Collection and Storage of Personal Data: A Critical View on Current Practices in the Transportation Sector

Author(s):  
Eleni Kosta ◽  
Hans Graux ◽  
Jos Dumortier
2019 ◽  
Vol 28 (1) ◽  
pp. 12-18 ◽  
Author(s):  
Danielle O. Dumestre ◽  
Frankie Fraulin

Background: To evaluate a smartphone application for clinical photography that prioritizes and facilitates patient security. Methods: Ethics was obtained to trial the application Sharesmart. Calgary plastic surgeons/residents used the application for clinical photography and communication. Surveys gauging the application usability, incorporated consent process, and photograph storage/sharing were then sent to surgeons and patients. Results: Over a 1-year trial period, 16 Calgary plastic surgeons and 24 residents used the application to photograph 84 patients. Half (56%) of the patients completed the survey. The majority of patients found the applications consent process acceptable (89%) and felt their photograph was secure (89%). Half (51%) of the surgeons/residents completed the survey and would use the application as is (67%) or with modifications (33%). The consent process was felt to be superior (73%) or equivalent (23%) to participant’s prior methods and was felt to resolve issues present with current photography practices of secure transmission and storage of photographs by 100% and 95% of respondents, respectively. Perceived limitations of the application included difficulties in use with poor cellphone service or Internet, decreased speed compared to current practices, the lack of a desktop platform, video capability, and ability to transmit the photograph directly to the patient’s medical record. Conclusions: A smartphone clinical photography application addresses the risks of patient confidentiality breach present with current photography methods; broad implementation should be considered.


2021 ◽  
Vol 10 (2) ◽  
pp. 89-95
Author(s):  
Sorina Ana Manea

The European system ensuring the protection of human rights is nowadays one of the most advanced in the world. However, there are also areas of activity where clarification and improvement are constant demands. Counter-terrorism measures considered or adopted in Europe, in particular those that increase mass surveillance, the collection and storage of electronic information or the protection of personal data are such areas. Some of these measures give more intrusive powers to the intelligence services to channel decisions in the direction of the executive branch, without the necessary judicial guarantees being established in a state governed by the rule of law.   Keywords: community law; ECHR; CJUE; national security.


Author(s):  
Ihssan Alkadi

There are many steps involved with securing a cloud system and its applications (SaaS) and developed ones in (PaaS). Security and privacy issues represent the biggest concerns to moving services to external clouds (Public). With cloud computing, data are stored and delivered across the Internet. The owner of the data does not have control or even know where their data are being stored. Additionally, in a multi-tenant environment, it may be very difficult for a cloud service provider to provide the level of isolation and associated guarantees that are possible with an environment dedicated to a single customer. Unfortunately, to develop a security algorithm that outlines and maps out the enforcement of a security policy and procedure can be a daunting task. A good security algorithm presents a strategy to counter the vulnerabilities in a cloud system. This chapter covers the complete overview, comparative analysis of security methods in Cloud Applications in STEM Education and the introduction of a new methodology that will enforce cloud computing security against breaches and intrusions. Much light will be shed on existing methodologies of security on servers used for cloud applications in STEM education and storage of data, and several methods will be presented in addition to the newly developed method of security in cloud-based servers, such as the MIST (Alkadi). Not only can cloud networks be used to gather sensitive information on multiple platforms, also there are needs to prevent common attacks through weak password recovery, retrieval, authentication, and hardening systems; otherwise hackers will spread cyber mayhem. Discussion of current security issues and algorithms in a real world will be presented. Different technologies are being created and in constant competition to meet the demands of users who are generally “busy”. The selling point of these technologies is the ability to address these demands without adding more to any workloads. One of the demands often discussed is that users want to have their digital information accessible from anywhere at any time. This information includes documents, audio libraries, and more. Users also demand the ability to manage, edit and update this information regardless of physical location. Somewhat recently, mobile devices such as laptops, tablets, and smartphones have provided these abilities. This is no small feat as vendors and providers have reduced the size of these devices to increase mobility. However, as the amount of personal information that users are wanting to access has grown exponentially, manipulation and storage of it require more capable devices. To meet increased demands, increasing the capabilities of mobile devices may be impractical. Making mobile devices more powerful without technological advancement would require that the device be larger and use more resources such as battery life and processing power to function properly. Storing all of a user's information on a mobile device that travels everywhere also adds vulnerability risks. The best technical solution to having a user's information accessible is some sort of online storage where there is the convenience to store, manipulate and retrieve data. This is one of the most practical applications for the concept of cloud computing in STEM education. As storage capabilities and Internet bandwidth has increased, so has the amount of personal data that users store online. And today, the average user has billions of bytes of data online. Access is everywhere and whenever is needed. As everyone started doing so, people want their data safe and secure to maintain their privacy. As the user base grew in size, the number of security issues of the personal data started to become increasingly important. As soon as someone's data are in the remote server, unwanted users or “hackers” can have many opportunities to compromise the data. As the online server needs to be up and running all the time, the only way to secure the cloud server is by using better passwords by every user. By the same token, the flaws in the password authentication and protection system can also help unwanted users to get their way to other people's personal data. Thus, the password authentication system should also be free from any loopholes and vulnerabilities.


2016 ◽  
Vol 6 (2) ◽  
pp. 137
Author(s):  
Sitti Aisa

<pre><em><span>The continued development and widespread use of current technology</span></em></pre><pre><em><span> so that accessing and managing data from a personal computer to </span></em></pre><pre><em><span>make private users become inflexible due to the personal computer</span></em></pre><pre><em><span> requires a power source directly and storage areas are static, </span></em></pre><pre><em><span>therefore, the author plans to implement a service private </span></em></pre><pre><em><span>cloud that uses raspberry pi as a server and will be tested by the test</span></em></pre><pre><em><span> Blackbox. Our research by collecting data that we did put a literature</span></em></pre><pre><em><span> study, experiments, and observations. The design method using UML</span></em></pre><pre><em><span> use case diagrams, class diagrams, activity diagrams and sequence </span></em></pre><pre><em><span>diagrams. This application is built using Django, Python, Raspberry Pi, MySQL. Hopefully the benefit of this implementation can help a person in terms of managing data from a wide variety of resources (resource) quickly and anywhere.</span></em></pre>


Bioethica ◽  
2020 ◽  
Vol 6 (1) ◽  
pp. 12
Author(s):  
Vasilios Fanaras (Βασίλειος Φανάρας) ◽  
Vasiliki Mollaki (Βασιλική Μολλάκη)

Funding of research proposals by the European Commission (EC) requires not only scientificex cellence and innovation, but also ethical conduct of research. For this reason, the EC performs ethicsreview for all the research proposals that are going to be funded, in order to check compliance with theethics principles of research, as well as the Eu ropean and National laws, in the countries where research isconducted. The aim of the present manuscript is to raise awareness and familiarize researchers with theethics review of research proposals, as conducted in the EC, through the eyes of two ethics experts.Firstly, the stages of the ethics review process are described, which is performed with the assistanceof independent ethics experts. The criteria which are provided and monitored by the Ethics and ResearchIntegrity Sector in the EC are then pr esented in detail. Based on these criteria, the possible outcomes of anethics review are analyzed, which may include the formation of specific requirements that need to befulfilled by the researchers. Specific reference is made to the requirements that m ay result when aresearch proposal involves collection, processing and storage of personal data according to the GeneralData Protection Regulation 2016/679, because this Regulation entered into force recently in the ethicsreview.Finally, reference is m ade to the importance of ensuring integrity in research thought the ethicsreview process, and the necessary compliance with the ethics standards of EC funded research.


2019 ◽  
pp. 714-732
Author(s):  
Stojan Slaveski ◽  
Biljana Popovska

Certain information and personal data, held by the government, needs to be kept secret because its disclosure to the general public could jeopardize the operation of the state. On the other hand, the state should allow the public to have free access to all other state-held information. To ensure a balance between these two claims of modern democratic societies, there is a need to legally regulate this matter. The state should have a law on access to public information and a law that will regulate the classification, access to and storage of information which should be kept secret. This chapter analyzes the global experiences in regulating this matter, with a particular emphasis on the practice in the Republic of Macedonia.


Author(s):  
Stojan Slaveski ◽  
Biljana Popovska

Certain information and personal data, held by the government, needs to be kept secret because its disclosure to the general public could jeopardize the operation of the state. On the other hand, the state should allow the public to have free access to all other state-held information. To ensure a balance between these two claims of modern democratic societies, there is a need to legally regulate this matter. The state should have a law on access to public information and a law that will regulate the classification, access to and storage of information which should be kept secret. This chapter analyzes the global experiences in regulating this matter, with a particular emphasis on the practice in the Republic of Macedonia.


2012 ◽  
Vol 67 (3) ◽  
pp. 373-378 ◽  
Author(s):  
Austin Liu ◽  
Alastair Carruthers ◽  
Joel L. Cohen ◽  
William P. Coleman ◽  
Jeffrey S. Dover ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document