scholarly journals Constitutional equality in the information society: the problem of private discrimination

2021 ◽  
Vol 7 (1) ◽  
pp. 46-50
Author(s):  
V. E. Volkov

The article deals with the implementation of constitutional norms on equality in the information society, which stimulates the manifestation of private and economic discrimination. Threats arising from the existence of natural inequalities have been investigated. On the basis of the conclusion about the legal admissibility of private discrimination, social and legal grounds for the implementation of the constitutional principle of equality have been revealed. The differentiation of private and economic discrimination is proposed, factors are identified that must be considered when determining the admissibility of discriminatory behavior in the information society: the level of market monopolization, the negotiating capabilities of the parties, the amount of costs required to restore the violated right. Considering the insufficiency of the actual capabilities of consumers of information benefits, it is concluded that it is necessary to protect the weak side of information relations. Movement to the minimum possible level of discretion on the side of provider of informational goods and creation of additional legal guarantees for constitutional and other rights of the citizen is provided.

2005 ◽  
Vol 6 (1) ◽  
Author(s):  
Christophe Geiger

AbstractThe emergence of the information society and the digital age have radically disturbed the balance contained in copyright law. Aware of the dangers for the exploitation of their rights created by new technical opportunities, right holders have constantly challenged the free zones within copyright. Especially the private copy exception seems to be particularlymenaced by the implementation of anti-copying measures (which are themselves protected by law) as well as by the three-step test, which seems to become a real judicial filter for the application of any exception in the digital environment. In reaction to this evolution, a real mobilization of the consumers wanting to enforce their “right of private copying” can be observed. This article analyzes whether there is such a right of the user and - if it is so - on which legal grounds. In a more general sense, it proposes a reflection on the future of the private copy exception in the digital world.


Author(s):  
Lee A. Bygrave

Article 3(2)(b) (Monitoring of data subjects’ behaviour); Article 5 (Principles relating to processing of personal data); Article 6 (Legal grounds for processing of personal data); Article 8 (Conditions applicable to children’s consent in relation to information society services) (see also recital 38); Article 13(2)(f) (Information on the existence of automated decision-making, including profiling) (see also recital 60); Article 14(2)(g) (Information on the existence of automated decision-making, including profiling) (see also recital 60); Article 15(1)(h) (Right of access regarding automated decision-making, including profiling) (see also recital 63); Article 21 (Right to object) (see also recital 70); Article 22 (Automated decision-making, including profiling) (see also recital 71); Article 23 (Restrictions) (see also recital 73); Article 35(3)(a) (Data protection impact assessment) (see also recital 91); Article 47(2)(e) (Binding corporate rules); Article 70(1)(f) (EDPB guidelines on automated decisions based on profiling)/


Author(s):  
I. D. Rudinskiy ◽  
D. Ya. Okolot

The article discusses aspects of the formation of information security culture of college students. The relevance of the work is due to the increasing threats to the information security of the individual and society due to the rapid increase in the number of information services used. Based on this, one of the important problems of the development of the information society is the formation of a culture of information security of the individual as part of the general culture in its socio-technical aspect and as part of the professional culture of the individual. The study revealed the structural components of the phenomenon of information security culture, identified the reasons for the interest in the target group of students. It justifies the need for future mid-level specialists to form an additional universal competency that ensures the individual’s ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources. As a result of the study, recommendations were formulated on the basis of which a culture of information security for college students can be formed and developed and a decomposition of this process into enlarged stages is proposed. The proposals on the list of disciplines are formulated, within the framework of the study of which a culture of information security can develop. The authors believe that the recommendations developed will help future mid-level specialists to master the universal competency, consisting in the ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources, as well as to correctly access the necessary information and its further legitimate use, which ultimately forms a culture of information security.


2015 ◽  
Vol 71 (3) ◽  
pp. 31-43
Author(s):  
Natalija Vasileva ◽  
◽  
Viktor Kavura ◽  

Sign in / Sign up

Export Citation Format

Share Document