scholarly journals The Use of Data Protection Regulatory Actions as a Data Source for Privacy Economics

Author(s):  
Aaron Ceross ◽  
Andrew Simpson
2011 ◽  
Vol 11 ◽  
pp. 490-502
Author(s):  
Paul De Hert ◽  
Rocco Bellanova

After 9/11, states looked at transportation as if it was a matter of paying taxes: “We cannot make it fun, but we can make it efficient.” When traveling, we are asked to pass on data, give body samples, and pass through body scanners in the name of the general interest and in the name of our safety. Technology complements existing human checks and controls. Here we take a fresh look at the new security apparatuses and make transportation of humans more passenger-centered. Consumer protection law might help to complement the existing use of data protection law principles by citizen organizations. It should be possible to satisfy consumer needs, without forgetting the perspective of the citizen.


2013 ◽  
Vol 12 (1) ◽  
pp. 55-72 ◽  
Author(s):  
Dara Hallinan ◽  
Philip Schütz ◽  
Michael Friedewald ◽  
Paul De Hert

There are a number of novel technologies and a broad range of research aimed at the collection and use of data drawn directly from the human brain. Given that this data – neurodata – is data collected from individuals, one area of law which will be of relevance is data protection. The thesis of this paper is that neurodata is a unique form of data and that this will raise questions for the application of data protection law. Issues may arise on two levels. On a legal technical level, it is uncertain whether the definitions and mechanisms used in the data protection framework can be easily applied to neurodata. On a more fundamental level, there may be interests in neurodata, particularly those related to the protection of the mind, the framework was not designed to represent and may be insufficiently equipped, or constructed, to deal with.


2018 ◽  
Vol 2 (02) ◽  
Author(s):  
Ave Ceriti Sinjal ◽  
Syermi S. E Mintalangi

Account Representatives in KPP Pratama Manado have task to construct and update data profile of taxpayers. Valid source of data is a must for Account Representatives to do their task. By using internal datas from DJP such as SIDJP, MPN, Master File, Portal Intranet DJP or datas in Tax Amnesty are choices for Account Representatives in KPP Pratama Manado to run it, besides there are some way that can be used like digital technologies or do visit directly to taxpayers. The purpose of this study is to know the way Account Representative in KPP Pratama Manado using data sources given by DJP or KPP Pratama itself, digital technologies or visiting taxpayers in order to construct or update data profile of taxpayers. Suggestion for KPP Pratama Manado is to updates the use of data sources owned by DJP’s internal system and to maximizing digital technologies, such as telephone and electronic chatting application directly to taxpayers to help AR do their tasks effectively and efficiently.Keywords : taxpayer, profile, account representative, data source


2014 ◽  
Vol 1 (2) ◽  
pp. 120-129
Author(s):  
Jeanne Pia Mifsud Bonnici

This paper provides a brief comparative comment on the three contributions of van der Hart-Zwart, Boddez & Nys, and Choong & Mifsud Bonnici included in the present volume. The three contributions reflect on the use of medical information and/or human bodily material obtained before or after death and used for medical research purposes after the death. The present reflective note first looks at the legal shortcomings pointed out in the three contributions, primarily the lack of clarity on whether medical confidentiality survives after death, the non-applicability of the right to private life and data protection after death and the incomplete rules on the use of bodily material of deceased persons for medical purposes. The paper then gradually reflects on the way the three jurisdictions combine attempts at legal certainty and pragmatism to deal with these shortcomings.


2021 ◽  
Vol 19 (1) ◽  
Author(s):  
Hannele Orjala

This paper is a review of National Intellectual Capital (NIC) literature that focuses on the documented use of data and the data sources used in the NIC literature. The topic is important as the NIC research is largely based on data analysis and thus the use of data and the data sources used ultimately shape the reality around what is the big picture of national intellectual capital, as it is understood today. While this is the case, questions about use of data and the data sources used have not been in the core of the research tradition. The review focuses on 57 systematically collected NIC articles with a documented data source, published between the years 1991 and 2018. The results show that the majority of data-based NIC research is concentrated around a set of often-used data sources, while the rest of the data-based NIC literature uses a fragmented set of data sources. New data sources are rarely utilized. The documentation of data and data source use in the literature leaves room for criticism. Researchers and the users of NIC analyses benefit, if they are able to evaluate the quality, the coverage, and the relevance of the data sources used as a basis of NIC analyses. To the best of our knowledge, this is the first time that data sources used in the NIC literature are the main focus of a literature review. 


2020 ◽  
Author(s):  
Kyle Lam ◽  
Sanjay Purkayastha ◽  
James M Kinross

UNSTRUCTURED This viewpoint explores the ethical and regulatory consequences of the digital transformation of the operating room. Surgical robotics is undergoing significant change and future advances will center around the capture and use of data. The consequences of creating this surgical data pipeline must be understood and digital surgical systems must prioritize the safeguarding of patient data. Moreover, data protection laws and frameworks must adapt to the changing nature of surgical data. Finally, digital surgeons must understand changing data legislation and best practice on data governance to act as guardians not only for their own but also for their patients’ data.


The paper proposes an algorithm for generating random numbers based on sensors of a gyroscope, magnetometer, accelerometer on mobile devices, and discusses the sensors of a gyroscope, magnetometer and accelerometer. The random bit generator uses smartphone sensors as entropy source. It collects raw data from smartphone sensors and processes they by given algorithm. The degree of randomness of random bits generated using the proposed algorithm was tested using statistical tests NIST SP 800-22, and a test result was given. It is important to ensure the safe storage, transmission and use of data in these information systems. To solve these problems, cryptographic methods are used more often than other methods of data protection. Cryptographic algorithms are the basis of cryptographic data protection methods. Most cryptographic algorithms are publicly available and the key plays the role of a secret value when applied. The generations of these secret keys and sometime private keys are based on random number generations.


2021 ◽  
Vol 37 (3-4) ◽  
pp. 149-170
Author(s):  
Maja Bukovac Puvača ◽  
Loris Bealnić

The paper deals with the issue of using genetic tests for insurance purposes. After introductory remarks, the paper provides an overview of various international and European legal sources both on data protection in general, and on the protection of data from genetic tests. The paper then researches into different solutions proposed by comparative law concerning the use of data from genetic tests for insurance purposes. Some solutions explicitly ban the use of genetic tests for insurance purposes (France, Austria, Portugal, Croatia), while others adopt a more liberal approach, allowing for its use (the USA, the UK, Germany). It is concluded that personal data protection does not exclude the possibility using data from genetic tests for insurance purposes, which proves the need for a common EU approach to the issue.


2011 ◽  
Vol 27 (6) ◽  
pp. 630-636 ◽  
Author(s):  
Richard Jones ◽  
Dalal Tahri
Keyword(s):  

2020 ◽  
Author(s):  
Daniel Prett Campagna ◽  
Altigran Soares Da Silva ◽  
Vanessa Braganholo

The approval of the General Data Protection Regulation (GDPR) brought a revolution in the way we treat data produced in digital media. The GDPR increases individuals’ participation in the treatment of their data, and it also introduces technical challenges, whose failure can lead to a fine of 4% of the organization’s annual revenue. Among many approaches that aim to contribute to the solutions of challenges introduced by GDPR, there is a research branch promoting the use of data provenance as a means to make transparent the increasingly complex workflows of systems. However, existing provenance models are not fully compliant with the GDPR. In this paper, we aim to contribute to the evolution of the GDPR data provenance model proposed by Ujcich et al.. We suggest eleven new changes that make the model more apparent and more compatible with the GDPR text. We also present two design patterns that should guide us in using these changes in real contexts.


Sign in / Sign up

Export Citation Format

Share Document