• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 22
  • 12
  • 7
  • 4
  • 3
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 56
  • 56
  • 56
  • 31
  • 21
  • 20
  • 19
  • 14
  • 13
  • 12
  • 11
  • 11
  • 10
  • 10
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Data protection and transborder data flows : implications for Nigeria's integration into the global network economy

Allotey, Asuquo Kofi Essien 02 1900 (has links)
One of the realities that developing countries like Nigeria have to face today is that national and international markets have become more and more interconnected through the global platform of telecommunications and the Internet. This global networked economy is creating a paradigm shift in the focus of development goals and strategies particularly for developing countries. Globalisation is driving the nations of the world more into political and economic integration. These integrations are enhanced by a globally interconnected network of economic and communication systems at the apex of which is the Internet. This network of networks thrives on and encourages the expansion of cross-border flows of ideas and information, goods and services, technology and capital. Being an active member of the global network economy is essential to Nigeria’s economic development. It must plug into the network or risk being shut out. The global market network operates by means of rules and standards that are largely set by the dominant players in the network. Data protection is a critical component of the regime of rules and standards that govern the global network economy; it is evolving into an international legal order that transcends geographical boundaries. The EU Directive on data protection is the de facto global standard for data protection; it threatens to exclude non-EU countries without an adequate level of privacy protection from the EU market. More than 50 countries have enacted data protection laws modelled on the EU standard. Access to the huge EU market is a major motivation for the current trend in global harmonisation of domestic data protection laws. This trend provides a compelling reason for examining the issues relating to data protection and trans-border data flows and their implications for Nigeria’s desire to integrate into the global network economy. There are two primary motivations for legislating restrictions on the flow of data across national boundaries. The first is the concern for the privacy of the citizens, and second, securing the economic well-being of a nation. It is important that Nigeria’s privacy protection keeps pace with international norms in the provision of adequate protection for information privacy order to prevent potential impediments to international trading opportunities. / Public, Constitutional, and International / LL. D.
42

Habeas data e tutela jurisdicional da privacidade: aspectos processuais / Habeas data: judicial protection of privacy procedural

Ribeiro, Sérgio Luiz de Almeida 24 September 2013 (has links)
Made available in DSpace on 2016-04-26T20:22:03Z (GMT). No. of bitstreams: 1 Sergio Luiz de Almeida Ribeiro.pdf: 960554 bytes, checksum: 933a380e14a9abc84a29f86a8f043069 (MD5) Previous issue date: 2013-09-24 / This dissertation is about the habeas data and its procedural aspects, as a mean to protect privacy. The main objective of this study is to analyze the usefulness of this feature as a specific instrument for protection of individuals' privacy, as well as to ensure that citizens may control the wrongful use of their personal data through social networks and credit protection institutions. In this sense, the habeas data would not be restricted to obtaining general information or rectifying data before public authorities and private companies. In order to achieve this purpose, and based on the deductive method and bibliographical research, the following topics have been addressed in this paper: historical aspects, concept and objetive of the habeas data, proceedings upon habeas data under Law 9507/1997, and, lastly, controversial aspects on habeas data. As a conclusion, the main criticism developed herein is related to the comparison between the habeas data and the writ of mandamus, which has caused a procedural impact on the Law 9507/97. This Law, that rules the habeas data, changed the primary constitutional objective of it, which was very much related to the protection of privacy and the proceedings to achieve this objective. Another criticism that is addressed herein is related to the rule that imposes to the parties the burden of having an entire administrative process before making use of the habeas data to obtain information or rectify personal data. In theory, this rule refrains the habeas data to become an effective instrument for the avoidance of damages to individuals' privacy caused by credit protection institutions and social networks, for instance / Versa a presente dissertação sobre o instituto do habeas data como tutela jurisdicional da intimidade e seus aspectos processuais. O principal objetivo é analisar a utilidade do referido instituto como instrumento específico de proteção da vida íntima e evidenciar a possibilidade de o indivíduo exercer preventivamente o controle do manuseio indevido de dados pessoais por entidades mantenedoras de bancos dados, como é o caso de redes sociais e órgãos de proteção ao crédito, não se restringindo apenas ao meio processual para obter e/ou retificar informações em entidades mantenedoras de bancos dados, públicas e privadas de caráter público. Para atingir esse propósito, e com o suporte metodológico da abordagem dedutiva e da técnica de pesquisa bibliográfica, os seguintes assuntos foram abordados: aspectos históricos, conceito e escopo do habeas data, o procedimento da ação de habeas data na disciplina da Lei nº 9.507/1997 e, por último, as questões ainda controvertidas acerca do referido instituto. A título de conclusão, a principal crítica que emerge do tema analisado alude à comparação do habeas data ao mandado de segurança, que repercutiu no procedimento adotado por sua norma específica (Lei nº 9.507/1997), afastando assim este remédio constitucional da sua finalidade precípua, qual seja, preservar objetivamente a vida íntima e servir como instrumento processual específico para esse fim. Outra crítica se refere à exigência de o jurisdicionado trilhar e esgotar toda a via administrativa antes de se socorrer do Judiciário, por meio do habeas data, para obtenção de informações e/ou retificação de dados incorretos a seu respeito. Em rigor, tal exigência impede que o habeas data seja instrumento eficaz na prevenção de danos da vida privada perpetrados por órgãos de proteção ao crédito e redes sociais, por exemplo
43

Legal principles regulating the processing of personal information in the workplace

Nxokweni, Unathi Pearl 10 1900 (has links)
This study focuses on the right to privacy in the workplace, specifically employees' expectations of electronic privacy where personal information is processed. The main aim of this dissertation is to establish whether, given advantages in technology, South African laws offers adequate protection for employees when their electronic information is being processed. The study analyses South African law as it relates to the privacy of employees during the processing of their personal information in the workplace.This is examined within the parameters of the constitutional and legislative framework with due regard to the common-law right to privacy. The legal issues are examined from a South African context and is compared with data protection laws and regulations of the United Kingdom. It also offers recommendations based on experience gained in the United Kingdom. / Private Law / LL. M.
44

The right to privacy and identity on social network sites : a comparative legal perspective

Skosana, Milton Themba 12 April 2018 (has links)
This study focuses on the use of Social Network Sites (SNSs) and certain personality rights (specifically the right to privacy and the right to identity) that may be infringed by this use. The study also discusses data protection law as the protection of the rights to privacy and identity are interlinked with data protection in that data protection assumes importance when there is processing of personal information on SNSs. The study seeks to determine whether South African law provides adequate protection for the interests that form the object of these personality rights, and highlights certain shortcomings, particularly in the context of SNSs. It also suggests solutions where there are shortcomings by learning from other jurisdictions. Related issues investigated are: who should be held responsible for the user-generated content uploaded on SNSs; the role of the Internet Service Provider (ISP); and how to deal with anonymous defendants. / Private Law / LL. M.
45

The law of data (privacy) protection: a comparative and theoretical study

Roos, Anneliese 31 October 2003 (has links)
In present-day society more and more personal information is being collected. The nature of the collection has also changed: more sensitive and potentially prejudicial information is collected. The advent of computers and the development of new telecommunications technology, linking computers in networks (principally the Internet) and enabling the transfer of information between computer systems, have made information increasingly important, and boosted the collection and use of personal information. The risks inherent in the processing of personal information are that the data may be inaccurate, incomplete or irrelevant, accessed or disclosed without authorisation, used for a purpose other than that for which they were collected, or destroyed. The processing of personal information poses a threat to a person's right to privacy. The right to identity is also infringed when incorrect or misleading information relating to a person is processed. In response to the problem of the invasion of the right to privacy by the processing of personal information, many countries have adopted "data protection" laws. Since the common law in South Africa does not provide adequate protection for personal data, data protection legislation is also required. This study is undertaken from a private law perspective. However, since privacy is also protected as a fundamental right, the influence of constitutional law on data protection is also considered. After analysing different foreign data protection laws and legal instruments, a set of core data protection principles is identified. In addition, certain general legal principles that should form the basis of any statutory data protection legislation in South Africa are proposed. Following an analysis of the theoretical basis for data protection in South African private law, the current position as regards data protection in South-Africa is analysed and measured against the principles identified. The conclusion arrived at is that the current South African acts can all be considered to be steps in the right direction, but not complete solutions. Further legislation incorporating internationally accepted data protection principles is therefore necessary. The elements that should be incorporated in a data protection regime are discussed. / Jurisprudence / LL. D. (Jurisprudence)
46

How should the protection of privacy, threatened by new technologies like radio frequency identification (RFID), be seen from a Judeo-Christian perspective?

Schmidt, Erwin Walter 11 1900 (has links)
Radio Frequency Identification (RFID) is a new technology which allows people to identify objects automatically but there is a suspicion that, if people are tracked, their privacy may be infringed. This raises questions about how far this technology is acceptable and how privacy should be protected. It is also initiated a discussion involving a wide range of technical, philosophical, political, social, cultural, and economical aspects. There is also a need to consider the ethical and theological perspectives. This dissertation takes all its relevant directions from a Judeo-Christian theological perspective. On one side the use of technology is considered, and on the other side the value of privacy, its infringements and protection are investigated. According to Jewish and Christian understanding human dignity has to be respected including the right to privacy. As a consequence of this RFID may only used for applications that do not infringe this right. This conclusion, however, is not limited to RFID; it will be relevant for other, future surveillance technologies as well. / Philosophy and Systematic Theology / M. Th. (Theological ethics)
47

The right to confidentiality in the context of HIV/AIDS

Mtunuse, Paul Tobias 02 1900 (has links)
The purpose of this study is to investigate the right to confidentiality in the context of HIV/AIDS through an interdisciplinary lens. This study indicates that whilst confidentiality is important and should be preserved in order to protect persons living with HIV/AIDS against stigmatisation, discrimination and victimisation, this should be balanced by other equally important interests, such as the protection of public health and individual third parties who may be affected by the intentional or negligent infection of others with HIV. As the consideration of the legal issues relating to confidentiality and privacy cannot be divorced from the social context in which HIV/AIDS plays out in South African communities, the study will examine, amongst others, the victimisation, discrimination and stigmatisation experienced by persons living with HIV/AIDS, followed by a critical exploration of the present legal and ethical framework governing privacy and confidentiality, including medical confidentiality, as well as the duty to disclose a positive HIV-status, in the context of HIV/AIDS. Possible limitations on the right to privacy in this context are also examined, which include, amongst others, a consideration of making HIV/AIDS notifiable diseases in South Africa. The study suggests that it is imperative that legal interventions aimed at curbing the spread of HIV will need to be mindful of the unique social, cultural and economic forces that impact on the duty to disclose a positive HIV-status to partners and other affected third parties. Insights gained from philosophical theories relating to Africanism, individualism, communitarianism and utilitarianism are valuable tools in facilitating a clearer understanding of relevant social and cultural factors that keep South African society locked in the present stalemate with regard to the disclosure of HIV status. / Public, Constitutional, and International law / LLD
48

Mezinárodněprávní aspekty získávání informací zpravodajskými službami / International legal aspects of obtaining information by intelligence service

Hanžl, Pavel January 2015 (has links)
This diploma thesis deals with intelligence gathering and its international law aspects. The main research question of this diploma thesis is as follows: is the intelligence gathering legal from the point of view of international law? In light of recent scandals and accusations of secret services of illegal espionage, it is very important to find an answer to this question. There are almost no relevant Czech academic sources about this issue and foreign sources are rather contradictory. Included in the main research question are number of additional issues, such as: are there differences in legality between intelligence gathering during peacetime or wartime? What are the international law sources regarding espionage? Is the work of secret services affected by international law? Is international law relevant to espionage? As part of the introduction the diploma thesis outlines various intelligence gathering methods and defines relevant terms. The diploma thesis also addresses the issue of compatibility of espionage with the international law principle of non-intervention and state sovereignty. Next, three current approaches to the question of legality of espionage are presented to the reader and one new approach is introduced. Furthermore, the international implications of the unlawful behavior of...
49

Le droit à l'image : de la théorie à l'application pratique / Image rights : from the theory to the practice

Propolis, Laurie 29 November 2014 (has links)
Enfant de la jurisprudence, le droit à l'image est une prérogative attachée à l'individu qui a longtemps été discutée. Si aujourd'hui une certaine stabilité théorique a été trouvée, celle-ci demeure néanmoins relative du fait de sa non-reconnaissance par la législation française. Il recouvre différentes réalités et ainsi concerner l'image d'une oeuvre, celle d'un bien mobilier ou immobilier, ou encore, être relatif aux traits des individus eux-mêmes. C'est sur cette dernière dimension que la présente étude a entendu s'attarder, celle-ci présentant une certaine complexité juridique liée à la défaillance législative et à la place prépondérante de la jurisprudence au sein du droit à l'image. Le choc résultant de la rencontre entre un droit théorique, dépourvu de régime juridique officiel, et la pratique judiciaire conduit de facto, à une instabilité et une insécurité juridique avérées, en incompatibilité totale avec la notion de droit de la personnalité telle qu'énoncée par la théorie des droits de l'Homme.Les interrogations induites par cette étude ont abouti à des conclusions quelque peu funestes. Tout d'abord, le droit à l'image demeure fondé sur un régime hybride dont la nature apparaît être, plus que jamais, juridiquement contestable et largement contestée. Ensuite, la seconde conclusion met en évidence la place trop importante laissée aux juridictions en cette matière, ce qui conduit à des disparités inconciliables avec les notions d'égalité, d'impartialité et de fiabilité. Dès lors, une révision globale du droit à l'image, et la mise en place d'un régime juridique légal autonome semblent être aussi bien nécessaires qu'inévitables. / Image rights are a concept derived from Nineteenth Century jurisprudence and have been mutating for a long time. If some kind of theoretical stability has now been established, it remains only relative because image rights are in fact excluded from French legislation. Image rights bring together different realities. They could concern the image of a work and derive from copyright, thereby concerning property law; or concern the features of individuals themselves.This study will deal with this second aspect, presenting a degree of legal complexity linked to inadequate legislation and the dominant role of jurisprudence in image rights. The shock of the encounter between a theoretical right having no proper juridical status and judicial practice leads de facto to evident legal uncertainty and instability which are completely incompatible with the notion of rights inherent to the human being as outlined by human rights theory. The questions raised by this study, which involve both the imperfections of the legal framework conferred on image rights and existing incompatibilities between theory and practice, have reached unsatisfactory conclusions. To being with, the first conclusion underlines that image rights remain based on a hybrid which seems more than ever contestable, and often contested, from a juridical point of view. And secondly, the excessively important role left to jurisdictions in image rights leads to disparities which are inconsistent with notions of equality, impartiality and dependability. Therefore, a comprehensive review of image rights, and the establishment of an independent statutory legal regime appear to be both necessary and inevitable.
50

Monitorovanie činností zamestnancov – praktiky a používané nástroje / Monitoring employee activity - practices and tools

Zdechovan, Ján January 2015 (has links)
This thesis discusses surveillance in the work environment. The topic is too extensive, that´s the reason its focus is mainly on electronic employee monitoring. The basic concepts are explained in the beginning of the thesis, which is subsequently followed by a simple survey oriented on the opinions on employee surveillance. The center of this thesis is an analysis of legal, technical and ethical aspects, which also reviews different monitoring practices. Identified practices are used for defining monitoring possible scenarios. The contribution of this work is the evaluation of employee monitoring practices and establishing a ranking of monitoring tools that can serve as a decision making tool for organizations. This thesis uses not only theoretical knowledge from literature, but also incoporates comments and opinions from experts.

Page generated in 0.0333 seconds