Showing 101 - 120 results of 2,975 for search '"personal data"', query time: 0.43s Refine Results
  1. 101
  2. 102

    The Decision of Information Safety Problems at Processing of the Biometric Personal Data by Y. G. Gorshkov

    Published 2010-03-01
    “…The requirements imposed on transfer by the personal biometric information in systems and communication networks according to Federal Law № 152 “Personal data” are defined. Lacks of used decisions protection of such biometric data, as the test speech information, including parameters of a speech path, and also acoustic signals of tones and noise of heart of the person on an example of telemedicine systems construction with the using of a network telephone channels general using and wireless networks Wi-Fi are considered. …”
    Get full text
    Article
  3. 103

    Limits of the Prohibition of Using Personal Data of Social Assistance Beneficiaries by Miruć Alina

    Published 2013-05-01
    “…The objective of this paper is to present the limits of using personal data of the social assistance beneficiaries. …”
    Get full text
    Article
  4. 104

    THE CHALLENGES OF PERSONAL DATA PROCESSING DURING THE COVID-19 PANDEMIC by Vaida Petkevičienė, Paulius Pakutinskas, Virginijus Bitė

    Published 2020-12-01
    “…For data controllers the question is: what is the relationship between COVID-19 pandemic restrictions and the protection of personal data? This article considers the relation between the General Data Protection Regulation and COVID-19 restrictions in the main areas of data management most affected by coronavirus, i.e. the processing of personal health data, the processing of workers‘ personal data and the processing of personal data in COVID-19 pandemic applications. …”
    Get full text
    Article
  5. 105
  6. 106

    Identification Systems and Their Legitimacy in the New Legislation on the Protection of Personal Data by Vlastimil Benes, Karel Neuwirt, Otto Dostal

    Published 2017-11-01
    “…The article deals with the requirements that electronic identification system operators will have to take into account to ensure that the system in operation meets the requirements for the protection of personal data.…”
    Get full text
    Article
  7. 107
  8. 108
  9. 109

    Personal Data Protection in New Zealand: Lessons for South Africa? by A Roos

    Published 2008-12-01
    “…Article 25 of this Directive compels all EU member countries to adopt data protection legislation and to prevent the transfer of personal data to non-EU member countries ('third countries') that do not provide an adequate level of data protection. …”
    Get full text
    Article
  10. 110

    Government Access to Personal Data and Transnational Interoperability: An Accountability Perspective by Christopher Docksey, Kenneth Propp

    Published 2023-11-01
    “…This article applies the principle of ʻaccountabilityʼ to the issue of international transfers of personal data and government requirements for access to that data. …”
    Get full text
    Article
  11. 111

    MANAGING INNOVATIVE COMPANY’S CAPITAL: THE CASE OF PERSONAL DATA TRANSFER by Danijela Vrbljanac

    Published 2018-01-01
    “…The only case in which this issue could become more debatable is if personal data crosses EU borders. The transfer of personal data to third countries proved its disputed status when the CJEU invalidated the Safe Harbour Agreement, one of the frameworks for the transfer of personal data to the US and several more came under the CJEU’s scrutiny, including the Safe Harbour Agreement’s successor, the Privacy Shield Agreement. …”
    Get full text
    Article
  12. 112

    User’s awareness of personal data leakage in E-commerce application by Andhikaputra Raditya, Tumbel Samuel Marc Anthony, Vida Jason, Gui Anderes, Karmawan I Gusti Made, Ganesan Yuvaraj

    Published 2023-01-01
    “…Accessibility and convenience do, however, come with concerns about personal data leakage. The term “personal data leakage” refers to the unlawful sharing of personal information that can be utilized for negative purposes like fraud or identity theft. …”
    Get full text
    Article
  13. 113
  14. 114
  15. 115

    Protection of Personal Data According to European Law and Decisions of ECHR by Olha B. OLIYNYK, Aliona S. ROMANOVA, Ihor M. KOVAL, Olena L. CHORNOBAI, Svitlana O. POLIARUSH-SAFRONENKO

    Published 2023-06-01
    “…Special attention is paid to the question of personal data as a part of human rights and how the ECHR is dealing with protection of it. …”
    Get full text
    Article
  16. 116

    Elder People and Personal Data: New Challenges in Health Platformization by Ana Rivoir, Katherine Reilly

    Published 2023-07-01
    “…The ability of older people to manage their personal data within healthcare systems shapes their ability to enact citizenship and human rights. …”
    Get full text
    Article
  17. 117
  18. 118
  19. 119
  20. 120

    Risk assessment model of compromising personal data on mobile devices by Izergin Dmitry, Eremeev Michael

    Published 2021-01-01
    “…Existing security mechanisms for mobile operating systems, as a rule, are aimed at neutralizing harmful effects and do not ensure the safety of personal data from legitimate services. The article proposes a model for assessing the risks of compromising personal data on mobile devices based on the correlation analysis of public information about service developers in order to detect the possibility of aggregating data from various sources.…”
    Get full text
    Article