• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 22
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 32
  • 32
  • 32
  • 32
  • 20
  • 18
  • 15
  • 15
  • 14
  • 10
  • 9
  • 7
  • 6
  • 6
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Le couplage de données et la protection de la vie privée informationnelle sous l'article 8 de la Charte canadienne /

Arès, Sébastien January 2005 (has links)
Data matching is the automated process permitting the comparison of significant amounts of personal data from two or more different databanks in order to produce new information. Its use by governments implicates many rights and freedoms, including the protection against unreasonable search and seizure under section 8 of the Canadian Charter. / In the author's opinion, a governmental data matching program will probably constitute a search or seizure under section 8 when a positive answer is given to two questions. First, is there a use or transfer of information which implicates constitutionally protected information? Generally, section 8 will only protect biographical personal information, as described in the Plant case. Second, one must determine if a reasonable expectation of privacy exists as to the purpose for which the information will be used. In other words, one must determine if the two governmental databanks are separate on the constitutional level. / However, a positive answer to both of theses questions does not mean that the matching program necessarily infringes section 8. It will not be considered unreasonable if it is authorised by law, if the law itself is reasonable, and if the execution of the program is reasonable. Presuming that the program is authorised by law, it is probable that a matching program aimed to detect individuals collecting illegally social benefits will not be considered unreasonable.
22

Legal principles regulating the processing of personal information in the workplace

Nxokweni, Unathi Pearl 10 1900 (has links)
This study focuses on the right to privacy in the workplace, specifically employees' expectations of electronic privacy where personal information is processed. The main aim of this dissertation is to establish whether, given advantages in technology, South African laws offers adequate protection for employees when their electronic information is being processed. The study analyses South African law as it relates to the privacy of employees during the processing of their personal information in the workplace.This is examined within the parameters of the constitutional and legislative framework with due regard to the common-law right to privacy. The legal issues are examined from a South African context and is compared with data protection laws and regulations of the United Kingdom. It also offers recommendations based on experience gained in the United Kingdom. / Private Law / LL. M.
23

The law of data (privacy) protection: a comparative and theoretical study

Roos, Anneliese 31 October 2003 (has links)
In present-day society more and more personal information is being collected. The nature of the collection has also changed: more sensitive and potentially prejudicial information is collected. The advent of computers and the development of new telecommunications technology, linking computers in networks (principally the Internet) and enabling the transfer of information between computer systems, have made information increasingly important, and boosted the collection and use of personal information. The risks inherent in the processing of personal information are that the data may be inaccurate, incomplete or irrelevant, accessed or disclosed without authorisation, used for a purpose other than that for which they were collected, or destroyed. The processing of personal information poses a threat to a person's right to privacy. The right to identity is also infringed when incorrect or misleading information relating to a person is processed. In response to the problem of the invasion of the right to privacy by the processing of personal information, many countries have adopted "data protection" laws. Since the common law in South Africa does not provide adequate protection for personal data, data protection legislation is also required. This study is undertaken from a private law perspective. However, since privacy is also protected as a fundamental right, the influence of constitutional law on data protection is also considered. After analysing different foreign data protection laws and legal instruments, a set of core data protection principles is identified. In addition, certain general legal principles that should form the basis of any statutory data protection legislation in South Africa are proposed. Following an analysis of the theoretical basis for data protection in South African private law, the current position as regards data protection in South-Africa is analysed and measured against the principles identified. The conclusion arrived at is that the current South African acts can all be considered to be steps in the right direction, but not complete solutions. Further legislation incorporating internationally accepted data protection principles is therefore necessary. The elements that should be incorporated in a data protection regime are discussed. / Jurisprudence / LL. D. (Jurisprudence)
24

Strafregtelike beskerming van inligting

Nienaber, Catharina Wilhelmina 11 1900 (has links)
In hierdie proefskrif is die belangrike rol wat inligting tans en toenemend in die samelewing speel ondersoek, om te beklemtoon hoe noodsaaklik dit tans is om `n misdryf wat die wederregtelike en opsetlike verkryging van inligting strafbaar sal reël, te verorden. Die rol wat industriële spioenasie in die verband speel word uitgelig. As gevolg van die bepaalde onliggaamlike aard van inligting kan inligting nie soos liggaamlike eiendom `n persoon ontneem word nie. Inligting word gewoonlik bloot gekopieer en die oorspronklike houer van die inligting behou die inligting hoewel die dader ook die inligting verkry. Die gemeenregtelike misdaad van diefstal maak dus nie voorsiening vir die diefstal van inligting waar die inligting bloot gekopieer of gedupliseer is nie. Om te bepaal hoe hierdie bepaalde probleem in ander lande se regstelsels aangespreek word en om kennis op te doen oor hoe dit in die Suid-Afrikaanse reg aangespreek behoort te word, is die strafregtelike bepalings en selfs nie-strafregtelike bepalings in lande soos Engeland, Amerika, Kanada en Nederland ondersoek. Ten einde vas te stel welke inligting deur die strafreg beskerm behoort te word, is selfs sekere nie-strafregtelike bepalings van vermelde lande en van die Suid-Afrikaanse reg nagegaan. Insigte is verkry oor welke elemente sodanige inligting aan moet voldoen en `n definisie van beskermwaardige inligting word aanbeveel. Vir hierdie doel is `n nuwe begrip van beskermwaardige inligting geskep. Die redes waarom diefstal van inligting nie in Suid-Afrikaanse en die ander lande se regstelsels nie erken word nie, is bespreek. Die wyse waarop die gemeenregtelike misdaad van diefstal na die diefstal van onliggaamlike geld uitgebrei is, is ondersoek waarna `n aanbeveling gemaak word oor hoe die definisie van diefstal uitgebrei kan word om ook ander onliggaamlike objekte in te sluit. As gevolg van die bepaalde aard van inligting kan die gemeenregtelike definisie van diefstal nie uitgebrei word om inligting as `n objek in te sluit nie en word `n statutêre misdryf van diefstal van inligting voorgestel. / Jurisprudence / LL. D.
25

