Article 4(20). Binding corporate rules

Author(s):  
Luca Tosoni

Article 4(7) (Definition of ‘controller’); Article 4(8) (Definition of ‘processor’); Article 4(18) (Definition of ‘enterprise’); Article 4(19) (Definition of ‘group of undertakings’); Article 46(2)(b) (Transfers subject to appropriate safeguards); Article 47 (Binding corporate rules); Article 49 (Derogations for specific situations concerned with transfer of personal data to third countries and international organisations); Article 57(1)(s) (Supervisory authorities’ tasks); Article 58(3)(j) (Supervisory authorities’ powers); Article 64(1)(f) (Opinion of the Board); Article 70(1)(c) and (i) (Tasks of the Board).

1989 ◽  
Vol 65 (3) ◽  
pp. 220-224
Author(s):  
J. J. E. Dosne

The advantages and disadvantages of working in developing countries are reviewed. The definition of a developing country and the aid it receives from Canada are analysed. Projects in these countries do not harm the Canadian industry. The development of natural resources is a priority of international organisations, after health, sanitation and education. Organisations interested in this development are listed. A few notes of forestry projects in Turkey, Jamaica, Honduras, Burkina Faso, Haiti, Costa Rica are enclosed; as well as an ideal project in New Caledonia where they have assumed their own responsibility. A message: all Canadian faculties of forestry, should give a few courses on tropical forestry because of its need and the increasing demand for Canadian foresters in this field. All who have worked overseas agree that there is a certain satisfaction in having contributed to the advancement of developing countries.


Author(s):  
Ewa Suknarowska-Drzewiecka

The digital revolution, also called the fourth industrial revolution, constitutes another era of change, caused by the development of computerisation and modern technologies. It is characterised by rapid technological progress, widespread digitisation and an impact on all areas of life, including the provision of work. The changes affecting this area are so significant that there are proposals to remodel the definition of the employment relationship in the Labour Code. New forms of employment, which do not fit the conventional definition of an employment relationship, are emerging and gaining importance. An example could be employment via digital platforms. At the same time, there are also employment forms that do fit that definition, but deviate from the conventional understanding of the terms and conditions for performing work, which have undergone modification due to the use of new technologies. Teleworking, or working outside the employer’s premises, are examples of that. Employers get further opportunities to organise and control work, which often raises concerns due to the employee’s right to privacy, the protection of personal rights and personal data.


2021 ◽  
Author(s):  
Maykon Araújo de Souza ◽  
Sandro Ronaldo Bezerra Oliveira

This study presents a mapping of the assets present in the Guiding Model for the Success of Public and Private Companies (MOSE) and the articles included in the General Data Protection Law (LGPD) of the Brazilian Government, with regard to Security and Good Practices in Chapter VII of this law. The theme becomes relevant, as more and more companies from different contexts need to implement the articles contained in this law in order to adhere to the standard of regulation of personal data processing activities defined by the Brazilian Federal Government. However, this law still needs guidelines for its proper implementation based on the adoption of good practices in models, methods and/or techniques available in the specialized literature. One of these instruments refers to the MOSE, which helps public and private companies to achieve levels of excellence in performance, governance and quality, in the production of goods and services, based on the use of practices and indicators specific to the area of knowledge or specialty. Thus, the research question guiding this work is: how to correspond/map the practices included in the MOSE to guide the implementation of the articles of the LGPD law? The methodology adopted was the asset mapping, described in a specific section of the paper, which included the following steps: definition of the LGPD chapter that focuses on data security management; definition of the model and law structures, and their inputs to be analyzed; identification of the description of each asset; analysis of correspondence between assets; evaluation of the mapping using the peer review technique with expert in the two target standards of this research. The result was the perception that 33% of the MOSE’s competences goals, with the appropriate adjustments, have total adherence with 100% of the security and good pratices assets of LGPD. This mapping is intended to provide assistance in defining a roadmap containing activities, work products, tools, indicators and expected results to achieve the goals defined in the LGPD.


Legal Studies ◽  
2014 ◽  
Vol 34 (3) ◽  
pp. 469-496 ◽  
Author(s):  
Aoife O'Donoghue

In the pantheon of approaches open to participants in the pacific settlement of disputes, good offices holds a noteworthy place. The evolution of good offices over the past century is concurrent with a trend of considerable transformation within international law, including – amongst other changes – a move away from a state-led legal order, including in good offices following the emergence of the heads of international organisations as its prime users, and a process of legalisation and specialisation within the subject that has entirely altered its character. These changes have led to a redefinition of good offices that stresses the actor carrying out the role above the form that it takes. To accompany these changes in practice, there is a need for a transformation in the legal analysis and definition of good offices. One potential option in achieving this end is Bell'slex pacificatoria. If good offices is to continue to play a significant role in the settlement of violent conflicts, a fully developed legal analysis is necessary to grasp both its historical development and its potential future role.


