confidential information
Recently Published Documents





Informatics ◽  
2021 ◽  
Vol 18 (4) ◽  
pp. 26-39
A. V. Sidorenko ◽  
M. A. Saladukha

Objectives. The problem of determining the mental fatigue of the operator, which is processing the confidential information under the influence of electromagnetic noise radiation, is solved. The relevance of the problem is associated with the need to process the confidential information by the operator located in the limited space of a mobile technical system.Methods. The methods of spectral analysis theory of the results, received in the process of experimental studies the electroencephalograms, are used.Results. The results of experimental studies were obtained based on the processing and analysis of electroencephalograms recorded in standard leads Fp1, Fp2, F3, F4, C3, C4, P3, P4, O1, O2, F7, F8, T3, T4, T5, T6. The following quantitative parameters have been analyzed: power spectral density of delta-, theta-, alpha-, beta-, gamma-rhythms under the influence of electromagnetic noise radiation.Conclusion. The presence of mental fatigue of the operator is based on a comparative analysis of the obtained results and the data described in the scientific literature related to the occurrence of chronic mental fatigue; the fatigue caused by the military performing simulation tasks; mental fatigue caused by performing an RVP test.

2021 ◽  
Vol 6 (3) ◽  
pp. 144-153
M R Yasoa ◽  
S F Muhamad ◽  
T Abdullah ◽  
M N H Yusoff ◽  
N M Said ◽  

Objective – This paper investigates the possibility and feasibility of Malaysia's Islamic banking industry hiring external Shariah audit (ESA) services in the audit fraternity as one of the Shariah governance mechanisms. Some of the scholars argued that ESA is more independent and is able to strengthen the existing Shariah compliance in the industry. Methodology – This study employs a qualitative method by utilising semi-structured interviews with nine key industry players: Shariah auditors, Heads of Shariah audit, Shariah Committee (SC) Member, and Chief Shariah Officer. Data gathered from the interviews was transcribed and analysed using Atlas.ti software. Findings– A series of interviews reveal that given the current practices by the Islamic banking industry, it could be inferred that the Malaysian Islamic banking industry is not ready to exercise the ESA practices. This unreadiness is due to several factors, such as ESA costs outweighing its benefits, the fear of reputational risk, and anxiety of leaking confidential information to rivals. Novelty – The Shariah audit research especially relates to external Shariah audit is considered limited. Type of Paper: Empirical JEL Classification: E44, G10, G20. Keywords: External Shariah audit; Islamic Banks; qualitative method; Shariah governance; Malaysia

Maryna Tsilyna

The purpose of the article is to establish the features and types of modern documentary information thathas intellectual value; finding out the principles on which to build a secure document flow; characteristics ofthe main technological stages and procedures for the implementation of confidential documents; identifyingthreats that may arise during this process. The methodology consisted of a set of general scientific, specialscientific and specific methods of studying the problem, the application of which allows to achieve the goal.Scientific intelligence was based on the principles of objectivity and integrity. The use of a set of scientificmethods made it possible to study the specifics of valuable documentary information, to find out the mainchannels of information leakage, to trace the stages of document circulation of such business papers. Scientificnovelty. The latest international practices of working with confidential documents are studied. Featuresand types of documentary information that has intellectual value for the entrepreneur are established. Theprinciples on which it is necessary to build a secure document flow are formulated. The main technologicalstages and procedures of execution of confidential documents are outlined. The main threats that may ariseduring this process have been identified. Conclusions. Confidential information allows any company to operatesuccessfully due to the security of information. The importance of such information determines the risk of itsloss. In order to avoid inconveniences related to the loss or theft of information, the institutions should createappropriate services, whose representatives monitor confidential information, document circulation, createdatabases for computers and files for paper media, destroy drafts of confidential documents, store and destroydocuments that are valuable in the prescribed manner.Keywords: execution of a confidential document, secrecy stamp, information protection, technologicalcomplexity, value of documentary information.

Olena Ponomarova

Keywords: clinical trial, confidential information, personal data, patient Clinical trials are conductedin accordance with legal norms, subject to human rights and in accordance with internationalethical principles. Each clinical trial for the patient (subject) begins on a voluntarybasis and with acquaintance of the patient (subject) about the features of the study, itspurpose and purpose, explanation of possible risks, in addition, the patient is informedabout innovative drugs and access to free treatment during research. The patient participatesin the study of the drug of his own volition, signing a voluntary informed consent.It is important to ensure that the rights of the patient (subject) in the clinical trial of themedicinal product to privacy and the protection of personal data, which is confidential informationabout the person who is the subject of the study, are respected. During clinicaltrials, researchers and all persons involved in the research process should treat responsiblythe person participating in the study of the medicinal product as the object of study,namely with respect for the human right to privacy and its secrecy. Individuals and legalentities should be able to protect information legally under their control from disclosure,acquisition or use by others without their consent in a manner contrary to fair commercialpractice, if such information is confidential in the sense that it is as a whole or in theexact configuration and combination of its components, commonly known or available topersons in the circles normally involved with the information in question. It is importantto note that any information that becomes known about the patient (subject) during theclinical trial of the drug should be carefully protected by the party conducting the study.Therefore, it is important to note that the right of a patient not to disclose confidentialinformation about him is guaranteed by the Constitution of Ukraine. The right to medicalsecrecy is enshrined in the Law of Ukraine "Fundamentals of Health Legislation". Incases where the rights of the patient (subject) have been violated, the legislator providesfor criminal liability for intentional disclosure of medical secrets to a person who becameknown in connection with the performance of professional or official duties, if such an actcaused serious consequences and for illegal collection, storage, use, destruction, disseminationof confidential information about a person or illegal change of such informationcomes criminal liability.

Ruslan Raupov ◽  
Vadim Afanas'ev

The paper investigates the features of modeling confidential information transmission systems based on the effects of dynamic chaos in multi-scroll systems. Recommendations for the choice of parameters of a multi-scroll system used in information transmission based on pseudo-random signals of a discrete-nonlinear system according to the Jerk circuit are obtained.

2021 ◽  
Vol 46 (2) ◽  
pp. 1-24
Fareed Moosa ◽  

Sec. 63 of the Tax Administration Act 28 of 2011 (TAA) grants officials of the South African Revenue Service (SARS) access to taxpayers’ private and confidential information by, first, searching a taxpayer’s person and premises without a warrant and, secondly, permitting the seizure of taxpayers’ possessions and communications. Part One of this article (see Journal for Juridical Science 2021(1)) argued that the TAA is a “law of general application” as envisaged by the so-called “limitation clause” contained in sec. 36(1) of the Constitution, 1996 and that, in terms of the threshold stage of analysis prescribed by this provision, the exercise of the powers conferred by sec. 63(1) and (4) limits a taxpayer’s constitutional right to privacy as entrenched in sec. 14 of the Constitution. In this Part Two of the article, it will be hypothesised that, although the search and seizure powers in sec. 63(1) and (4) of the TAA are not models of drafting with absolute clarity, they ought, in terms of the second stage of enquiry that is triggered by the findings in Part One, nevertheless to pass muster under sec. 36(1) of the Constitution, because of the justifiability of the limitation imposed on the right to privacy by these provisions.

2021 ◽  
Vol 6 (5(38)) ◽  
pp. 17-20
Natalia Gennadievna Mironova ◽  
Liana Miftakhova

The problems of ensuring information security of confidential information using intellectual means of protection are considered.

2021 ◽  
pp. 185-198
Dragica Živojinović ◽  

Medical practice and care has always included the duty of doctors to protect patients' confidiental information. However, this duty is not absolute. The subject of this paper is to identify the situations in which doctors are not bound by doctor - patient privilege, that is what are the exclusions in Serbian law that allow doctors to disclose patients’ confidential information. Considering current legal and ethical regulations related to this matter, the author analyzes each of the indetified reasons which justify disclosing doctor - patient confidential information. They are: the written consent of the patient or his legal representative; the need to protect a higher interest than the patient’s right to privacy and confidentiality of medical information; legal obligation to disclose certain information from the patient’s medical records; the court order. Assessing whether and to what extent the conditions have been met to apply each of these reasons for exclusion, the author of this paper findings that their introduction is justified and well balanced with the protection of other patient’s rights, the rights of third persons and the need to protect public health. In the concluding remarks, the author underlines that the method and extent of disclosing doctor - patient confidential information must be done for adequate purposes in order to protect patients’ confidential information in the best possible manner.

2021 ◽  
pp. 134336
Jian-Qiang Zhao ◽  
Hua-Sen Shi ◽  
Le-Ran Zeng ◽  
Hui Ge ◽  
Yu-Han Hou ◽  

Sign in / Sign up

Export Citation Format

Share Document