Data protection and transborder data flows : implications for Nigeria's integration into the global network economy

Allotey, Asuquo Kofi Essien 02 1900 (has links)
One of the realities that developing countries like Nigeria have to face today is that national and international markets have become more and more interconnected through the global platform of telecommunications and the Internet. This global networked economy is creating a paradigm shift in the focus of development goals and strategies particularly for developing countries. Globalisation is driving the nations of the world more into political and economic integration. These integrations are enhanced by a globally interconnected network of economic and communication systems at the apex of which is the Internet. This network of networks thrives on and encourages the expansion of cross-border flows of ideas and information, goods and services, technology and capital. Being an active member of the global network economy is essential to Nigeria’s economic development. It must plug into the network or risk being shut out. The global market network operates by means of rules and standards that are largely set by the dominant players in the network. Data protection is a critical component of the regime of rules and standards that govern the global network economy; it is evolving into an international legal order that transcends geographical boundaries. The EU Directive on data protection is the de facto global standard for data protection; it threatens to exclude non-EU countries without an adequate level of privacy protection from the EU market. More than 50 countries have enacted data protection laws modelled on the EU standard. Access to the huge EU market is a major motivation for the current trend in global harmonisation of domestic data protection laws. This trend provides a compelling reason for examining the issues relating to data protection and trans-border data flows and their implications for Nigeria’s desire to integrate into the global network economy. There are two primary motivations for legislating restrictions on the flow of data across national boundaries. The first is the concern for the privacy of the citizens, and second, securing the economic well-being of a nation. It is important that Nigeria’s privacy protection keeps pace with international norms in the provision of adequate protection for information privacy order to prevent potential impediments to international trading opportunities. / Public, Constitutional, & International / LLD
26

Legal and policy aspects to consider when providing information security in the corporate environment

Dagada, Rabelani 11 1900 (has links)
E-commerce is growing rapidly due to the massive usage of the Internet to conduct commercial transactions. This growth has presented both customers and merchants with many advantages. However, one of the challenges in E-commerce is information security. In order to mitigate e-crime, the South African government promulgated laws that contain information security legal aspects that should be integrated into the establishment of information security. Although several authors have written about legal and policy aspects regarding information security in the South African context, it has not yet been explained how these aspects are used in the provision of information security in the South African corporate environment. This is the premise upon which the study was undertaken. Forty-five South African organisations participated in this research. Data gathering methods included individual interviews, website analysis, and document analysis. The findings of this study indicate that most organisations in South Africa are not integrating legal aspects into their information security policies. One of the most important outcomes of this study is the proposed Concept Model of Legal Compliance in the Corporate Environment. This Concept Model embodies the contribution of this study and demonstrates how legal requirements can be incorporated into information security endeavours. The fact that the proposed Concept Model is technology-independent and that it can be implemented in a real corporate environment, regardless of the organisation’s governance and management structure, holds great promise for the future of information security in South Africa and abroad. Furthermore, this thesis has generated a topology for linking legislation to the provision of information security which can be used by any academic or practitioner who intends to implement information security measures in line with the provisions of the law. It is on the basis of this premise that practitioners can, to some extent, construe that the integration of legislation into information security policies can be done in other South African organisations that did not participate in this study. Although this study has yielded theoretical, methodological and practical contributions, there is, in reality, more research work to be done in this area. / School of Computing / D. Phil. (Information Systems)
27

Data protection and transborder data flows : implications for Nigeria's integration into the global network economy

Allotey, Asuquo Kofi Essien 02 1900 (has links)
One of the realities that developing countries like Nigeria have to face today is that national and international markets have become more and more interconnected through the global platform of telecommunications and the Internet. This global networked economy is creating a paradigm shift in the focus of development goals and strategies particularly for developing countries. Globalisation is driving the nations of the world more into political and economic integration. These integrations are enhanced by a globally interconnected network of economic and communication systems at the apex of which is the Internet. This network of networks thrives on and encourages the expansion of cross-border flows of ideas and information, goods and services, technology and capital. Being an active member of the global network economy is essential to Nigeria’s economic development. It must plug into the network or risk being shut out. The global market network operates by means of rules and standards that are largely set by the dominant players in the network. Data protection is a critical component of the regime of rules and standards that govern the global network economy; it is evolving into an international legal order that transcends geographical boundaries. The EU Directive on data protection is the de facto global standard for data protection; it threatens to exclude non-EU countries without an adequate level of privacy protection from the EU market. More than 50 countries have enacted data protection laws modelled on the EU standard. Access to the huge EU market is a major motivation for the current trend in global harmonisation of domestic data protection laws. This trend provides a compelling reason for examining the issues relating to data protection and trans-border data flows and their implications for Nigeria’s desire to integrate into the global network economy. There are two primary motivations for legislating restrictions on the flow of data across national boundaries. The first is the concern for the privacy of the citizens, and second, securing the economic well-being of a nation. It is important that Nigeria’s privacy protection keeps pace with international norms in the provision of adequate protection for information privacy order to prevent potential impediments to international trading opportunities. / Public, Constitutional, and International / LL. D.
28

Legal and policy aspects to consider when providing information security in the corporate environment

Dagada, Rabelani 11 1900 (has links)
E-commerce is growing rapidly due to the massive usage of the Internet to conduct commercial transactions. This growth has presented both customers and merchants with many advantages. However, one of the challenges in E-commerce is information security. In order to mitigate e-crime, the South African government promulgated laws that contain information security legal aspects that should be integrated into the establishment of information security. Although several authors have written about legal and policy aspects regarding information security in the South African context, it has not yet been explained how these aspects are used in the provision of information security in the South African corporate environment. This is the premise upon which the study was undertaken. Forty-five South African organisations participated in this research. Data gathering methods included individual interviews, website analysis, and document analysis. The findings of this study indicate that most organisations in South Africa are not integrating legal aspects into their information security policies. One of the most important outcomes of this study is the proposed Concept Model of Legal Compliance in the Corporate Environment. This Concept Model embodies the contribution of this study and demonstrates how legal requirements can be incorporated into information security endeavours. The fact that the proposed Concept Model is technology-independent and that it can be implemented in a real corporate environment, regardless of the organisation’s governance and management structure, holds great promise for the future of information security in South Africa and abroad. Furthermore, this thesis has generated a topology for linking legislation to the provision of information security which can be used by any academic or practitioner who intends to implement information security measures in line with the provisions of the law. It is on the basis of this premise that practitioners can, to some extent, construe that the integration of legislation into information security policies can be done in other South African organisations that did not participate in this study. Although this study has yielded theoretical, methodological and practical contributions, there is, in reality, more research work to be done in this area. / School of Computing / D. Phil. (Information Systems)
29

The right to privacy and identity on social network sites : a comparative legal perspective

Skosana, Milton Themba 12 April 2018 (has links)
This study focuses on the use of Social Network Sites (SNSs) and certain personality rights (specifically the right to privacy and the right to identity) that may be infringed by this use. The study also discusses data protection law as the protection of the rights to privacy and identity are interlinked with data protection in that data protection assumes importance when there is processing of personal information on SNSs. The study seeks to determine whether South African law provides adequate protection for the interests that form the object of these personality rights, and highlights certain shortcomings, particularly in the context of SNSs. It also suggests solutions where there are shortcomings by learning from other jurisdictions. Related issues investigated are: who should be held responsible for the user-generated content uploaded on SNSs; the role of the Internet Service Provider (ISP); and how to deal with anonymous defendants. / Private Law / LL. M.
30

The law of data (privacy) protection: a comparative and theoretical study

Roos, Anneliese 31 October 2003 (has links)
In present-day society more and more personal information is being collected. The nature of the collection has also changed: more sensitive and potentially prejudicial information is collected. The advent of computers and the development of new telecommunications technology, linking computers in networks (principally the Internet) and enabling the transfer of information between computer systems, have made information increasingly important, and boosted the collection and use of personal information. The risks inherent in the processing of personal information are that the data may be inaccurate, incomplete or irrelevant, accessed or disclosed without authorisation, used for a purpose other than that for which they were collected, or destroyed. The processing of personal information poses a threat to a person's right to privacy. The right to identity is also infringed when incorrect or misleading information relating to a person is processed. In response to the problem of the invasion of the right to privacy by the processing of personal information, many countries have adopted "data protection" laws. Since the common law in South Africa does not provide adequate protection for personal data, data protection legislation is also required. This study is undertaken from a private law perspective. However, since privacy is also protected as a fundamental right, the influence of constitutional law on data protection is also considered. After analysing different foreign data protection laws and legal instruments, a set of core data protection principles is identified. In addition, certain general legal principles that should form the basis of any statutory data protection legislation in South Africa are proposed. Following an analysis of the theoretical basis for data protection in South African private law, the current position as regards data protection in South-Africa is analysed and measured against the principles identified. The conclusion arrived at is that the current South African acts can all be considered to be steps in the right direction, but not complete solutions. Further legislation incorporating internationally accepted data protection principles is therefore necessary. The elements that should be incorporated in a data protection regime are discussed. / Jurisprudence / LL. D. (Jurisprudence)

Page generated in 0.1335 seconds