نتایج جستجو برای: pipeda privacy laws

تعداد نتایج: 100291  

2014
Ulrich Lang Sid Shetye

Does privacy protection matter in the internet of things (IoT) including consumer electronics (CE)? So what is privacy, how is it valued and where does it sit in your organization today? Chances are if you don’t have a chief privacy officer or data protection officer, your company is lacking in protecting critical data, let alone all the laws and statutory regulations dealing with privacy (e.g....

Journal: :SA Journal of Information Management 2015

Journal: :The Journal of The British Blockchain Association 2020

Journal: :American Journal of Public Health 2011

Journal: :ACM Computing Surveys 2021

Internet of Things applications have the potential to derive sensitive information about individuals. Therefore, developers must exercise due diligence make sure that data are managed according privacy regulations and protection laws. However, doing so can be a difficult challenging task. Recent research has revealed typically face difficulties when complying with regulations. One key reason is...

2007
Leszek Lilien Bharat Bhargava

The need for privacy is broadly recognized by individuals, businesses, the government, the computer industry, and academic researchers. Examples are shown in Figure 1. The growing recognition of the importance of privacy is motivated not only by users’ sensitivity about their personal data. Other factors include business losses due to privacy violations, and enactments of federal and state priv...

Journal: :Journal of occupational and environmental medicine 2009
Mark A Rothstein Heather L Harrell

OBJECTIVE We sought to examine the legal and ethical implications of workplace health risk reduction programs (HRRPs) using health risk assessments, individually focused risk reduction, and financial incentives to promote compliance. METHODS We conducted a literature review, analyzed relevant statutes and regulations, and considered the effects of these programs on employee health privacy. ...

2012
Francis Akowuah Xiaohong Yuan Jinsheng Xu

In the complex technological world that healthcare organizations and their business associates operate, there exist security threats and attacks which render individually identifiable health information vulnerable. Laws exist to ensure that healthcare providers take practical measures to address the security and privacy needs of health information. There are also standards that assist healthcar...

Journal: :IJWNBT 2012
Gundars Kaupins

This article describes the present and potential legal constraints of mobile computing especially related to cloud computing. Numerous American national laws such as the Health Insurance Portability and Accountability Act (HIPAA) and the Gramm, Leach, Bliley Act provide industry-related guidelines such as providing employee training on data security. Numerous state laws, as in California, get m...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید