Redressing Violations of Privacy

Author(s):  
Irene Maria Portela

The chapter discusses the role of CNPD (Comissão Nacional de Proteção de Dados) in case of violation of privacy, like dissemination or revelation of personal data by a public/private organization or entity. About this subject, the CNPD can issue a recommendation to the Portuguese Treasury to take some measures to strictly protect the security of the personal information using the Portuguese “E-Invoice.” Portuguese people must be protected against the misuse of personal data by the use of the “E-Invoice.” A Security System Administrator continuously monitors the network and all data traffic to prevent any misuse or abuse of the system. A prerequisite for trust and acceptance of these information systems is that appropriate data protection measures are implemented against possible misuse of personal data decreasing the risks in its utilization. Protective measures should be taken by the Treasury referring additional procedures against the misuse of data because the administrative control system is inefficient regarding unauthorized access, disclosure, misuse of localization data or loss, modification, and appropriation of information linked with the use of the Portuguese “E-Invoice.”

PLoS ONE ◽  
2021 ◽  
Vol 16 (7) ◽  
pp. e0253568
Author(s):  
Piers Fleming ◽  
Andrew P. Bayliss ◽  
S. Gareth Edwards ◽  
Charles R. Seger

Personal data is ubiquitous in the digital world, can be highly valuable in aggregate, and can lead to unintended intrusions for the data creator. However, individuals’ expressions of concern about exposure of their personal information are generally not matched by their behavioural caution. One reason for this mismatch could be the varied and intangible value of personal data. We present three studies investigating the potential association between personal data value and privacy behaviour, assessing both individual and cross-cultural differences in personal data valuation, comparing collectivist and individualistic cultures. Study 1a, using a representative UK sample, found no relationship between personal data value and privacy behaviour. However, Study 1b found Indian (collectivist) participants’ privacy behaviour was sensitive to personal data value, unlike US (individualist) participants. Study 2 showed that in a UK sample, privacy behaviour was sensitive to personal data value but only for individuals who think of themselves as more similar to others (i.e., self-construe as similar, rather than different). We suggest those who prioritise group memberships are more sensitive to unintentional disclosure harm and therefore behave in accordance with personal data valuations—which informs the privacy concern-behaviour relationship. Our findings can suggest approaches to encourage privacy behaviours.


Author(s):  
Devjani Sen ◽  
Rukhsana Ahmed

Personal applications (apps) collect all sorts of personal information like name, email address, age, height, weight, and in some cases, detailed health information. When using such apps, many users trustfully log everything from diet to sleep patterns. Studies suggest that many applications do not have a privacy policy, or users do not have access to an app's permissions before s/he downloads it to the mobile device. This raises questions regarding the ethics around sharing personal data gathered from health and fitness apps to third parties. Despite the important role of informed consent in the creation of health and fitness mobile applications, the intersection of ethics and sharing of personal information is understudied and is an often-ignored topic during the creation of mobile applications. After reviewing the online privacy policies of four mobile health and fitness apps, this chapter concludes with a set of recommendations when designing privacy policies to share personal information collected from health and fitness apps.


Author(s):  
Devjani Sen ◽  
Rukhsana Ahmed

Personal Applications (apps) collect all sorts of personal information like name, email address, age, height, weight and in some cases detailed health information. When using such apps, many users trustfully log everything from diet to sleep patterns. Studies suggest that many applications do not have a privacy policy, or users do not have access to an app's permissions before s/he downloads it to the mobile device. This raises questions regarding the ethics around sharing personal data gathered from health and fitness apps to third parties. Despite the important role of informed consent in the creation of health and fitness mobile applications, the intersection of ethics and sharing of personal information is understudied and is an often-ignored topic during the creation of mobile applications. After reviewing the online privacy policies of four mobile health and fitness apps, this chapter concludes with a set of recommendations when designing privacy policies to share personal information collected from health and fitness apps.


2020 ◽  
Vol 8 (4) ◽  
pp. 158-162
Author(s):  
Ralf De Wolf ◽  
Mariek M. P. Vanden Abeele

Contemporary children live in datafied societies in which they navigate and use technological innovations that drive on their personal information. Instructing privacy literacy is often presented as a key solution to help children manage their personal data responsibly. While there is agreement on the empowering potential of privacy literacy for children, there are also concerns over the burden that this responsibility places on them and their capacity for resilience. Children are key stakeholders in this debate. Nonetheless, we rarely hear their voices on issues related to their online privacy and data responsibilization. The articles included in this thematic issue account for this limitation by amplifying the voices of children, looking into the practices of parents and exploring the role of the tools being used.


2015 ◽  
Vol 31 (1) ◽  
pp. 77-96
Author(s):  
Lukman Adebisi Abdulrauf

Transborder data flow (TBDF) has generated much controversy in this era of globalisation. Various questions regarding its exact nature, dimension and role have been raised by scholars. Nevertheless, the majority of scholars agree that TBDF is crucial for development in every state and even more important for developing countries. In spite of the general consensus that TBDF is vital for development, it raises some concerns such as the infringement of individuals’ right to privacy. This has made countries and international organisations regulate TBDF in data protection instruments. Such instruments in some cases put stringent conditions on TBDF, which could be an obstacle to the free movement of personal data across borders and may even serve as a non-tariff barrier against developing countries, including G77 states. The implication of this trend of events is that if G77 states do not take data protection and regulation of TBDF seriously, they may never benefit economically from developed countries. This will, of course, not sit well with the primary purpose for the establishment of the G77+China. With a special focus on the G77, this article examines the role of regulating TBDF in facilitating TBDF for economic development. This topic is crucial in the wake of various initiatives by the G77 to promote trade so as to foster development.


2020 ◽  
Vol 3 (11) ◽  
pp. 1100-1104
Author(s):  
Hussein Naeem Aldhaheri ◽  
Ihsan Edan AlSaimary ◽  
Murtadha Mohammed ALMusafer

      The Aim of this study was to determine Immunogenetic expression of  Toll-like receptor gene clusters related to prostatitis, to give acknowledge about Role of TLR in prostatitis immunity in men from Basrah and Maysan provinces. A case–control study included 135 confirmed prostatitis patients And 50 persons as a control group. Data about age, marital status, working, infertility, family history and personal information like (Infection, Allergy, Steroid therapy, Residency, Smoking, Alcohol Drinking, Blood group, Body max index (BMI) and the clinical finding for all patients of Prostatitis were collected. This study shows the effect of PSA level in patients with prostatitis and control group, with P-value <0.0001 therefore the study shows a positive significant between elevated PSA levels and Prostatitis.


2021 ◽  
pp. 1-11
Author(s):  
Miladin Kovačević ◽  
Katarina Stančić

Modern society is witnessing a data revolution which necessarily entails changes to the overall behavior of citizens, governments and companies. This is a big challenge and an opportunity for National Statistics Offices (NSOs). Especially after the outbreak of COVID-19, when the public debate about the number of mortalities and tested and infected persons escalated, trusted data is required more than ever. Which data can modern society trust? Are modern societies being subjected to opinion rather than fact? This paper introduces a new statistical tool to facilitate policy-making based on trusted statistics. Using economic indicators to illustrate implementation, the new statistical tool is shown to be a flexible instrument for analysis, monitoring and evaluation of the economic situation in the Republic of Serbia. By taking a role in public policy management, the tool can be used to transform the NSO’s role in the statistical system into an active participant in public debate in contrast to the previous traditional, usually passive role of collecting, processing and publishing data. The tool supports the integration of statistics into public policies and connects the knowledge and expertise of official statisticians on one side with political decision makers on the other.


2021 ◽  
Vol 12 (1) ◽  
pp. 59-76
Author(s):  
Evangelia (Lilian) TSOURDI ◽  
Niovi VAVOULA

Greece emerged as the EU’s poster child in the fight against COVID-19 during the first few months of the pandemic. In this contribution, we assess Greece’s use of soft regulation in its regulatory response to COVID-19. Using “acts of legislative content”, which can be broadly conceptualised as softly adopted hard law, the Greek government largely achieved flexibility and simplified adoption procedures without having to resort to soft law per se. The role of soft law was limited - it complemented hard law rather than constituting the primary basis of COVID-19 restrictions - but not completely negligible. Soft law instruments regulated the processing of personal data, and was also pivotal in clarifying the criminal sanctioning of COVID-related rule violations. Greece’s success in handling the first wave of the pandemic, while effective, was arguably unfair to asylum seekers who saw their right to apply for asylum curtailed, and their right to freedom of movement restricted when limitations on the rest of the population were lifted. With a second wave of infections currently in full swing, it is imperative to keep scrutinising regulatory responses to ensure that they place the health and dignity of every individual (whoever they might be) at their core and fully respect their fundamental rights.


Author(s):  
Azahara María García-Serna ◽  
Elena Martín-Orozco ◽  
Trinidad Hernández-Caselles ◽  
Eva Morales

It is suggested that programming of the immune system starts before birth and is shaped by environmental influences acting during critical windows of susceptibility for human development. Prenatal and perinatal exposure to physiological, biological, physical, or chemical factors can trigger permanent, irreversible changes to the developing immune system, which may be reflected in cord blood of neonates. The aim of this narrative review is to summarize the evidence on the role of the prenatal and perinatal environment, including season of birth, mode of delivery, exposure to common allergens, a farming environment, pet ownership, and exposure to tobacco smoking and pollutants, in shaping the immune cell populations and cytokines at birth in humans. We also discuss how reported disruptions in the immune system at birth might contribute to the development of asthma and related allergic manifestations later in life.


Sign in / Sign up

Export Citation Format

Share Document