Protecting privacy in automated transaction systems: A legal and technological perspective in the European Union
نویسندگان
چکیده
In the past, spies could enter one’s residence, organisations or companies and collect valuable information such as personal sensitive data, trade secrets or transaction records. Nowadays, the open architecture of the Internet has generated an environment in which there are more opportunities to quickly and easily obtain data than there used to be, as a variety of sensitive information can be captured on the Internet without a physical presence in the location where the data is situated. Privacy rights have consequently become more vulnerable to attack. This paper will discuss the current legal framework of ePrivacy protection in the European Union (EU), examine the state-of-the-art technologies for service-oriented computing, evaluate practical obstacles and propose possible solutions to establish trust in privacy management.
منابع مشابه
Perspective of Mutual Recognition;Challenges and Mechanisms for Implementing it in the Area of European :::::::::union::::::::: Criminal Law
Abstract: Creation of new criminal law in the European ::::::::union:::::::: has led to an approximation of the criminal law of member states to each other. Compliance with this obligation for EU member states is due to the provisions of the Treaty of Lisbon. Main approach of the Treaty of Lisbon is to resort to the option of harmonizing the criminal laws of the member states, which is a new ch...
متن کاملThe Golden Principle of Ethics and Legal Prevention of Illegal Use of Databases
Background: Collecting data in the form of databases is one of the new methods that has been growing with the advancement of information technology. The use of databases in management and policy-making has created challenges in areas such as privacy breaches and compliance with accepted ethical norms. The increasing use of databases in public and private organizations in Iran has introduced new...
متن کاملAccessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
متن کاملAccessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
متن کاملReaching Outside the Comfort Zone: Realising the FCTC’s Potential for Public Health Governance and Regulation in the European Union; Comment on “The Legal Strength of International Health Instruments – What It Brings to Global Health Governance?”
In their paper, Nikogosian and Kickbusch show how the effects of the adoption by the World Health Organization (WHO) of the Framework Convention on Tobacco Control (WHO FCTC) and its first Protocol extend beyond tobacco control and contribute to public health governance more broadly, by revealing new processes, institutions and instruments. While there are certainly good reasons to be optimisti...
متن کامل