Author(s):  
Ludmila Georgieva ◽  
Christopher Kuner

Article 4(1) (Definition of personal data); Article 4(2) (Definition of processing); Article 4(11) (Definition of consent); Article 4(13) (Definition of genetic data, see also recital 34); Article 4(14) (Definition of biometric data); Article 4(15) (Definition of data concerning health, see also recital 35); Article 6(4)(c) (Lawfulness of processing, compatibility test) (see too recital 46 on vital interest); Article 13(2)(c) (Information to be provided where personal data are collected from the data subject); Article 17(1)(b), (3)(c) (Right to erasure (‘right to be forgotten’)); Article 20(1)(a) (Right to data portability); Article 22(4) (Automated individual decision-making, including profiling); Article 27(2)(a) (Representatives of controllers or processors not established in the Union); Article 30(5) (Records of processing activities); Article 35(3)(b) (Data protection impact assessment) (see too recital 91); Article 37(1)(c) (Designation of the data protection officer) (see too recital 97); Article 83(5)(a) (General conditions for imposing administrative fines).


Author(s):  
Luca Tosoni

Article 4(16) (Definition of ‘main establishment’) (see too recital 36); Article 4(22) (Definition of ‘supervisory authority concerned’) (see also recital 36); Article 4(23) (Definition of ‘cross-border processing’); Article 4(24) (Definition of ‘relevant and reasoned objection’) (see too recital 124); Article 50 (International cooperation for the protection of personal data) (see too recitals 102 and 116); Article 55 (Competence of the supervisory authorities) (see too recitals 122 and 128); Article 56 (Competence of the lead supervisory authority) (see also recitals 124–128); Article 57(1)(g) (Supervisory authorities’ task to cooperate with other supervisory authorities) (see too recitals 123 and 133); Article 58 (Powers of supervisory authorities) (see too recitals 122 and 129); Article 61 (Mutual assistance) (see too recitals 123 and 133); Article 62 (Joint operations of supervisory authorities) (see too recital 134); Article 63 (Consistency mechanism) (see too recitals 13, 136 and 138); Article 64 (Opinion of the Board) (see also recitals 135–136); Article 65 (Dispute resolution by the Board) (see too recitals 136 and 143); and Article 66 (Urgency procedure) (see too recitals 137–138).


Author(s):  
Gloria González Fuster

Article 4(9) (Definition of ‘recipient’); Article 12 (Transparent information, communication and modalities for the exercise of the rights of the data subject); Article 16 (Right to rectification), Article 17(1) (Right to erasure (‘right to be forgotten’)); Article 18 (Right to restriction of processing); Article 58(2)(g) (Powers of supervisory authorities); Article 89(3) (Safeguards and derogations relating to processing for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes).


Author(s):  
Marco Vassallo

The objective of this work is to propose a new perspective in understanding the phenomenon of online behaviors, termed the privacy paradox, i.e., worry on preserving personal data and contents, but a little attention to disclose them, and thus introducing the new definition of e-people. The provocative hypothesis of this study regards the internet users who, in the Big Data era, are affected by a common covariation of being e-popular/e-visible, e-narcissist, e-(socially)-accepted, e-remembered. These e-behaviors will be conceptually gathered under the term of Achilles' paradigm. A structured web-questionnaire was submitted to a convenience sample of 198 internet users. First and second-order confirmatory factor analyses together with latent means models concretely supported the existence of the Achilles' paradigm and its impact on the privacy paradox concerns. As a result, the privacy paradox is not an effective paradox anymore: self-disclosing privacy online seems to be a well-accepted behavior.


Author(s):  
Lee A. Bygrave ◽  
Luca Tosoni

Article 4(1) (Definition of ‘personal data’) (see too recital 26); Article 4(15) (Definition of ‘data concerning health’) (see also recital 35); Article 4(16) (Definition of ‘biometric data’) (see too recital 51); Article 9(1) (Processing of special categories of personal data) (see also recital 53); Article 22(4) (Automated individual decision-making, including profiling) (see also recital 71); Article 35(3)(b) (Data protection impact assessment) (see too recital 91).


Author(s):  
Lee A. Bygrave

Article 4(5) (Definition of ‘pseudonymisation’) (see too recital 28); Article 5(2) (Accountability) (see too recital 11); Article 6(4)(e) (Compatibility); Article 22 (Automated individual decision-making, including profiling) (see too recital 71); Article 24 (Responsibility of controllers); Article 28 (Processors) (see too recital 81); Article 32 (Security of processing) (see too recital 83); Article 34(3)(a) (Communication of personal data breach to data subject) (see too recitals 87–88); Article 35 (Data protection impact assessment) (see too recital 84); Article 40 (Codes of conduct); Article 83(2)(d) and 83(4) (Fines); Article 89(1) (Safeguards relating to processing of personal data for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes).


Sign in / Sign up

Export Citation Format

Share Document