Showing 1 - 7 results of 7 for search '"data protection"', query time: 0.06s Refine Results
  1. 1

    Smart home user's information in cloud system: A comparison between Malaysian personal data protection act 2010 and EU general data protection regulation by Basarudin, Noor Ashikin, Yeon, Asmah Laili, Mohamed Yusoff, Zuryati, Md Dahlan, Nuarrual Hilal, Mahdzir, Nazli

    Published 2017
    “…However, immense of benefits offered by the cloud system are associated with numbers of uncertainties which has created the issue of confidentiality and data safety.This article adopts doctrinal legal study that analyses the Personal Data Protection Act 2010 on the aspect of protection conferred to the cloud users and with reference to additional point that is well addressed in European Union General Data Protection Regulation.The overall finding shows that there is still loopholes in the Act which need to be looked into for the purpose of improving as well as to cater the needs of legal policy in protecting personal data of smart home users in cloud.…”
    Get full text
    Article
  2. 2

    Smart Home Users’ Information in Cloud System: A Comparison Between Malaysian Personal Data Protection Act 2010 And EU General Data Protection Regulation by Basarudin, Noor Ashikin, Yeon, Asmah Laili, Mohamed Yusoff, Zuryati, Md Dahlan, Nuarrual Hilal, Mahdzir, Nazli

    Published 2017
    “…This article adopts a doctrinal legal study that analyses the Personal Data Protection Act 2010 on the aspect of protection conferred to cloud users and with reference to an additional point that is well addressed in the European Union General Data Protection Regulation. …”
    Get full text
    Article
  3. 3

    Personal Data Protection Act 2010: Protection of Smart Home Users’ Information in Cloud System by Basarudin, Noor Ashikin, Yeon, Asmah Laili, Mohamed Yusoff, Zuryati, Md Dahlan, Nuarrual Hilal, Mahdzir, Nazli

    Published 2016
    “…This article adopts doctrinal legal study that analyzes the Personal Data Protection Act 2010 on the aspect of protection conferred to the cloud users.The overall finding shows that there is still loopholes in the Act which need to be looked into for the purpose of improvement as well as to cater the needs of legal policy in protecting personal data of smart home users in cloud.…”
    Get full text
    Conference or Workshop Item
  4. 4

    Transborder data flows: Protection of medical tourist personal data in Malaysia and Indonesia by Hadiyantina, Shinta, Ayub, Zainal Amin, Cahyandari, Dewi, Paramitha, Amelia Ayu, Mohamed Yusoff, Zuryati

    Published 2022
    “…It was found that the need for personal data protection is a necessity since boundaries among jurisdictions are becoming “borderless”. …”
    Get full text
    Article
  5. 5

    Workplace privacy in Malaysia: A legal comparison by Ayub, Zainal Amin, Mohamed Yusoff, Zuryati

    Published 2008
    “…Furthermore, the Malaysian Federal Constitution does not specifically recognise privacy as one of the fundamental rights and the Personal Data Protection Bill is yet to be enforced. As such, this paper will discuss the extent of protection available to the workers relating to their privacy under related laws in Malaysia.…”
    Get full text
    Book Section
  6. 6

    Protection of children's online privacy in Malaysia by Ayub, Zainal Amin, Mohamed Yusoff, Zuryati

    Published 2017
    “…Moreover, children are unconcern with their privacy, or do not know how to protect their informational privacy and data protection which are of concern to adults (Allen, 2001) and they are unaware the consequence and the impact of revealing their personal information, either their own data or their family data. …”
    Get full text
    Conference or Workshop Item
  7. 7

    Privasi di Tempat Kerja: Tinjauan Dari Sudut Perundangan di Malaysia by Mohamed Yusoff, Zuryati, Ayub, Zainal Amin

    Published 2019
    “…The Malaysian Federal Constitution does not specifically recognize privacy as a fundamental right, while the Personal Data Protection Act 2010 only protects the handling of personal data in commercial transactions. …”
    Get full text
    Article