Erosion of Confidentiality and Privacy.

1973 ◽  
Vol 28 (10) ◽  
pp. 942-942
Author(s):  
Donald L. Tollefson
2012 ◽  
Vol 71 (2) ◽  
pp. 325-354 ◽  
Author(s):  
Jill Marshall

AbstractAlthough rare, giving birth in secret or in concealed circumstances still happens in the United Kingdom. The new born child's existence is unknown to his or her biological ‘father’ and or to the wider biological family of the birth giver who wishes to place the child for adoption without his or her existence being revealed to them. Legal decisions need to be made judicially when a local authority seeks orders as to whether it is required to make further inquiries to identify and notify the biological father and or wider biological family as to any forthcoming adoption proceedings. Developments in European human rights law's protection of a right to respect one's private life provided by Article 8 of the European Convention on Human Rights (ECHR) towards a right to personal autonomy, identity and integrity can be interpreted in different ways. However, three positions are argued here to guard against an erosion of women's confidentiality and privacy in these circumstances. First, women's choices of concealment should be accepted with respect rather than perceived as inauthentic and therefore impermissible; this is in keeping with Article 2's right to life and Article 8's right to personal autonomy and integrity. Second, the right to family life protected by Article 8 of any wider biological family and father is not contravened by allowing women to give birth discreetly. Third, openness and transparency, when it comes to exact knowledge of one's parents in this context is not necessary for a child's identity rights, which are also protected by Article 8's right to personal identity, to be legally protected.


2016 ◽  
Vol 13 (3) ◽  
pp. 89
Author(s):  
Beata Gessel-Kalinowska vel Kalisz

THE PERCEPTION OF THE PRACTICE OF CONFIDENTIALITY IN ARBITRATION. AN ANALYSIS OF THE RESULTS OF A SURVEY CARRIED OUT BY THE LEWIATAN COURT OF ARBITRATION AMONG POLISH ARBITRATION PRACTITIONERS Summary As with numerous other systems of law, such as Norwegian, Swedish or Australian law, the Polish legal system does not have a clear and uniform norm of law governing confidentiality and privacy in arbitration. Public opinion frequently refers to the role of custom as the source of the obligation to preserve confidentiality, although usually it does so without a detailed analysis of the subject and object of this obligation. This fact provided the inspiration for a survey carried out among Polish arbitration practitioners. The results of the survey present an interesting picture of what is subjectively perceived by arbitration practitioners as forming part of the confidentiality canons in arbitration proceedings. In principle, they reflect the worldwide trends, i.e. as far as the object of the confidentiality obligation is concerned – in camera sessions and the confidentiality of awards, and as regards its subject – the confidentiality obligation imposed on arbitrators and arbitration institutions. In addition, the customary practice of keeping confidential any information obtained in the course of proceedings is perceived as the right conduct as far as the object of the obligation is concerned. One of the very controversial issues is the matter of parties’ responsibilities, which leads to further questions as to individual arbitrators’ membership of the social (professional) group known as “arbitration practitioners”.


2019 ◽  
Vol 34 (2) ◽  
pp. 65-85
Author(s):  
Lorraine S. Lee ◽  
William D Brink

ABSTRACT Guidelines originating from practice suggest the Trust Services Criteria of security, availability, processing integrity, confidentiality, and privacy should be key factors affecting the trust of cloud-based systems. In our study, we test a model of end-user adoption of cloud-based software as a service (SaaS) by integrating the five principles from the Trust Services Criteria with systems risk. Using a survey methodology to collect data and analyzing it with structural equation modeling, we test hypotheses associated with the model. Our results show statistical support for the factors of security, confidentiality, and privacy as influencing consumers' trust in cloud-based services. Additionally, our results demonstrate trust in cloud-based services negatively influences the perceived systems risk, and these two items (trust and systems risk) significantly influence the decision by end-users to adopt a cloud-based system. Overall, our findings support the use of the Trust Services Criteria for assessing consumers' trust in cloud-based services.


2013 ◽  
pp. 60-80 ◽  
Author(s):  
Claudia Canongia ◽  
Raphael Mandarino

This chapter introduces the theme of cybersecurity, its importance in the actual scenario, and the challenges of the new Information Society, whose critical development factors are the technological revolution and innovation. The revolution that the information and communications technologies (ICTs) has already brought to modern society is, without doubt, more than visible and concrete, but the great challenge facing us is to harmonize two dimensions, the first relating to the culture of sharing, socialization, and transparency, and the second relating to the issues of security, confidentiality, and privacy. It gives a broad overview in tabular form of the national cybersecurity strategies of the developed countries, United States and United Kingdom, as well as describing a study case, Brazil, is taking its first steps on the path towards cybersecurity. The chapter ends by proposing a model, the key elements for formulating a Brazilian cybersecurity strategy.


Author(s):  
Claudia Canongia ◽  
Raphael Mandarino

This chapter introduces the theme of cybersecurity, its importance in the actual scenario, and the challenges of the new Information Society, whose critical development factors are the technological revolution and innovation. The revolution that the information and communications technologies (ICTs) has already brought to modern society is, without doubt, more than visible and concrete, but the great challenge facing us is to harmonize two dimensions, the first relating to the culture of sharing, socialization, and transparency, and the second relating to the issues of security, confidentiality, and privacy. It gives a broad overview in tabular form of the national cybersecurity strategies of the developed countries, United States and United Kingdom, as well as describing a study case, Brazil, is taking its first steps on the path towards cybersecurity. The chapter ends by proposing a model, the key elements for formulating a Brazilian cybersecurity strategy.


2020 ◽  
pp. 1575-1586
Author(s):  
Somasundaram R ◽  
Mythili Thirugnanam

The fields of computer science and electronics have merged to result into one of the most notable technological advances in the form of realization of the Internet of Things. The market for healthcare services has increased exponentially at the same time security flaws could pose serious threats to the health and safety of patients using wearable technologies and RFID. The volume and sensitivity of data traversing the IoT environment makes dangerous to messages and data could be intercepted and manipulated while in transit. This scenario must absolutely respect the confidentiality and privacy of patient's medical information. Therefore, this chapter presents various security issues or vulnerabilities with respect to attacks and various situations how information will be attacked by the attacker in healthcare IoT. The working principle of healthcare IoT also discussed. The chapter concludes the performance of various attacks based on the past work. In the future this work can be extended to introduce a novel mechanism to resolve various security issues in healthcare IoT.


2013 ◽  
Vol 77 (3) ◽  
pp. 370-376 ◽  
Author(s):  
Vice Budimir ◽  
Gordana Cerjan-Letica ◽  
Jozo Budimir ◽  
Darko Macan

2019 ◽  
Vol 3 (3) ◽  
Author(s):  
Pamela Wible ◽  
Arianna Palermini

Do medical boards undermine physician mental health by breaching physician confidentiality and privacy? We analyze the initial medical licensing process in each state to determine if qualified applicants who report mental illness experience discrimination. We then identify the most favorable states for physician mental health.  


Sign in / Sign up

Export Citation Format

Share Document