Personal Data and Privacy Issues and Postal Operators Stand

Author(s):  
Claire Borsenberger ◽  
Denis Joram ◽  
Olaf Klargaard ◽  
Philippe Regnard
Keyword(s):  
Author(s):  
Eleutherios A. Papathanassiou ◽  
Xenia J. Mamakou

The advent of the Internet has altered the way that individuals find information and has changed how they engage with many organizations, like government, health care, and commercial enterprises. The emergence of the World Wide Web has also resulted in a significant increase in the collection and process of individuals’ information electronically, which has lead to consumers concerns about privacy issues. Many researches have reported the customers’ worries for the possible misuse of their personal data during their transactions on the Internet (Earp & Baumer, 2003; Furnell & Karweni, 1999), while investigation has been made in measuring individuals’ concerns about organizational information privacy practices (Smith, Milberg & Burke, 1996). Information privacy, which “concerns an individual’s control over the processing, that is the acquisition, disclosure, and use, of personal information” (Kang, 1998) has been reported as one of the most important “ethical issues of the information age” (Mason, 1986).


2020 ◽  
Author(s):  
Bright Kwaku Avuglah ◽  
Christopher M. Owusu-Ansah ◽  
Gloria Tachie-Donkor ◽  
Eugene Baah Yeboah

The study surveyed librarians’ and students’ attitudes, perceptions and concerns on privacy in Ghanaian universities with the aim of seeking a better alignment of their perspectives in the online library context. This study adapted and applied the instrument developed by Zimmer which assessed attitudes and practices of librarians in the USA on privacy rights and protecting patron’s privacy in the library. The study found that between librarians and students in Ghanaian universities, there was a need for greater control over their personal data; and a need for ethical responsibility on the part of data collecting online library agents; both groups expressed dislike for state censorship and corporate monopoly over their personal data. However, despite their positive attitude about the strong role of librarians in guaranteeing their personal data, a significant number of them demonstrate little faith in librarians to actualize the protection of their personal data. Lastly, privacy attitudes and concerns of academic librarians were noted to align with that of university students in Ghana. Among others, it was recommended that Ghanaian academic librarians integrate privacy education and awareness creation in their universities, emphasizing the need to make informed online decisions and exposing potential repercussions of their decisions while using online library and digital resources.


Author(s):  
José Moura ◽  
Carlos Serrão

This chapter revises the most important aspects in how computing infrastructures should be configured and intelligently managed to fulfill the most notably security aspects required by Big Data applications. One of them is privacy. It is a pertinent aspect to be addressed because users share more and more personal data and content through their devices and computers to social networks and public clouds. So, a secure framework to social networks is a very hot topic research. This last topic is addressed in one of the two sections of the current chapter with case studies. In addition, the traditional mechanisms to support security such as firewalls and demilitarized zones are not suitable to be applied in computing systems to support Big Data. SDN is an emergent management solution that could become a convenient mechanism to implement security in Big Data systems, as we show through a second case study at the end of the chapter. This also discusses current relevant work and identifies open issues.


Author(s):  
Majeed Mohamed Fareed Majeed

The right to privacy is one of the most problematic rights. In the absence of any consensus on a clear theoretical basis for the concept of privacy; there is hardly a link, reliable, between the various issues and topics, which are included under this right. Privacy claims are used to defend rights that seem quite divergent, such as the right not to be monitored by phone calls, and the right to know what a telecom company keeps of personal data for its customers. The absence of a clear theoretical basis for the right to privacy is exacerbated by the fact that it is exposed to multiple dangers in the era of the massive expansion of the use of the Internet and the development of its applications. The actuality of material, described in the article, conditioned the urgent necessities of society simply to settle a question about privacy types and their appliance in the society. Theoretical and legal conversations about the relationship between taws and privacy were investigated in the article. This paper makes a contribution to a forward-looking privacy framework by examining the privacy impacts of six new and emerging technologies. It examines the privacy issues that each of these technologies present and contends that there are seven distinct sorts of privacy. This contextual investigation data propose that a loose conceptualization of privacy might be important to keep up a smoothness that empowers new measurements of privacy to be identified, that will be understood and addressed so as to adequately react to quick technological evolution.


Author(s):  
Lilian Mitrou ◽  
Maria Karyda

This chapter addresses the issue of electronic workplace monitoring and its implications for employees’ privacy. Organizations increasingly use a variety of electronic surveillance methods to mitigate threats to their information systems. Monitoring technology spans different aspects of organizational life, including communications, desktop and physical monitoring, collecting employees’ personal data, and locating employees through active badges. The application of these technologies raises privacy protection concerns. Throughout this chapter, we describe different approaches to privacy protection followed by different jurisdictions. We also highlight privacy issues with regard to new trends and practices, such as teleworking and use of RFID technology for identifying the location of employees. Emphasis is also placed on the reorganization of work facilitated by information technology, since frontiers between the private and the public sphere are becoming blurred. The aim of this chapter is twofold: we discuss privacy concerns and the implications of implementing employee surveillance technologies and we suggest a framework of fair practices which can be used for bridging the gap between the need to provide adequate protection for information systems, while preserving employees’ rights to privacy.


2010 ◽  
Vol 4 (3) ◽  
pp. 1-21
Author(s):  
Munir Majdalawieh

This paper discusses the challenges that faced in the “DigNet” age in terms of privacy and proposes a framework for privacy protection. This framework is integral in ensuring that personal data protection is impeded part of business processes of any systems that are involved in collecting, disseminating, and accessing an individual’s data. The cooperation and partnership between nations in passing privacy laws is essential and requires some building blocks. In this paper, the author argues that the building blocks should be integrated into the business processes and take into consideration three main domains: governments’ legislation, entity’s policies and procedures, and data protection controls. The proposed conceptual framework helps organizations develop data protection in their business processes, assess the privacy issues in their organization, protect the interests of their customers, increase their value proposition to customers, and make it easier to identify the impact of privacy on their business.


Author(s):  
Ioannis Iglezakis

In this chapter, a specific issue is addressed that concerns the protection of privacy vis-à-vis the efforts to combat identity theft and protect personal identifying information. There are, in particular, measures undertaken by legislators that involve penal sanctions and the introduction of new technological means for identity verification. Also, identity management schemes are introduced, which are utilized by service providers, mainly in the e-business sector, in order to support controlled access to resources. The solutions undertaken to protect identity are seen as measures enhancing privacy, which is endangered by identity theft. Personal information is largely available in the information society and its collection by identity fraudsters is also possible. Therefore, an effective protection of information protection should also include the protection of identity. The downside of the identity protection approach is that identity management actually presents risks to privacy, since the processing of personal data takes place in this context and it is argued that there are certain implications concerning the lawfulness of the processing. The use of electronic authentication through electronic cards or biometrics on passports and identity cards pose privacy issues, too. Subsequently, the legislation concerning identity theft and identity related crime is outlined. This is followed by specific analysis of privacy issues concerning identity management and identity verification methods, with particular reference to biometrics.


Bioethica ◽  
2017 ◽  
Vol 3 (2) ◽  
pp. 74
Author(s):  
Χαρίκλεια Λάτσιου (Charikleia Latsiou)

The presentation focuses on the complex issue of data protection concerning privacy issues that arise especially when health data are processed. In order for the audience to better understand the legal issues of these processing, definitional issues are examined mainly in the light of the new European legal framework on the protection of personal data (General Regulation 2016/679). Subsequently, the presentation examines key issues of certain types of processing mainly referring to: a) lawfulness, concerning the specified, explicit and legitimate purposes of processing, b) access to files of personal data, c) confidentiality and security of the processing and d) the meaning of the data subject’s consent for the legitimate processing of personal data. The main purpose of the presentation is to illuminate definitional issues that are deemed to be of high importance for the effective protection of personal data.


Sign in / Sign up

Export Citation Format

Share Document