clear benefits by emphasizing the importance of maintaining limited access to personal data, as well as the importance of personal data in preserving personal integrity and fundamental freedoms. Personal data, although it has and had a fabulous economic potential, could be exploited too easily, which is why the EU wanted to prevent possible abuses by establishing a more restrictive legislative framework. Many data processors have had to revise their consent collection policies and thus the users have had more control over their personal data. Thus it was created the possibility, on the one hand, for citizens to check the way personal data is collected and used, and, on the other hand, for the authorities to control and prevent their use (we consider them of defence for the proper functioning within the criminal prosecution activities). While EU Regulation 679/2016 replaces Directive No 46/1995/CE, the data processing in the segment of crime prevention, criminal prosecution and execution of criminal sanctions is included in Directive (EU) 2016/680 on the protection of natural persons with regard to the processing of personal data by competent authorities for the purposes of the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, and on the free movement of such data, and repealing Council Framework Decision 2008/977/JHA, in force since May 2016, which has as its regulatory object the protection of natural persons regarding the processing of personal data by the competent authorities for the purpose of preventing, detecting, investigating or prosecuting offences or of executing the penalties and regarding the free circulation of this data. In this sense, special attention must be paid to the connection of the provisions of the Criminal Procedure Code with the new legislative framework, Directive (EU) 2016/680 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data by competent authorities for the purposes of the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, and on the free movement of such data, and repealing Council Framework Decision 2008/977/JHA and the General Regulation 2016/679 EU of the European Parliament and of the Council regarding the protection of natural persons with regard to the processing of personal data and the free movement of such data and the repeal of Directive 95/46/EC (General Data Protection Regulation), as they have brought improvements with regard to the regulatory norms and within the application of criminal procedure. The Criminal Procedure Codes, from Romania and the Republic of Moldova, do not expressly provide for the application of the protection of personal data of the parties in the trial, there being shortcomings that can be taken advantage of. In this sense, appropriate technical and organizational measures for the implementation of data protection principles must be implemented, at the same time with the application of the criminal procedure. The application of criminal procedures must also be designed and built taking into account the principles of the regulations in force on the protection of personal data and must provide guarantees for data protection (for example, pseudonymization or anonymization where appropriate), but also to use the highest possible privacy settings by default. We believe that the existence of personal data protection legislation, EU Regulation 679/2016 and EU Directive 680/2016, without clear application rules in the field of criminal procedure, which must fully ensure the protection of the personal data of parties, is not a sufficient one and, therefore, does not correspond to the expectations of a democratic society, which is why this presentation will be a presentation on the identification and implementation of some procedural guarantees for the protection of personal data in the evidentiary procedures for which the rules of criminal procedure admit interferences in the private life. Objectives: - arguing the need to study the identification and implementation of some procedural guarantees for the protection of personal data within the evidentiary procedures for which the rules of criminal procedure admit intrusions into private life; - the analysis of the rules provided by the Criminal Procedure Code of Romania and the Criminal Procedure Code of the Republic of Moldova regarding the study in question; - the identification of the circumstances of violations within the evidentiary procedures of the personal data of the parties, with examples also from the case law. The research results and the theoretical and practical implications of the study. It represents an attempt to analyze the positive and critical aspects, the formulation of the own ideas regarding the identification of some procedural guarantees for the protection of personal data within the evidentiary procedures for which the rules of criminal procedure admit interferences in the private life. On the other hand, practical aspects of the ECHR case law related to violations of the protection of personal data in the criminal trial of the parties were addressed, in order to emphasize its particularities in practice to the legal bodies. The study carried out in this way allows to establish the directions and trends of the procedural-criminal policy promoted in Romania and the Republic of Moldova on the line of ensuring and realizing the right to the protection of personal data within the evidentiary procedures. The theoretical, normative and empirical material was used in the elaboration of this article. Likewise, the research of the respective subject is possible by applying several methods of scientific investigation specific to the theory: the logical method, the method of comparative analysis, the analytical method, the method of sociological research etc. The examination and analysis of the normative framework in the Republic of Moldova and Romania is aimed at the compliance and the implementation of some procedural guarantees for the protection of personal data within the evidentiary procedures for which the norms of criminal procedure allow interferences in the private life. [ABSTRACT FROM AUTHOR]
- Published
- 2023
241. الطبيعة الخاصة لبعض الجهات كمتحكمين في البيانات الشخصية أثناء تحولهم الرقمي دراسة مقارنة وتأصيلية.
- Author
-
أحمد عبد العزيز أ
- Abstract
Copyright of Journal of Law & Emerging Technologies (JOLETS) is the property of Journal of Law & Emerging Technologies (JOLETS) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
242. Teaching Health Literacy and Digital Literacy Together at University Level: The FLOURISH Module.
- Author
-
Smeaton, Alan F.
