Spelling suggestions: "subject:"light off privacy"" "subject:"light oof privacy""
1 |
Privacy, surveillance and the state a comparison of U.S. and British privacy rights /Lander, Angelina M. January 2009 (has links)
Thesis (M.A.)--University of Central Florida, 2009. / Adviser: Barbara Sgouraki Kinsey. Includes bibliographical references (p. 64-67).
|
2 |
Glass houses: the end of privacySinkovits, Angela M. 01 January 2000 (has links)
As we enter the 21 st Century, individuals are faced with an enormous threat to privacy that affects almost every human being. Due to technological advances, virtually everyone will be influenced by the course that is set over the next few years concerning the dissemination of private information. The revolution of information technology resembles the Industrial Revolution in that parameters·are largely unknown and unregulated. In addition, the self-regulation of business presents a similar conflict between profit and public protection. Privacy guidelines that the legislature, judiciary, and industry establish in the early part of this century will affect humanity as the advent of labor laws did in the 20th Century. In this work, the threat to privacy, the problems associated with the control of information transfer, and the comprehensive European Union approach will be examined.
|
3 |
Privacy, constitutions and the law of torts : a comparative and theoretical analysis of protecting personal information against dissemination in New Zealand, the UK and the USA : a thesis submitted in fulfilment of the requirements for the degree of Doctor of Philosophy in Law in the University of Canterbury /Heite, Martin. January 2008 (has links)
Thesis (Ph. D.)--University of Canterbury, 2008. / Typescript (photocopy). Includes bibliographical references (leave 338-361). Also available via the World Wide Web.
|
4 |
Privacy and Australian law /Gibb, Susan Jennifer. January 1987 (has links) (PDF)
Thesis (Ph. D.)--University of Adelaide, 1987. / Includes abstract. Includes bibliographical references.
|
5 |
The fair information principles : a comparison of U.S. and Canadian privacy policy as applied to the private sector /Crounse, Shane. January 2009 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2009. / Typescript. Includes bibliographical references (leaves 142-174).
|
6 |
The right of publicity in the global market : is James Dean a living dead even in Korea? /Nam, Hyung Doo. January 2005 (has links)
Thesis (Ph. D.)--University of Washington, 2005. / Vita. Includes bibliographical references (leaves 325-349).
|
7 |
The development of the right to privacy under the ECHR : A study on the effect of Article 8 on third partiesWestlund, Martin January 2018 (has links)
No description available.
|
8 |
Direito à intimidade genética na relação de empregoAndrade, Carlos Frederico Guerra January 2008 (has links)
Submitted by Ana Valéria de Jesus Moura (anavaleria_131@hotmail.com) on 2014-09-08T20:27:20Z
No. of bitstreams: 18
Capa.pdf: 9787 bytes, checksum: af8a511e227c90229121dc3ce8d9ee99 (MD5)
Agradecimentos.pdf: 11758 bytes, checksum: d1067720ab3ad177fd34f3d0d3f429ec (MD5)
Abstract.pdf: 6355 bytes, checksum: 562db8b7f7eb3e00bfe245649ce3e4d5 (MD5)
Dedicatória.pdf: 3257 bytes, checksum: 4f057064c2b5c8826b57d0e02821657e (MD5)
DECRETO Nº 6.042.pdf: 37965 bytes, checksum: af0361d79005ad06e4d0d5a4b6a9eb22 (MD5)
Dissertação Final.pdf: 451582 bytes, checksum: 349ef0f480ba9549d7851bcf99313db5 (MD5)
Folhaderosto.pdf: 4558 bytes, checksum: f067e613b1d902e8f8386308e9396593 (MD5)
HC 71373-4 - Leading Case.pdf: 2471602 bytes, checksum: ca960fd4fad97e6192feed9b09f345b7 (MD5)
HC 76060-4.pdf: 285231 bytes, checksum: c6e0423dd380fc3e61fa8ba7a74da453 (MD5)
INSTRUÇÃO NORMATIVA INSS 16.pdf: 25109 bytes, checksum: b5fa5317b17a62ec4b7fd8477395f8eb (MD5)
Mensagens introdutórias.pdf: 3543 bytes, checksum: 46ef319aab4adc7c9e5bf5fb96901795 (MD5)
MPS Nº 457 DE 22.11.2007.pdf: 8379 bytes, checksum: 523f719c9136edb650ffaccbeae8dddd (MD5)
MPS Nº 457 DE 22.11.2007.pdf: 8379 bytes, checksum: 523f719c9136edb650ffaccbeae8dddd (MD5)
Reclamação - STF - 2040-1 - Glória Trevi.pdf: 3674637 bytes, checksum: 632ef3f0eee87ff23ab2328a9b33363a (MD5)
Referências.pdf: 31063 bytes, checksum: d48b8d5d615a6b32f904389c1282c9f0 (MD5)
Resumo Língua Portuguesa.pdf: 6829 bytes, checksum: ce335c7a63c55ca2651e0f5908edb8a4 (MD5)
Sumário.pdf: 15918 bytes, checksum: dc6638142cab74f522d0846e2dfd8769 (MD5)
Termo de aprovação.pdf: 6915 bytes, checksum: 4258a8ece89fc3652301a6fc4b5c2d7a (MD5) / Approved for entry into archive by Ana Valéria de Jesus Moura (anavaleria_131@hotmail.com) on 2014-09-08T20:28:02Z (GMT) No. of bitstreams: 18
Capa.pdf: 9787 bytes, checksum: af8a511e227c90229121dc3ce8d9ee99 (MD5)
Agradecimentos.pdf: 11758 bytes, checksum: d1067720ab3ad177fd34f3d0d3f429ec (MD5)
Abstract.pdf: 6355 bytes, checksum: 562db8b7f7eb3e00bfe245649ce3e4d5 (MD5)
Dedicatória.pdf: 3257 bytes, checksum: 4f057064c2b5c8826b57d0e02821657e (MD5)
DECRETO Nº 6.042.pdf: 37965 bytes, checksum: af0361d79005ad06e4d0d5a4b6a9eb22 (MD5)
Dissertação Final.pdf: 451582 bytes, checksum: 349ef0f480ba9549d7851bcf99313db5 (MD5)
Folhaderosto.pdf: 4558 bytes, checksum: f067e613b1d902e8f8386308e9396593 (MD5)
HC 71373-4 - Leading Case.pdf: 2471602 bytes, checksum: ca960fd4fad97e6192feed9b09f345b7 (MD5)
HC 76060-4.pdf: 285231 bytes, checksum: c6e0423dd380fc3e61fa8ba7a74da453 (MD5)
INSTRUÇÃO NORMATIVA INSS 16.pdf: 25109 bytes, checksum: b5fa5317b17a62ec4b7fd8477395f8eb (MD5)
Mensagens introdutórias.pdf: 3543 bytes, checksum: 46ef319aab4adc7c9e5bf5fb96901795 (MD5)
MPS Nº 457 DE 22.11.2007.pdf: 8379 bytes, checksum: 523f719c9136edb650ffaccbeae8dddd (MD5)
MPS Nº 457 DE 22.11.2007.pdf: 8379 bytes, checksum: 523f719c9136edb650ffaccbeae8dddd (MD5)
Reclamação - STF - 2040-1 - Glória Trevi.pdf: 3674637 bytes, checksum: 632ef3f0eee87ff23ab2328a9b33363a (MD5)
Referências.pdf: 31063 bytes, checksum: d48b8d5d615a6b32f904389c1282c9f0 (MD5)
Resumo Língua Portuguesa.pdf: 6829 bytes, checksum: ce335c7a63c55ca2651e0f5908edb8a4 (MD5)
Sumário.pdf: 15918 bytes, checksum: dc6638142cab74f522d0846e2dfd8769 (MD5)
Termo de aprovação.pdf: 6915 bytes, checksum: 4258a8ece89fc3652301a6fc4b5c2d7a (MD5) / Made available in DSpace on 2014-09-08T20:28:02Z (GMT). No. of bitstreams: 18
Capa.pdf: 9787 bytes, checksum: af8a511e227c90229121dc3ce8d9ee99 (MD5)
Agradecimentos.pdf: 11758 bytes, checksum: d1067720ab3ad177fd34f3d0d3f429ec (MD5)
Abstract.pdf: 6355 bytes, checksum: 562db8b7f7eb3e00bfe245649ce3e4d5 (MD5)
Dedicatória.pdf: 3257 bytes, checksum: 4f057064c2b5c8826b57d0e02821657e (MD5)
DECRETO Nº 6.042.pdf: 37965 bytes, checksum: af0361d79005ad06e4d0d5a4b6a9eb22 (MD5)
Dissertação Final.pdf: 451582 bytes, checksum: 349ef0f480ba9549d7851bcf99313db5 (MD5)
Folhaderosto.pdf: 4558 bytes, checksum: f067e613b1d902e8f8386308e9396593 (MD5)
HC 71373-4 - Leading Case.pdf: 2471602 bytes, checksum: ca960fd4fad97e6192feed9b09f345b7 (MD5)
HC 76060-4.pdf: 285231 bytes, checksum: c6e0423dd380fc3e61fa8ba7a74da453 (MD5)
INSTRUÇÃO NORMATIVA INSS 16.pdf: 25109 bytes, checksum: b5fa5317b17a62ec4b7fd8477395f8eb (MD5)
Mensagens introdutórias.pdf: 3543 bytes, checksum: 46ef319aab4adc7c9e5bf5fb96901795 (MD5)
MPS Nº 457 DE 22.11.2007.pdf: 8379 bytes, checksum: 523f719c9136edb650ffaccbeae8dddd (MD5)
MPS Nº 457 DE 22.11.2007.pdf: 8379 bytes, checksum: 523f719c9136edb650ffaccbeae8dddd (MD5)
Reclamação - STF - 2040-1 - Glória Trevi.pdf: 3674637 bytes, checksum: 632ef3f0eee87ff23ab2328a9b33363a (MD5)
Referências.pdf: 31063 bytes, checksum: d48b8d5d615a6b32f904389c1282c9f0 (MD5)
Resumo Língua Portuguesa.pdf: 6829 bytes, checksum: ce335c7a63c55ca2651e0f5908edb8a4 (MD5)
Sumário.pdf: 15918 bytes, checksum: dc6638142cab74f522d0846e2dfd8769 (MD5)
Termo de aprovação.pdf: 6915 bytes, checksum: 4258a8ece89fc3652301a6fc4b5c2d7a (MD5) / A dissertação aborda o direito à intimidade genética na relação de emprego. Inicia fazendo uma abordagem dos direitos da personalidade, sua definição, características e classificação, para, em seguida, enfrentar a questão propriamente dita da intimidade genética. Ao analisar este tema, são levantadas diversas problemáticas, tais como definição, características e forma de acesso ao genoma humano; os elementos, a natureza jurídica, os sujeitos e limites da intimidade genética; as discussões atinentes às provas genéticas e à própria medicina preditiva ou genômica. Para fundamentar a existência de um direito à intimidade genética, são colacionados as Declarações, Resoluções, Recomendações e Convenções Internacionais e em especial, os artigos da Constituição Federal de 1988 asseguradores deste direito. Analisa-se, a seguir, o direito à intimidade genética na relação de emprego, fazendo um estudo dos artigos da CLT, da NR-7 e da Lei 11.430/2006 em face de temas bioéticos como vulnerabilidade, consentimento livre e esclarecido, obtenção e utilização de informações genéticas, confidencialidade e sigilo dos resultados. Tais questões são contrapostas a temas próprios do Direito do Trabalho como a obrigação do empregador de realizar exames médicos; a preservação e a segurança do meio ambiente de trabalho; a liberdade de contratar do empregador. Ante esta colisão de direitos, aponta-se a resolução do conflito mediante a ponderação de interesses, através da utilização dos princípios da razoabilidade e da proporcionalidade. Ao final, sustenta-se a existência de um direito à intimidade genética na relação de emprego, apontando-se, entretanto, critérios objetivos para a sua realização.
|
9 |
Enforcing Privacy on the Internet.Lategan, Frans Adriaan 02 June 2008 (has links)
Privacy of information is becoming more and more important as we start trusting unknown computers, servers and organisations with more and more of our personal information. We distribute our private information on an ever-increasing number of computers daily, and we effectively give target organisations carte blanche to do what they want with our private information once they have collected it. We have only their privacy policy as a possible safeguard against misuse of our private information. Thus far, no reliable and practical method to enforce privacy has been discovered. In this thesis we look at ways to enforce the privacy of information. In order to do this, we first present a classification of private information based on the purpose it is acquired for. This will then enable us to tailor protection methods in such a way that the purpose the information is acquired for can still be fulfilled. We propose three distinct methods to protect such information. The first method, that of nondisclosure, is where private information is required not for the contents, but as input to verify calculations. We shall present an encryption method to protect private information where the private information consists of a set of numeric values S on which some function G has to be applied and the result = G(S) has to be supplied to a target organisation. The calculation of the result must be verifiable by the target organisation, without disclosing S. The second method, that of retaining control is a method by which we can grant limited access to our private information, and thus enforce the terms of privacy policies. The final method we present is a conceptual method to extend P3P in order to add more flexibility to the decision on whether or not a given item of private information will be supplied to a target organisation by using the Chinese Wall security policy. This will enable a user to not only define rules as to which items of private information he would disclose, but also to define what collection of private information any given organisation would be able to build about him. / Olivier, M.S., Prof.
|
10 |
Right to publicity and privacy versus first amendment freedom of speechLukman, Joshua R. 01 January 2003 (has links)
A person's right to publicity may often contradict with another person's rights under the First Amendment. While a person's legal protection over their right of publicity is relatively new in the eyes of our court, this topic of law and other related matters seem to be at the center of attention in current large profile civil litigation cases. The First Amendment seeks to promote speech, whereas the right of publicity laws seeks .to limit speech. If civil action is brought against a defendant for violating the plaintiffs right of publicity, a First Amendment exception may apply as a valid defense. This contradiction in the nature of these laws is forcing our court system to review applicable cases on a case by base basis, resulting in some degree of unpredictability in the courts. Because many of the parties in these cases are large commercial companies, more money is at stake as suits of misappropriation are filed. The issue of what direction(s) the courts should take in this matter spawns opposing views. While some views suggest that bright lines be drawn within right of publicity laws in order to avoid redundant and excessive cases and appeals, opposing views contend that bright lines cannot be drawn given the unique and sometimes artistic expression protected under the First Amendment. Our courts have applied the basic framework of copyright law in order to aid in their decision-making. Courts must weigh the right of publicity against the First Amendment.
|
Page generated in 0.0433 seconds