scholarly journals Data access rights – A comparative perspective

Author(s):  
Louisa Specht-Riemenschneider
Author(s):  
Anukul Pandey ◽  
Butta Singh ◽  
Barjinder Singh Saini ◽  
Neetu Sood

The primary objective of this chapter is to analyze the existing tools and techniques for medical data security. Typically, medical data includes either medical signals such as electrocardiogram, electroencephalogram, electromyography, or medical imaging like digital imaging and communications in medicine, joint photographic experts group format. The medical data are sensitive, subject to privacy preservation, and data access rights. Security in e-health field is an integrated concept which includes robust combination of confidentiality, integrity, and availability of medical data. Confidentiality ensures the data is inaccessible to unauthorized access. Integrity restricts the alteration in data by the unauthorized user. Whereas availability provides the readiness of the data when needed by the authorized user. Additionally, confidentiality, integrity and availability, accountability parameter records the back action list which answers the why, when, what, and whom data is accessed. The selected tools and techniques used in medical data security in e-health applications is discussed.


2020 ◽  
Vol 1 (1) ◽  
pp. 18-21
Author(s):  
Sri Handriana Dewi Hastuti

Government Work Units to use a one data policy approach. The purpose of using this data includes the use of data for schools, taking care of data licensing, managing social assistance, all of which must be the same as the data sources in the Population and Civil Registration Office so that no more people have different identities. Based on the Minister of Home Affairs Regulation No. 61 of 2015 concerning Requirements, Scope and Procedures for Granting Access Rights and Utilization of Population Identification Number, Population Data, and Electronic Resident Identity Cards, data utilization access permits are granted by the Regent / Mayor. After submitting the permit to the Regent / Mayor, then the Cooperation Agreement (PKS) is signed. Furthermore, the Regional Apparatus Organization or public service agencies form a Technical Team implementing the cooperation. Furthermore, data access will be given according to their needs and usage. The user access institution will be monitored by the Regent / Mayor through the Department of population and civil registration, and periodic control, supervision and evaluation will be conducted.


Author(s):  
Anukul Pandey ◽  
Butta Singh ◽  
Barjinder Singh Saini ◽  
Neetu Sood

The primary objective of this chapter is to analyze the existing tools and techniques for medical data security. Typically, medical data includes either medical signals such as electrocardiogram, electroencephalogram, electromyography, or medical imaging like digital imaging and communications in medicine, joint photographic experts group format. The medical data are sensitive, subject to privacy preservation, and data access rights. Security in e-health field is an integrated concept which includes robust combination of confidentiality, integrity, and availability of medical data. Confidentiality ensures the data is inaccessible to unauthorized access. Integrity restricts the alteration in data by the unauthorized user. Whereas availability provides the readiness of the data when needed by the authorized user. Additionally, confidentiality, integrity and availability, accountability parameter records the back action list which answers the why, when, what, and whom data is accessed. The selected tools and techniques used in medical data security in e-health applications is discussed.


Author(s):  
Helen Percival

Data access control in a hierarchy is currently a complex structure. Different groups need access to sets of data, some of which overlap, while the rest of the data remains secret. Managers and directors need to access the data that is hidden from regular users. To manage this, users are organized into partially ordered sets, or posets. Nodes in the posets represent users with the same access rights. Current solutions use independent keys to access sections of data. This is chaotic, particularly for upper users in the hierarchy. A proposed solution is up-down computable keys, as described by Nagy and Akl in 2010 [1]. The downfall of this solution is that it is only applicable to stable posets. Users leaving and entering the organization at arbitrary levels or even moving within the structure, may invalidate multiple keys or even all the keys in a poset. Nagy and Akl [1] propose a quantum mechanical solution; by managing systems with two keys per user, a quantum and a classical key, the database is able to use computable keys that the user has no access to. Instead of direct access to the key, the system uses the quantum and the classical keys to compute the access key. The purpose of the study is to design a physical system to implement quantum key database access, able to accommodate large businesses and governments with large, fluctuating and complex organizational hierarchies. Such a system would also be highly secure, suitable for databases with sensitive data. References [1] N. Nagy and S. G. Akl, “A quantum cryptographic solution to the problem of access control in a hierarchy,” Parallel Processing Letters, vol. 20, no. 3, pp. 251–261, 2010.


Author(s):  
Paul Giura ◽  
Vladimir Kolesnikov ◽  
Aris Tentes ◽  
Yevgeniy Vahlis
Keyword(s):  

2021 ◽  

Data are considered to be key for the functioning of the data economy as well as for pursuing multiple public interest concerns. Against this backdrop this book strives to device new data access rules for future legislation. To do so, the contributions first explain the justification for such rules from an economic and more general policy perspective. Then, building on the constitutional foundations and existing access regimes, they explore the potential of various fields of the law (competition and contract law, data protection and consumer law, sector-specific regulation) as a basis for the future legal framework. The book also addresses the need to coordinate data access rules with intellectual property rights and to integrate these rules as one of multiple measures in larger data governance systems. Finally, the book discusses the enforcement of the Government’s interest in using privately held data as well as potential data access rights of the users of connected devices.


2021 ◽  
Vol 3 ◽  
Author(s):  
Cait Bailey ◽  
Anna Farrell ◽  
Turam Purty ◽  
Ashley Taylor ◽  
Jane Disney

The Anecdata website and its corresponding mobile app provide unique features to meet the needs of a wide variety of diverse citizen science projects from across the world. The platform has been developed with the help of continuous feedback from community partners, project leaders, and website users and currently hosts more than 200 projects. Over 8,000 registered users have contributed more than 30,000 images and over 50,000 observations since the platform became open to the public in 2014. From its inception, one of the core tenets of Anecdata's mission has been to make data from citizen science projects freely accessible to project participants and the general public, and in the platform's first few years, it followed a completely open data access model. As the platform has grown, hosting ever more projects, we have found that this model does not meet all project needs, especially where endangered species, property access rights, participant safety in the field, and personal privacy are concerned. We first introduced features for data and user privacy as part of “All About Arsenic,” a National Institutes of Health (NIH)/National Institute of General Medical Sciences (NIGMS) Science Education Partnership Award (SEPA)-funded project at MDI Biological Laboratory, which engages middle and high school teachers and students from schools across Maine and New Hampshire in sampling their home well water for analysis of arsenic and other heavy metals. In order to host this project on Anecdata, we developed features for spatial privacy or “geoprivacy” to conceal the coordinates of samplers' homes, partial data redaction tools we call “private fields” to withhold certain sample registration questions from public datasets, and “participant anonymity” to conceal which user account uploaded an observation. We describe the impetus for the creation of these features, challenges we encountered, and our technical approach. While these features were originally developed for the purposes of a public health and science literacy project, they are now available to all project leaders setting up projects on Anecdata.org and have been adopted by a number of projects, including Mass Audubon's Eastern Meadowlark Survey, South Carolina Aquarium's SeaRise, and Coastal Signs of the Seasons (SOS) Monitoring projects.


Sign in / Sign up

Export Citation Format

Share Document