- Abstract
Many universities have wellness programs to promote overall health and well-being. Using students' own personal data as part of improving their own wellness would seem to be a natural fit given that most university students are already data and information literate. In this work, we aim to show how the interplay between health literacy and data literacy can be used and taught together. The method we use is the development and delivery of the FLOURISH module, an accredited, online-only but extra-curricular course that delivers practical tips in the areas that impact students' everyday wellness including sleep, nutrition, work habits, procrastination, relationships with others, physical activity, positive psychology, critical thinking, and more. For most of these topics, students gather personal data related to the topic and submit an analysis of their data for assessment thus demonstrating how students can use their personal data for their benefit. More than 350 students have taken the module and an analysis of the use of online resources, as well as feedback on the module experience, are presented. The contributions of this article are to further endorse the need for health literacy and digital literacy for students, and we demonstrate that these can be taught together making each literacy more appealing to the digital natives of Generation Z who make up the majority of students. The implications for public health research and practice are that two student literacies, health and digital, are not independent and for our students, they should be taught together. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
243. Technical Requirements and Approaches in Personal Data Control.
- Author
-
JUNSIK SIM, BEOMJOONG KIM, KISEOK JEON, MOONHO JOO, JIHUN LIM, JUNGHEE LEE, and CHOO, KIM-KWANG RAYMOND
- Subjects
- *
PERSONALLY identifiable information , *RIGHT to be forgotten , *GENERAL Data Protection Regulation, 2016 , *EVIDENCE gaps - Abstract
There has been a trend of moving from simply de-identification to providing extended data control to their owner (e.g., data portability and right to be forgotten), partly due to the introduction of the General Data Protection Regulation (GDPR). Hence, in this paper, we survey the literature to provide an in-depth understanding of the existing approaches for personal data control (e.g., we observe that most existing approaches are generally designed to facilitate compliance), as well as the privacy regulations in Europe, United Kingdom, California, South Korea, and Japan. Based on the review, we identify the associated technical requirements, as well as a number of research gaps and potential future directions (e.g., the need for transparent processing of personal data and establishment of clear procedure in ensuring personal data control). [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
244. MODEL PELINDUNGAN HUKUM DATA PRIBADI DI ERA DIGITAL GUNA MENJAMIN HAK WARGA NEGARA ATAS PELINDUNGAN DATA PRIBADI.
- Author
-
Waspiah, S., Noveria Sekar, S., Ammirah Lies, P., Tegar Islami, N., Setyaning Wida, and K., Salisa Widyaning
- Abstract
The era of rapid technological development has resulted in many changes as well as new problems in social life. For example, the problem of legal protection of personal data that occurred in Indonesia. This problem becomes a serious matter because it involves human rights as well as citizens' rights which must be upheld by the government. Because of this, the author raises the topic of personal law protection in this article to see what are the problems of personal data legal protection that occur and try to find out the answers to each problem with writing techniques that use normative-empirical legal research methods as well as empirical and comparative approaches. The results of this study show that there are four legal protection problems for personal data, namely cases of personal data leakage caused by low levels of cyber security; government transparency regarding cases of personal data leakage; the urgency of regulation regarding the protection of personal data in Artificial Intelligence; and there has not been an integrated personal data protection organizer. Which of the four problems can be answered by looking at privacy protection in anticipation of data leaks in Singapore; disclosure of public information on the implementation of personal data protection; regulation model of personal data protection on the use of Artificial Intelligence; and through a personal data legal protection model through an integrated administering agency. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
245. WILLINGNESS TO SHARE DATA PRIBADI DAN KAITANNYA DENGAN PENYALAHGUNAAN DATA KONSUMEN E-COMMERCE DI INDONESIA: PENDEKATAN MIXED METHODS.
- Author
-
Rahayu, Ismie Leona, Syarifa, Rizka, Akmalia, Laely Rahmawati, Samosir, Miracle Samuel, Hanggrita, Elvindia Puja, Muflikhati, Istiqlaliyah, and Simanjuntak, Megawati
- Abstract
Personal data misuse is one of the problems in online shopping (e-commerce) in Indonesia, but consumers tend to be willing to provide personal data via the internet. The aim of this research is to analyze the influence of knowledge, risk perception, and trust on consumers’ willingness to share personal data. This research used a mixed methods design. Primary data was taken through an online survey (n = 324) and in-depth interviews with 6 respondents. Secondary data was obtained from a desk study of regulations and privacy policies in e-commerce. The research results show that even though respondents had a sufficient level of knowledge, risk perception, trust and willingness to share, there was a compulsion to provide personal data. The results of Structural Equation Modeling (SEM) show that trust had the strongest direct influence on willingness to share, followed by knowledge. Risk perception had an indirect effect through trust on willingness to share. The current regulations and privacy policies still do not protect consumers' personal data optimally. The implications of this research include strengthening the e-commerce security system, strict government supervision of e-commerce, and taking firm action against cases of data misuse. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
246. PRAVA RODITELJA NA PRIVATNOST I ZAŠTITU OSOBNIH PODATAKA I DOBROBIT DJETETA KAO VRHUNSKI PRAVNI STANDARD.
- Author
-
Margaletić, Anica Čulo
- Abstract
Copyright of Collected Papers of Zagreb Law Faculty / Zbornik Pravnog Fakulteta u Zagrebu is the property of Sveuciliste u Zagrebu, Pravni Fakultet and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
247. ПРАВО НА ПРИВАТНІСТЬ В УМОВАХ ГЛОБАЛІЗАЦІЇ
- Author
-
Ю. Ф., Волкова
- Abstract
The human right to privacy was first proclaimed in the Universal Declaration of Human Rights. Today, the right to privacy is enshrined in many constitutions of democratic countries. In the conditions of globalization processes of technological progress, digitization, and the Internet, the right to privacy attracts more and more attention of scientists, since the information environment causes threats to a person's private life without his knowledge. The article focuses on the right to privacy in the context of information globalization. Situations of violation of the right to privacy are analyzed. Attention is focused on existing threats to information privacy, which are the most common nowadays. The reasons for a possible interference in the information privacy of a person have been established. The expediency of certain limitations of the right to privacy is determined and the reasons for such necessity are given. Attention is drawn to the fact that the personal information protection mechanism needs constant improvement, as new trends and aspects of its protection appear every year. The norms of international documents that regulate the specified issues have been analyzed. Taking into account the normative legal acts, the practical state of the realization of the right to privacy in the conditions of modern information technologies in Ukraine has been investigated. A number of criteria have been singled out for restrictions on the disclosure of information that falls under the sphere of a person's private life. With the advent of computers, the advent of the Internet and the spread of automated processing of personal information, the right to privacy acquires additional meaning. In view of the modern development of electronic technologies, the prevalence of subjects whose main activity is the collection, storage and use of personal data of users for the purpose of advertising or forming public opinions, the question of the value of private life and the protection of this right by Internet users is relevant. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
248. Challenges and threats of personal data protection in working with artificial intelligence.
- Author
-
V., Bielova M. and M., Byelov D.
- Subjects
ARTIFICIAL intelligence ,PERSONALLY identifiable information - Abstract
Copyright of Uzhhorod National University Herald Series Law is the property of Uzhhorod National University, State Higher Educational Establishment and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
249. Personal data protection on the internet under martial law: The case of Ukraine.
- Author
-
Onyshchenko, Serhii, Burbii, Anastasiia, Boikov, Andrii, Riabiy, Serhii, and Korniiko, Stanislav
- Subjects
PERSONALLY identifiable information ,MARTIAL law ,DATA protection laws ,JUDGE-made law ,INTERNET ,RIGHT of privacy - Abstract
Copyright of Amazonia Investiga is the property of PRIMMATE and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
250. ciTIzen-centric DAta pLatform (TIDAL): Sharing distributed personal data in a privacy-preserving manner for health research.
- Author
-
Sun, Chang, Gallofré Ocaña, Marc, van Soest, Johan, and Dumontier, Michel
- Subjects
PERSONALLY identifiable information ,RDF (Document markup language) ,PUBLIC health research ,CITIZENS ,INFORMATION sharing - Abstract
Developing personal data sharing tools and standards in conformity with data protection regulations is essential to empower citizens to control and share their health data with authorized parties for any purpose they approve. This can be, among others, for primary use in healthcare, or secondary use for research to improve human health and well-being. Ensuring that citizens are able to make fine-grained decisions about how their personal health data can be used and shared will significantly encourage citizens to participate in more health-related research. In this paper, we propose a ciTIzen-centric DatA pLatform (TIDAL) to give individuals ownership of their own data, and connect them with researchers to donate the use of their personal data for research while being in control of the entire data life cycle, including data access, storage and analysis. We recognize that most existing technologies focus on one particular aspect such as personal data storage, or suffer from executing data analysis over a large number of participants, or face challenges of low data quality and insufficient data interoperability. To address these challenges, the TIDAL platform integrates a set of components for requesting subsets of RDF (Resource Description Framework) data stored in personal data vaults based on SOcial LInked Data (Solid) technology and analyzing them in a privacy-preserving manner. We demonstrate the feasibility and efficiency of the TIDAL platform by conducting a set of simulation experiments using three different pod providers (Inrupt, Solidcommunity, Self-hosted Server). On each pod provider, we evaluated the performance of TIDAL by querying and analyzing personal health data with varying scales of participants and configurations. The reasonable total time consumption and a linear correlation between the number of pods and variables on all pod providers show the feasibility and potential to implement and use the TIDAL platform in practice. TIDAL facilitates individuals to access their personal data in a fine-grained manner and to make their own decision on their data. Researchers are able to reach out to individuals and send them digital consent directly for using personal data for health-related research. TIDAL can play an important role to connect citizens, researchers, and data organizations to increase the trust placed by citizens in the processing of personal data. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.