Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "data protection" wg kryterium: Temat


Tytuł:
The right to privacy and the protection of personal data: Convention 108 as a universal and timeless standard for policymakers in Europe and beyond
Autorzy:
Góral, Urszula
Powiązania:
https://bibliotekanauki.pl/articles/1963607.pdf
Data publikacji:
2021
Wydawca:
Uniwersytet Szczeciński. Wydawnictwo Naukowe Uniwersytetu Szczecińskiego
Tematy:
data protection
privacy
data protection law
data protection policy
Convention 108
GDPR
Opis:
It is widely recognised that the first binding legal act regarding the protection of personal data of an international nature is Convention 108, adopted on 28 January 1981. By virtue of the Convention, the Parties are required to apply in their domestic legal order the principles introduced by the Council of Europe to ensure guarantees for the fundamental human rights of all individuals with regard to the processing of personal data. This paper refers to Convention 108 as the foundation for European and international data protection laws in a number of European countries. It has influenced policies and legislation far beyond Europe’s borders. However, due to the development of ICT tools that permit establishing new data-driven business models based on data-processing systems, Convention 108 has become subject to modernisation. At the same time, intensive negotiations were conducted in the EU concerning a new data-protection package to reform the data-protection system, and many other countries around the world have introduced provisions related to the processing of personal data. This paper analyses the impact of the standards set out in Convention 108 on the decision-making process and its global dimension.
Źródło:
Acta Iuris Stetinensis; 2021, 33; 101-113
2083-4373
2545-3181
Pojawia się w:
Acta Iuris Stetinensis
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
States of emergency – selected problems regarding the personal data protection
Autorzy:
Soczyński, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/1179132.pdf
Data publikacji:
2017
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
data protection
general data protection regulation
information security
Opis:
The following elaboration has been produced following the analysis of the problem regarding the protection of privacy and private life as well as the personal data themselves under the circumstances of life-threatening situations or the state of emergency. The solutions stipulated by the domestic and EU legislation have been analysed with emphasis put over accessing processes to personal data , both indispensible and proportional ones, carried out with an intention to secure public safety, including the protection of human life especially as a reaction to natural disasters or catastrophes caused by humans, protection of other important objectives that lie within general public interest, for instance when data processing remains necessary for humanitarian purposes, including the monitoring of epidemics and their dispersion. Personal data are characterised by various degrees of sensitivity and criticality. Some of them may require an additional level of protection and special treatment. GDPR makes it possible for the Member States to clarify their provisions , including such ones regarding the processing of personal data of special categories ( also referred to as sensitive data), they do not exclude an option to specify in the legislation of a Member State the circumstances of precise situations related to data processing , including the precise clarification of conditions which decide whether data processing remains compliant to the law. Personal data processing under extraordinary circumstances may imply, as an exception, the necessity to transfer the data if such action is required by important public interest set forth by the EU legislation or the relevant provisions of a Member State or if such transferring occurs from the register established by law and intended to provide an insight for the general public or persons maintaining legally valid interest, for instance public health units in order to establish infectious contacts in case of infectious diseases outbreak. A subsequent part of the article focuses on the issues related to the course of actions under state of emergency, i.e. it presents the proceedings to be carried out in emergency state and specifies the concerns on emergency call processing, including the personal data.
Źródło:
World Scientific News; 2017, 85; 29-37
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Ocena wdrożenia dyrektywy 2016/681 w sprawie wykorzystywania danych dotyczących przelotu pasażera (danych PNR)
Evaluation of the implementation of Directive 2016/681 on the use of passenger name record (PNR)
Autorzy:
Mik, Cezary
Powiązania:
https://bibliotekanauki.pl/articles/2194655.pdf
Data publikacji:
2022
Wydawca:
Kancelaria Sejmu. Biuro Analiz Sejmowych
Tematy:
data protection
aviation
terrorism
Opis:
The Directive sets out the principles for the collection, storage and processing of passenger data. It was implemented in Poland in the form of a statute that significantly detailed the regulation of the Directive. The National Passenger Information Unit was established under the statute. The transposition raises no legal objections.
Źródło:
Zeszyty Prawnicze BAS; 2022, 3(75); 92-98
1896-9852
2082-064X
Pojawia się w:
Zeszyty Prawnicze BAS
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Data protection by design on the ground of a general data protection regulation
Autorzy:
Siemieniak, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/1179134.pdf
Data publikacji:
2017
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
data protection
general data protection regulation
information security
privacy by design
privacy protection
Opis:
Each member of the information society generates, often quite involuntarily, noticeable amounts of data being closely related to them. The range of such data may be extremely extensive as it may encompass the details on the geographical positioning, the data regarding the network behaviours or the data on ID numbers for the devices used. Hence, there exists a more and more intensified and permanent risk of the right for privacy , one of the most fundamental human right, being infringed on. Data controllers attempt to enter any personal data which are easily accessible due to the operational peculiarities applicable to various technological solutions. Such actions may infringe on the rights included into the charter of fundamental rights, namely the right for privacy and the right for personal data protection. Consequently, the data controllers remain under obligation to carry out a series of duties within the area of personal data protection that are related to appropriate technical and organisational means being applied in order to achieve full legal compliance on the matter. Privacy protection remains a complicated process involving the interactions from various areas including the law, software engineering, cycle management or ethics. One of the legal solutions to be introduced by the general data protection regulation is , the so called, “privacy by design” model. The following publication is intended to present the privacy by design model on the ground of the general data protection regulation.
Źródło:
World Scientific News; 2017, 85; 38-43
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Gloss on the ruling of the Supreme Administrative Court of 25 May 2022, case reference number III OSK 2273/21
Autorzy:
Walencik, Dariusz
Powiązania:
https://bibliotekanauki.pl/articles/2197783.pdf
Data publikacji:
2023-04-26
Wydawca:
Uczelnia Łazarskiego. Oficyna Wydawnicza
Tematy:
data protection
Catholic Church
GDPR
autonomous and comprehensive rules of data protection
Opis:
The glossed ruling covers two key issues concerning the application of the autonomous and comprehensive rules of the protection of natural persons with regard to the processing of personal data applied by organisational units of the Catholic Church in the territory of the Republic of Poland. The first issue concerns the possibility of further application of these autonomous, comprehensive rules after the GDPR came into force. The second issue concerns the ability to designate and grant a legal status to an independent separate supervisory authority: the Ecclesiastical Data Protection Officer. Approving the stance presented in the ruling of the Supreme Administrative Court, the gloss presents arguments confirming the fact that when the GDPR came into force, a regulation concerning the processing of personal data existed in the Catholic Church (it was primarily contained in the standards of the Code of Canon Law of 1983), which the Catholic Church, by the time specified in Article 91(1) GDPR, harmonised with the provisions of that legal act. Moreover, the mode of operation, the manner of designating or dismissing the Ecclesiastical Data Protection Officer does not have to be derived from the universally binding law. It may arise from the internal law of the Catholic Church, provided that the requirements laid down in Chapter VI GDPR, i.e. independence, fulfilment of general conditions concerning data protection supervisory authorities, secrecy, performance of tasks and exercise of the powers laid down in the GDPR (relevant competences), are met. This argument originates from the principle of autonomy and independence of churches and other religious organisations, guaranteed by the provisions of the Constitution of the Republic of Poland. The reasoning is also confirmed in recital 165 of the GDPR preamble, which states that “This Regulation respects and does not prejudice the status under the constitutional law of churches and associations or religious communities in the Member States, as recognised in Article 17 TFEU”.
Źródło:
Ius Novum; 2023, 17, 1 ENG
1897-5577
Pojawia się w:
Ius Novum
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A client-based encryption model for secure data storing in publicly available storage systems
Autorzy:
Retinger, Marek
Powiązania:
https://bibliotekanauki.pl/articles/305441.pdf
Data publikacji:
2019
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
data storage
data protection
encryption
security
Opis:
This document presents a conceptual model of a system for protecting thedata stored in publicly available data storage systems. The main idea was toapply encryption on both the client and server sides that would consequentlyhave a significant impact on data security. The compatibility with existingsystems allows us to deploy the solution fast and at a low cost. The testsconducted on a simplified implementation have confirmed the solution’s validity,and they have shown some possible performance issues as compared to theclassical system (which can be easily bypassed).
Źródło:
Computer Science; 2019, 20 (2); 179-194
1508-2806
2300-7036
Pojawia się w:
Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Connecting for Surgery: The Belgian Use Case on the Legal Aspects of the Digital Operating Room
Autorzy:
Vandezande, N.
Verhenneman, G.
Dumortier, J.
Powiązania:
https://bibliotekanauki.pl/articles/307832.pdf
Data publikacji:
2013
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
data protection
e-health
telecommunications
Opis:
Telecommunications technology is making its way into operating rooms by new developments in e-health. However, conflicts arise with existing legal principles regarding data protection. This paper deals with key elements of the interactions between data protection and evolution in e-health. The scope will be the digital operating room, where different health services and activities converge through networked technology, raising a number of privacy-related issues. For instance, the patient's health records and tools for recording surgical procedures could be integrated within the same platform, potentially leading to sensitive personal data linkage. Also the possible duration and reason of storage of surgical recordings, is a matter that remains largely unresolved in current practice. First, this paper will analyze the data exchanges of the digital operating room. As these will include personal patient data, it must be assessed whether and how the European framework on data protection can apply. Second, the regulatory regime of the manufacturers of the devices of the digital operating room will be analyzed. Can the current legal framework relating to e-health provide for suitable regulation for such devices? Drawing from experience gained in research projects, this paper aims to provide practical answers to often theoretical questions.
Źródło:
Journal of Telecommunications and Information Technology; 2013, 1; 11-19
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Europejskie organy ochrony danych osobowych – reforma systemu i nowe wyzwania
The European personal data protection authorities – the reform of the system and new challenges
Autorzy:
Grzelak, Agnieszka
Powiązania:
https://bibliotekanauki.pl/articles/1185172.pdf
Data publikacji:
2014-12-01
Wydawca:
Szkoła Główna Handlowa w Warszawie
Tematy:
reforma systemu ochrony danych osobowych
ochrona danych osobowych
organy ochrony danych osobowych
the data protection reform
data protection authorities
personal data protection
Opis:
W artykule podjęto problem reformy systemu ochrony danych osobowych w kontekście zmian, nowych zadań i wyzwań stojących przed europejskimi organami ochrony danych, w szczególności Europejskim Inspektorem Ochrony Danych, Grupą roboczą art. 29 czy też krajowymi organami nadzorczymi. Przedłożone w ostatnich latach przez Komisję Europejską projekty aktów ogólnych odnoszących się do omawianych zagadnień, jak i szczególnych, regulujących funkcjonowanie agencji UE zajmujących się walką z przestępczością, wyraźnie pokazują, że zaproponowane zmiany mają służyć zwiększeniu roli tych organów zarówno w wymiarze unijnym, jak i krajowym, poprzez zapewnienie skuteczniejszego egzekwowania nowych przepisów. Temu też służyć ma planowane zacieśnienie współpracy między organami krajowymi i koordynacja ich działań.
The article discusses the problem of the reform of the system of the protection of personal data in the context of changes, new tasks and challenges faced by the European data protection authorities, in particular the European Data Protection Supervisor, Article 29 Working Group or the national supervisory authorities. The proposals of regulations and directives submitted in recent years by the European Commission related to data protection in general, as well as the specific rules governing the functioning of the EU agencies involved in the fight against crime clearly show that the proposed changes are intended to increase the role of these bodies at both the E. U. and the national level by ensuring a more effective implementation of the new rules. The planned strengthening of the relationship between the national authorities as well as the coordination of their activities also aims to meet this objective.
Źródło:
Studia z Polityki Publicznej; 2014, 1, 4(4); 87-107
2391-6389
2719-7131
Pojawia się w:
Studia z Polityki Publicznej
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Practical Implementation of Biometric Technology - Legal Aspects
Autorzy:
Tomaszewska-Michalak, M.
Powiązania:
https://bibliotekanauki.pl/articles/308584.pdf
Data publikacji:
2015
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
biometric legislation
biometric system
data protection
Opis:
The article refers to legal and social problems, which may occur while implementing a biometric system. The research on biometric regulation made by the author while preparing the Ph.D. thesis resulted in nding general rules, which should be followed by legislator to introduce a wellfunctioning and user's friendly biometric system.
Źródło:
Journal of Telecommunications and Information Technology; 2015, 2; 25-29
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Personal Data Protection as an Expression of Personalism
Autorzy:
Chojara-Sobiecka, Małgorzata
Kroczek, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/2015995.pdf
Data publikacji:
2021-12-31
Wydawca:
Wydawnictwo Uniwersytetu Śląskiego
Tematy:
data protection
personalism
Karol Wojtyła
GDPR
Opis:
Human-related issues are the objected personalism. One of the current problems contemporarily recognized and widely known is data protection. The article aims to present a mutual connection between legal regulations of data protection, taking under consideration GDPR, and personalism. The conclusion is that there are many elements in legal regulations that justify the conviction that the protection of personal data can be seen as an expression of personalism.
Źródło:
Philosophy and Canon Law; 2021, 7, 2; 1-9
2450-4955
2451-2141
Pojawia się w:
Philosophy and Canon Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Bezpieczeństwo i ochrona informacji
Security and data protection
Autorzy:
Strzyżakowski, Z.
Powiązania:
https://bibliotekanauki.pl/articles/158095.pdf
Data publikacji:
2005
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
bezpieczeństwo
ochrona informacji
poufność
security
data protection
Opis:
W artykule przedstawiono zagadnienie bezpieczeństwa osób i mienia oraz bezpieczeństwo informacji, z uwzględnieniem podstawowych wymagań modelu OSI celem zapewnienia postulatów bezpiecznego systemu.
This paper presents issue of security of persons and property as well as. The basic requirement of OSI model were taking into account order to guarantee the postulate of secure system.
Źródło:
Pomiary Automatyka Kontrola; 2005, R. 51, nr 4, 4; 4-5
0032-4140
Pojawia się w:
Pomiary Automatyka Kontrola
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Prawo do bycia zapomnianym w perspektywie przetwarzania danych osobowych
The right to be forgotten from the perspective of processing personal data
Autorzy:
Nasiadka, Łukasz
Powiązania:
https://bibliotekanauki.pl/articles/28409258.pdf
Data publikacji:
2023
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
personal data processing
right to be forgotten
data protection
Opis:
Nowadays, effective protection of personal data is one of the fundamental issues of a democratic state under the rule of law. Therefore, the legislator should be very precise about the principles and standards of data processing. In the last few decades, in particular, the development of new technologies, digitalisation and the increase in the need for electronic communication has become evident, which leads to the adoption of appropriate regulations for the handling of personal data. In addition, the EU legislator has introduced the General Data Protection Regulation (GDPR) in order to harmonise the regulations of EU Member States regarding the protection of personal data. This provides a framework for the proper functioning of legal provisions across the European Union regarding the handling of personal data of its citizens.The aim of the article is to identify the legal changes resulting from the Personal Data Protection Regulation, with a particular focus on the persons to which they apply and then to analyse the regulation of ‘the right to be forgotten’. In the first part of the article, attention is drawn to the way personal data are processed and the scope of obligations incumbent on data controllers. This is because data controllers are, together with the personal data protection officer, responsible for recording data processing activities, including ongoing monitoring and responding to situations of inaccurate data processing. The second part focuses on the right to be forgotten and the assessment of this entitlement in the perspective of Regulation 2016/679. The research methods include an analysis of legal acts, at the same time using the subject literature.
Źródło:
Studia Prawa Publicznego; 2023, 2 (42); 77-94
2300-3936
Pojawia się w:
Studia Prawa Publicznego
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Marketing sent by banks to e-mail address in compliance with the law
Autorzy:
Wysocka, Kamila
Powiązania:
https://bibliotekanauki.pl/articles/1978067.pdf
Data publikacji:
2018
Wydawca:
Akademia Leona Koźmińskiego w Warszawie
Tematy:
advertising law
marketing
consumer protection
spam
data protection
mailing
Opis:
This article covers considerations on the e-mail marketing of financial products and services aimed at consumers. The research paper presents the practice of banks used by those institutions in the e-marketing; basic concepts such as information, offer, advertisement, communication or spam have been considered. The article addresses in particular relevant problems linked to sending advertising materials by e-mail, i.e specifying what types of messages a bank may send to its customers, whether a bank may send such messages to all its customers, whether a bank may send such messages only to its customers, what the consumers rights with respect to receiving unwanted and unsolicited commercial information are. The research paper took into consideration current judicature and views of legal writers.
Źródło:
Krytyka Prawa. Niezależne Studia nad Prawem; 2018, 10, 2; 432-446
2080-1084
2450-7938
Pojawia się w:
Krytyka Prawa. Niezależne Studia nad Prawem
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Dane osobowe jako kluczowy obiekt zainteresowania cyberprzestępców
Personal data as a key interest of cybercriminals
Autorzy:
Kwaśnik, Jakub
Powiązania:
https://bibliotekanauki.pl/articles/11331420.pdf
Data publikacji:
2020
Wydawca:
Uniwersytet Papieski Jana Pawła II w Krakowie
Tematy:
personal data protection
cybercrime
data protection officer
Internet
social engineering
ochrona danych osobowych
cyberprzestępczość
inspektor ochrony danych
socjotechnika
Opis:
Rozwój nowych technologii spowodował, że znaczna część codziennego funkcjonowania jednostki przeniosła się do cyberprzestrzeni. Powszechność i łatwy dostęp do Internetu sprawiły, że społeczeństwo sprawnie używa Internetu zarówno w pracy i nauce, jak i realizując swoje hobby oraz życie towarzyskie. Niestety, w społeczeństwie nadal występuje niska świadomość zagrożeń w sieci i brak odpowiedniej ostrożności, co bezwzględnie wykorzystują cyberprzestępcy. Bazując na socjotechnice i tendencji użytkowników do umieszczania wielu informacji o sobie w sieci, w łatwy sposób przełamują oni proste zabezpieczenia i uzyskują dostęp do interesujących ich obszarów. Działalność cyberprzestępców to obecnie jedno z największych wyzwań, przed jakimi stają w swojej pracy inspektorzy ochrony danych. Artykuł ma na celu opisanie cyberprzestępczych mechanizmów i metod działania. Stanowi również próbę odpowiedzi na pytanie, jak skutecznie walczyć z tym zjawiskiem.
The development of new technologies has caused the situation that the significant part of the daily operation of an individual has moved to cyberspace. The Internet with its easy and common access has become an effective tool both at work and education process for the whole society. What is more people use the Internet to pursue a hobby and for their social life. Unfortunately, the society still has low awareness of the online threats and there can be observed a lack of proper caution, which is efficiently exploited by cybercriminals. Basing on social engineering and the tendency of users to place a lot of information about themselves on the web, the cybercriminals are able to easily break a simple security and gain access to the information they are interested in. Therefore cybercriminals activity is one of the biggest challenges for data protection officers. The article aims to describe cyber criminal mechanisms and methods of their operation and at the same time trying to answer the question how to successfully fight this phenomenon.
Źródło:
Annales Canonici; 2020, 16, 1; 25-37
1895-0620
Pojawia się w:
Annales Canonici
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies