Spelling suggestions: "subject:"privacy, light off."" "subject:"privacy, light oof.""
171 |
Privacidade, liberdade de expressão e proteção dos dados pessoais: uma perspectiva brasileira com base na jurisprudência do Supremo Tribunal FederalPupo, Alvaro de Carvalho Pinto 31 October 2017 (has links)
Submitted by Filipe dos Santos (fsantos@pucsp.br) on 2017-11-14T11:28:30Z
No. of bitstreams: 1
Alvaro de Carvalho Pinto Pupo.pdf: 993019 bytes, checksum: 3e483a91d657e2658eb8b6b67b0a96f2 (MD5) / Made available in DSpace on 2017-11-14T11:28:30Z (GMT). No. of bitstreams: 1
Alvaro de Carvalho Pinto Pupo.pdf: 993019 bytes, checksum: 3e483a91d657e2658eb8b6b67b0a96f2 (MD5)
Previous issue date: 2017-10-31 / This study analyzes the concept of intimacy, privacy, free speech and personal data under a
brazilian perspective, as well as the protection for each of the itens mentioned. The study makes
references to authorities, legislation and case law pertaining to each of the subjects. The study
pursues the clarification of what each of these understands as privacy protection and personal
data protection, and how these correlates. It also pursues to understand if these understandings
are aligned and propose, in the end, some way of uniformization considering the legislative bill
proposals being discussed in the Brazilian Congress / O presente trabalho analisa o conceito da intimidade, privacidade, liberdade de expressão e de
dados pessoais sob uma perspectiva brasileira, bem como a proteção outorgada a cada um dos
itens tratados acima. São analisados os pontos doutrinários, legais e jurisprudenciais associados
com cada um deles. A análisa busca averiguar o que cada um desses campos entende como
proteção da privacidade e dos dados pessoais e como a privacidade e dados pessoais se
relacionam, além verificar se esses entendimentos estão alinhados e propor, ao final, uma forma
de uniformização, considerando inclusive propostas legislativas que se encontram em debate
no Congresso Nacional
|
172 |
O direcionamento publicitário na Internet e suas principais implicações jurídicasArantes, Carla Cavalheiro 06 February 2018 (has links)
Submitted by Filipe dos Santos (fsantos@pucsp.br) on 2018-02-16T19:30:59Z
No. of bitstreams: 1
Carla Cavalheiro Arantes.pdf: 7021027 bytes, checksum: af8afa8ff94692e9266b532db05a3e8a (MD5) / Made available in DSpace on 2018-02-16T19:30:59Z (GMT). No. of bitstreams: 1
Carla Cavalheiro Arantes.pdf: 7021027 bytes, checksum: af8afa8ff94692e9266b532db05a3e8a (MD5)
Previous issue date: 2018-02-06 / This paper aims at exposing the concept and functioning of behavioral advertising on Internet, its main legal implications and the parameters that must be observed by suppliers to ensure the lawfulness of said practice. This paper will show that for the advertising to be directed to a certain consumption’s profile, consumer data must be collected and used by suppliers. As the behavioral advertising on Internet has to use personal data and deal with technological mechanisms, which, in many cases, are not properly informed to consumers, it may violate their rights to privacy and information. The purpose of this paper, however, is to rule out extreme opinions that consider behavioral advertising and the way data is collected for this intent unlawful, as well as to present a legal solution that respect consumers’ rights to privacy and information, and concurrently, allow the practice of behavioral advertising on Internet / Esta dissertação tem a finalidade de expor o conceito e o funcionamento da publicidade dirigida na Internet, suas principais implicações jurídicas e os parâmetros que devem ser observados pelos fornecedores para garantir a licitude da prática de direcionamento publicitário. Como será exposto no decorrer deste trabalho, a publicidade, para ser dirigida a determinado perfil de consumo, pressupõe a coleta e a utilização de dados dos consumidores pelos fornecedores. Justamente por estar inserida nesse contexto de utilização de dados pessoais e de uso de mecanismos tecnológicos que, em muitos casos, não são adequadamente informados, a publicidade dirigida na Internet pode, a depender do caso concreto, violar os direitos à privacidade e à informação do consumidor. A proposta desta dissertação, no entanto, é afastar o entendimento radical de que a publicidade dirigida e a forma de coleta de dados para esse fim seriam práticas ilícitas por si só, além de apresentar uma solução jurídica que visa respeitar os direitos à privacidade e à informação do consumidor e, ao mesmo tempo, permitir a prática de direcionamento publicitário na Internet
|
173 |
Le couplage de données et la protection de la vie privée informationnelle sous l'article 8 de la Charte canadienne /Arès, Sébastien January 2005 (has links)
No description available.
|
174 |
互聯網上泄露公民個人信息行為的犯罪化探析 : 以 人肉搜索 為視角 / 以 人肉搜索 為視角;"Analysis of criminalization on the disclosure of citizens' personal information on the Internet : from the human flesh search ";"Analysis of criminalization on the disclosure of citizens' personal information on the Internet : from the human劉曉敏 January 2009 (has links)
University of Macau / Faculty of Law
|
175 |
Le couplage de données et la protection de la vie privée informationnelle sous l'article 8 de la Charte canadienne /Arès, Sébastien January 2005 (has links)
Data matching is the automated process permitting the comparison of significant amounts of personal data from two or more different databanks in order to produce new information. Its use by governments implicates many rights and freedoms, including the protection against unreasonable search and seizure under section 8 of the Canadian Charter. / In the author's opinion, a governmental data matching program will probably constitute a search or seizure under section 8 when a positive answer is given to two questions. First, is there a use or transfer of information which implicates constitutionally protected information? Generally, section 8 will only protect biographical personal information, as described in the Plant case. Second, one must determine if a reasonable expectation of privacy exists as to the purpose for which the information will be used. In other words, one must determine if the two governmental databanks are separate on the constitutional level. / However, a positive answer to both of theses questions does not mean that the matching program necessarily infringes section 8. It will not be considered unreasonable if it is authorised by law, if the law itself is reasonable, and if the execution of the program is reasonable. Presuming that the program is authorised by law, it is probable that a matching program aimed to detect individuals collecting illegally social benefits will not be considered unreasonable.
|
176 |
Der grundrechtliche Schutz des Privaten im europäischen Recht /Maus, Moritz. January 2007 (has links)
Universiẗat, Diss., 2006--Giessen.
|
177 |
Paranoid' or justified : e-government and privacyFarelo, Maria 03 1900 (has links)
Thesis (MPhil)--Stellenbosch University, 2004. / ENGLISH ABSTRACT: Electronic government holds the promises of enabling government to become more
efficient in the delivery of services to the public. E-government would ultimately mean
that government departments would not work in isolation from each other. The electronic
environment would mean that databases would be linked and that information would be
shared across all levels of government.
There are a number of issues that are presently, and will increasingly in the future
impact on the success of e-government. The paradox for e-government is that while this
sharing of information, paints a picture of an ideal state of affairs, that would benefit both
citizen and state, there could be enormous effects on privacy. These are the ability for
government to compile comprehensive profiles on citizens without their knowledge or
consent. Another impact on privacy is that wrong information can be linked to the wrong
person thereby impacting on the identity of an individual. Data protection and record
management policies and legislation are necessary to protect personal data and
information. / AFRIKAANSE OPSOMMING: Elektroniese regeringsdienste hou enorme voordele in om 'n meer effektiewe diens aan 'n
land se inwoners te lewer. 'n E-regering stel staatsdepartemente in staat om nie meer in
isolasie te werk nie, dat databasisse gekoppel en inligting op alle regeringsvlakke gedeel
kan word.
Daar is egter elemente in 'n e-regeringstruktuur wat 'n beduidende impak op die
toekomstige sukses daarvan kan uitoefen. Die paradoks van 'n e-regering is dat hoewel
dit 'n ideale prentjie skilder, dit 'n enorme impak op die privaatheid van beide die
inwoners en die regering van 'n land kan uitoefen. Dit voorsien 'n geleentheid waar die
regering 'n uitgebreide persoonsprofiel kan saamstel, sonder die medewete of
toestemming van die persoon. 'n Verdere aspek is dat die inligting aan die verkeerde
persoon gekoppel kan word, wat 'n negatiewe impak op die identiteit van so 'n persoon
kan hê. Dit op sigself maak data- en dokumentbeheer, beleide and wetgewing 'n
noodsaaklikheid voorvereiste vir die beskerming van persoonlike data en inligting.
|
178 |
An information privacy model for primary health care facilitiesBoucher, Duane Eric January 2013 (has links)
The revolutionary migration within the health care sector towards the digitisation of medical records for convenience or compliance touches on many concerns with respect to ensuring the security of patient personally identifiable information (PII). Foremost of these is that a patient’s right to privacy is not violated. To this end, it is necessary that health care practitioners have a clear understanding of the various constructs of privacy in order to ensure privacy compliance is maintained. This research project focuses on an investigation of privacy from a multidisciplinary philosophical perspective to highlight the constructs of information privacy. These constructs together with a discussion focused on the confidentiality and accessibility of medical records results in the development of an artefact represented in the format of a model. The formulation of the model is accomplished by making use of the Design Science research guidelines for artefact development. Part of the process required that the artefact be refined through the use of an Expert Review Process. This involved an iterative (three phase) process which required (seven) experts from the fields of privacy, information security, and health care to respond to semi-structured questions administered with an interview guide. The data analysis process utilised the ISO/IEC 29100:2011(E) standard on privacy as a means to assign thematic codes to the responses, which were then analysed. The proposed information privacy model was discussed in relation to the compliance requirements of the South African Protection of Personal Information (PoPI) Bill of 2009 and their application in a primary health care facility. The proposed information privacy model provides a holistic view of privacy management that can residually be used to increase awareness associated with the compliance requirements of using patient PII.
|
179 |
Whistleblower protection programs compromise the reported taxpayer's privacyAndonie, Luisa January 2017 (has links)
The United States Whistleblower Program’s inadequate protections have placed the privacy and confidentiality rights of United States taxpayers in a vulnerable state. By using the United States Whistleblower Program as an example, this paper seeks to illustrate the risk of eroding the confidentiality and privacy rights of the taxpayer, which is a risk that other national and international governments should likewise attempt to mitigate in their own whistleblower protection programs.
|
180 |
Seed and Grow: An Attack Against Anonymized Social NetworksPeng, Wei 07 August 2012 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / Digital traces left by a user of an on-line social networking service can be abused by a malicious party to compromise the person’s privacy. This is exacerbated by the increasing overlap in user-bases among various services.
To demonstrate the feasibility of abuse and raise public awareness of this issue,
I propose an algorithm, Seed and Grow, to identify users from an anonymized social
graph based solely on graph structure. The algorithm first identifies a seed sub-graph either planted by an attacker or divulged by collusion of a small group of users, and then grows the seed larger based on the attacker’s existing knowledge of the users’ social relations.
This work identifies and relaxes implicit assumptions taken by previous works,
eliminates arbitrary parameters, and improves identification effectiveness and accuracy. Experiment results on real-world collected datasets further corroborate my expectation and claim.
|
Page generated in 0.0443 seconds