Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "data protection" wg kryterium: Wszystkie pola


Tytuł:
Data protection by design on the ground of a general data protection regulation
Autorzy:
Siemieniak, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/1179134.pdf
Data publikacji:
2017
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
data protection
general data protection regulation
information security
privacy by design
privacy protection
Opis:
Each member of the information society generates, often quite involuntarily, noticeable amounts of data being closely related to them. The range of such data may be extremely extensive as it may encompass the details on the geographical positioning, the data regarding the network behaviours or the data on ID numbers for the devices used. Hence, there exists a more and more intensified and permanent risk of the right for privacy , one of the most fundamental human right, being infringed on. Data controllers attempt to enter any personal data which are easily accessible due to the operational peculiarities applicable to various technological solutions. Such actions may infringe on the rights included into the charter of fundamental rights, namely the right for privacy and the right for personal data protection. Consequently, the data controllers remain under obligation to carry out a series of duties within the area of personal data protection that are related to appropriate technical and organisational means being applied in order to achieve full legal compliance on the matter. Privacy protection remains a complicated process involving the interactions from various areas including the law, software engineering, cycle management or ethics. One of the legal solutions to be introduced by the general data protection regulation is , the so called, “privacy by design” model. The following publication is intended to present the privacy by design model on the ground of the general data protection regulation.
Źródło:
World Scientific News; 2017, 85; 38-43
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Simple hardware method of data protection
Autorzy:
Kotliński, Jerzy
Powiązania:
https://bibliotekanauki.pl/articles/764263.pdf
Data publikacji:
2004
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2004, 2, 1
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Bezpieczeństwo i ochrona informacji
Security and data protection
Autorzy:
Strzyżakowski, Z.
Powiązania:
https://bibliotekanauki.pl/articles/158095.pdf
Data publikacji:
2005
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
bezpieczeństwo
ochrona informacji
poufność
security
data protection
Opis:
W artykule przedstawiono zagadnienie bezpieczeństwa osób i mienia oraz bezpieczeństwo informacji, z uwzględnieniem podstawowych wymagań modelu OSI celem zapewnienia postulatów bezpiecznego systemu.
This paper presents issue of security of persons and property as well as. The basic requirement of OSI model were taking into account order to guarantee the postulate of secure system.
Źródło:
Pomiary Automatyka Kontrola; 2005, R. 51, nr 4, 4; 4-5
0032-4140
Pojawia się w:
Pomiary Automatyka Kontrola
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Personal Data Protection as an Expression of Personalism
Autorzy:
Chojara-Sobiecka, Małgorzata
Kroczek, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/2015995.pdf
Data publikacji:
2021-12-31
Wydawca:
Wydawnictwo Uniwersytetu Śląskiego
Tematy:
data protection
personalism
Karol Wojtyła
GDPR
Opis:
Human-related issues are the objected personalism. One of the current problems contemporarily recognized and widely known is data protection. The article aims to present a mutual connection between legal regulations of data protection, taking under consideration GDPR, and personalism. The conclusion is that there are many elements in legal regulations that justify the conviction that the protection of personal data can be seen as an expression of personalism.
Źródło:
Philosophy and Canon Law; 2021, 7, 2; 1-9
2450-4955
2451-2141
Pojawia się w:
Philosophy and Canon Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Personal data protection as an element of competitive advantage
Autorzy:
Żywiołek, Justyna
Nedeliaková, Eva
Powiązania:
https://bibliotekanauki.pl/articles/88539.pdf
Data publikacji:
2020
Wydawca:
Stowarzyszenie Menedżerów Jakości i Produkcji
Tematy:
personal data protection
competitive advantage
data management
information security
ochrona danych osobowych
przewaga konkurencyjna
zarządzanie danymi
bezpieczeństwo informacji
Opis:
The article presents results of research on the information flow between the client and the company, inside the company, and the problems encountered by both parties in the data exchange process. Also included are methods of securing information through unauthorized disclosure, disclosing ideas to other clients. The basis of the study was a survey directed to 75 customers ordering in the examined enterprise and a survey among 40 employees of that enterprise. The study was also based on an in-depth conversation with employees of the examined company employed at various levels. The survey shows that the clients and employees of the surveyed company are aware of the high value of information, and its security is considered one of the priorities. The survey clearly shows that customers praise data protection activities, they treat it as an element used to care for the interests of the customer, as a further environment of the product or service they purchase. However, there are often errors due to customer ignorance, communication problems, and lack of knowledge of employees. The study covered the importance of information in an enterprise as part of its competitive advantage, the reasons for investing in information protection, the occurrence of incidents, the degree of information security, and actions taken to protect information in an enterprise.
Źródło:
System Safety : Human - Technical Facility - Environment; 2020, 2, 1; 55-61
2657-5450
Pojawia się w:
System Safety : Human - Technical Facility - Environment
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Ocena skutków dla ochrony danych
Data Protection Impact Assessment
Autorzy:
Pyka, Aleksandra
Powiązania:
https://bibliotekanauki.pl/articles/910767.pdf
Data publikacji:
2020-06-15
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
data protection impact assessment
DPIA
data controller
risk
personal data
Opis:
This article deals with the issue of impact assessment for the protection of personal data. This is a new obligation for the controller. The article presents the essence of impact assessment (DPIA), exclusion from the obligation to carry it out, the prerequisite for mandatory DPIA, the role of the data protection officer and the powers of the supervisory authority. The analysis of legal provisions related to the impact assessment presented here does not refer to specific situations, due to the wide scope for interpreting specific phrases contained in the General Regulation. Nevertheless, the article discusses the issue of conducting data protection impact assessments as one of the most problematic obligations incumbent on the controller, who in practice raises many doubts. The DPIA has been imprecisely regulated by the EU legislator, thus leaving controllers plenty of leeway to interpret the terms used in the General Regulation. In addition, carrying out a DPIA in practice (as a new obligation on entities setting the purposes and means of data processing) can be problematic due to the lack of harmonized methods for conducting a data protection impact assessment. However, controllers cannot assign DPIA implementation to other entities involved in data processing, such as an entity processing personal data on behalf of another. Entities setting the purposes and methods of data processing should not only take into account the provisions of the General Regulation but also a list of data processing operations that are obligatorily subject to DPIA. Controllers fulfilling the obligation to carry out a data protection impact assessment will be obliged by the supervisory authority to demonstrate how to carry out a data protection impact assessment.
Źródło:
Studia Prawa Publicznego; 2020, 2, 30; 161-180
2300-3936
Pojawia się w:
Studia Prawa Publicznego
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
States of emergency – selected problems regarding the personal data protection
Autorzy:
Soczyński, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/1179132.pdf
Data publikacji:
2017
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
data protection
general data protection regulation
information security
Opis:
The following elaboration has been produced following the analysis of the problem regarding the protection of privacy and private life as well as the personal data themselves under the circumstances of life-threatening situations or the state of emergency. The solutions stipulated by the domestic and EU legislation have been analysed with emphasis put over accessing processes to personal data , both indispensible and proportional ones, carried out with an intention to secure public safety, including the protection of human life especially as a reaction to natural disasters or catastrophes caused by humans, protection of other important objectives that lie within general public interest, for instance when data processing remains necessary for humanitarian purposes, including the monitoring of epidemics and their dispersion. Personal data are characterised by various degrees of sensitivity and criticality. Some of them may require an additional level of protection and special treatment. GDPR makes it possible for the Member States to clarify their provisions , including such ones regarding the processing of personal data of special categories ( also referred to as sensitive data), they do not exclude an option to specify in the legislation of a Member State the circumstances of precise situations related to data processing , including the precise clarification of conditions which decide whether data processing remains compliant to the law. Personal data processing under extraordinary circumstances may imply, as an exception, the necessity to transfer the data if such action is required by important public interest set forth by the EU legislation or the relevant provisions of a Member State or if such transferring occurs from the register established by law and intended to provide an insight for the general public or persons maintaining legally valid interest, for instance public health units in order to establish infectious contacts in case of infectious diseases outbreak. A subsequent part of the article focuses on the issues related to the course of actions under state of emergency, i.e. it presents the proceedings to be carried out in emergency state and specifies the concerns on emergency call processing, including the personal data.
Źródło:
World Scientific News; 2017, 85; 29-37
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
INFORMATION SECURITY AND PERSONAL DATA PROTECTION ON INTERNET SOCIAL NETWORKS
Autorzy:
Vladimír, Sedlák,
Eduard, Snižik,
Michal, Krajník,
Powiązania:
https://bibliotekanauki.pl/articles/890913.pdf
Data publikacji:
2018-08-22
Wydawca:
Wyższa Szkoła Bezpieczeństwa Publicznego i Indywidualnego Apeiron w Krakowie
Tematy:
internet
information security
social networks
personal data protection
Opis:
Modern human generation, especially the younger generation, in the digital world spends more and more time. Experts in the area recorded a significant increase of interest of people on social networks. On the present, in a frame of the so-called digital contacting the people themselves is to contact online social networks, perhaps the most popular form. Article mentions the risks of leakage and misuse of personal data on such online social networks.
Źródło:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje; 2014, 15; 258-268
2299-4033
Pojawia się w:
Kultura Bezpieczeństwa. Nauka – Praktyka – Refleksje
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Narzędzia i technologie ochrony danych
Tools and technologies data protection
Autorzy:
Staniewska, E.
Żywiołek, J.
Powiązania:
https://bibliotekanauki.pl/articles/103439.pdf
Data publikacji:
2013
Wydawca:
Uniwersytet Humanistyczno-Przyrodniczy im. Jana Długosza w Częstochowie. Wydawnictwo Uczelniane
Tematy:
bezpieczeństwo danych
narzędzia ochrony danych
data security
information protection tools
Opis:
Informacja jako największe dobro każdej instytucji powinna podlegać ochronie przed niepowołanym dostępem, zniszczeniem lub nieautoryzowaną zmianą. W artykule przedstawiono wybrane aspekty bezpieczeństwa, a w szczególności typy zagrożeń oraz metody ochrony danych.
Information as the greatest good of each institution should be protected from unauthorized access, destruction, or unauthorized modification. The paper presents selected aspects of security, in particular the types of threats and methods of data protection.
Źródło:
Prace Naukowe Akademii im. Jana Długosza w Częstochowie. Technika, Informatyka, Inżynieria Bezpieczeństwa; 2013, T. 1; 307-317
2300-5343
Pojawia się w:
Prace Naukowe Akademii im. Jana Długosza w Częstochowie. Technika, Informatyka, Inżynieria Bezpieczeństwa
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies