نتایج جستجو برای: pipeda privacy laws

تعداد نتایج: 100291  

2004
Kathy Bohrer Xuan Liu Dogan Kesdogan Edith Schonberg Moninder Singh Susan L. Spraragen

With the increasing importance of the Internet as a channel for conducting business, protecting consumer privacy has become a critical challenge. Privacy protection deals with methods giving the data owner control of his data so that he can decide when and to what extend he wants to disclose his information, and then enforcing the user’s privacy preferences, either through technology, business ...

2010
Girma Nigusse Bart De Decker

Privacy codes of practice developed in the 1980s in response to the concerns about the introduction of computerized databases, automated personal information processing systems, and easy transmission of personal information across national and international boundaries. The current data-practice guidelines, laws, and model-codes have been modeled based on these early codes. Starting from the ear...

2006
Marco Casassa Mont Siani Pearson Robert Thyne

Privacy management is important for enterprises that handle personal data: they must deal with privacy laws and people’s expectations. Currently much is done by means of manual processes, which make them difficult and expensive to comply. Key enterprises’ requirements include: automation, simplification, cost reduction and leveraging of current identity management solutions. This paper describe...

2010
R. Vidyabanu N. Nagaveni

Privacy has become an important issue in the progress of data mining techniques. Many laws are being enacted in various countries to protect the privacy of data. This privacy concern has been addressed by developing data mining techniques under a framework called privacy preserving data mining. Presently there are two main approaches popularly used -data perturbation and secure multiparty compu...

Journal: :Pediatrics 2010
K Todd Houston Diane D Behl Karl R White Irene Forsman

To be successful, Early Hearing Detection and Intervention (EHDI) programs require individually identifiable information about children to be shared among people who are responsible for screening, diagnosis, early intervention, family support, and medical home services. Pediatricians and other stakeholders in the EHDI process often point to federal laws that were passed to ensure privacy and co...

2011
Fernando M. B. M. de Castilho Roger Granada Renata Vieira Tomas Sander Prasad Rao

This paper presents a mapping of enriched knowledge resources for data privacy management. An ontology, enriched through natural language techniques, is used for an integrated visualization for global inspection of heterogeneous data. The visualization helps stakeholders in exploring and maintaining a knowledge base for data privacy accountability. The integration of resources on the basis of c...

2006
Hugo A. Mitre-Hernández Ana Isabel González-Tablas Ferreres Benjamín Ramos Arturo Ribagorda

During the last years many laws have been promulgated in diverse countries to protect citizens’ privacy. This fact is due to the increase of privacy threats caused by the tendency of using information technologies in all scopes. Location Based Services (LBS) compose a situation where this privacy can be harmed. Even there exist mechanisms to protect this right in LBS, generally this services ha...

Journal: :Computing Systems 1996
Ira S. Winkler

Many companies spend millions of dollars to ensure corporate cãmputer security'. The security protects company secrets, utiittt in compliance with i"ã"r¡ laws,^aná enforces privacy of company clients.

2013

Some countries have been able to balance privacy rights and rights to health and health care in a way that permits privacy-respectful data use for monitoring population health and the quality of health care. There are very good reasons for allowing data use, including to improve health outcomes and patient safety and to make good decisions about the wise use of health care resources. In other c...

2005
GRANT YANG

Gmail, a highly anticipated webmail application made by Google, has been criticized by privacy advocates for breaching wiretapping laws, even before its release from beta testing. Gmail’s large storage space and automated processes developed to scan the content of incoming messages and create advertisements based on the scanned terms have enraged privacy groups on an international level. This i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید