189 resultados para privacy policies


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Australian privacy law regulates how government agencies and private sector organisations collect, store and use personal information. A coherent conceptual basis of personal information is an integral requirement of information privacy law as it determines what information is regulated. A 2004 report conducted on behalf of the UK’s Information Commissioner (the 'Booth Report') concluded that there was no coherent definition of personal information currently in operation because different data protection authorities throughout the world conceived the concept of personal information in different ways. The authors adopt the models developed by the Booth Report to examine the conceptual basis of statutory definitions of personal information in Australian privacy laws. Research findings indicate that the definition of personal information is not construed uniformly in Australian privacy laws and that different definitions rely upon different classifications of personal information. A similar situation is evident in a review of relevant case law. Despite this, the authors conclude the article by asserting that a greater jurisprudential discourse is required based on a coherent conceptual framework to ensure the consistent development of Australian privacy law.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Demography theory suggests that high gender diversity leads to high turnover. As turnover is costly for organizations, we examined whether HR policies and practices influence the expected gender diversity-turnover relationship. Survey data were collected from 198 HR decision makers at publicly listed organizations. We found that HR policies and practices that are supportive of diversity moderate the gender diversity-turnover relationship, such that high gender diversity leads to low turnover in organizations with many diversity supportive policies and practices. Results suggest that organizations can avoid the negative consequences of high gender diversity by implementing diversity supportive HR polices and practices.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Report for City Design, for Environment and Parks, within the Brisbane City Council. Context of this Project A Conservation Study for the Old Brisbane Botanic Gardens, formerly called the Brisbane City Botanic Gardens, was finalised in 1995 and prepared by Jeannie Sim for the Landscape Section of Brisbane City Council, the same author of the present report. This unpublished report was the first conservation plan prepared for the place and it was recommended that it be reviewed in five years time. That time has arrived finally with the preparation of the 2005 Review. The present project was commissioned by City Design on behalf of Environment and Parks Section of Brisbane City Council. The author has purposely chosen to call the study site the 'Old Brisbane Botanic Gardens' (OBBG) to differentiate it from the Brisbane Botanic Gardens, Mt. Coot-tha (BBG-MC), and to maintain the claim for this original garden to remain as a botanic garden for Brisbane. This name immediately brings to mind an association with history, as in the precedent set by the naming of the nearby 'Old Government House' at Gardens Point.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Data breach notification laws have detailed numerous failures relating to the protection of personal information that have blighted both corporate and governmental institutions. There are obvious parallels between data breach notification and information privacy law as they both involve the protection of personal information. However, a closer examination of both laws reveals conceptual differences that give rise to vertical tensions between each law and shared horizontal weaknesses within both laws. Tensions emanate from conflicting approaches to the implementation of information privacy law that results in different regimes and the implementation of different types of protections. Shared weaknesses arise from an overt focus on specified types of personal information which results in ‘one size fits all’ legal remedies. The author contends that a greater contextual approach which promotes the importance of social context is required and highlights the effect that contextualization could have on both laws.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Agile ridesharing aims to utilise the capability of social networks and mobile phones to facilitate people to share vehicles and travel in real time. However the application of social networking technologies in local communities to address issues of personal transport faces significant design challenges. In this paper we describe an iterative design-based approach to exploring this problem and discuss findings from the use of an early prototype. The findings focus upon interaction, privacy and profiling. Our early results suggest that explicitly entering information such as ride data and personal profile data into formal fields for explicit computation of matches, as is done in many systems, may not be the best strategy. It might be preferable to support informal communication and negotiation with text search techniques.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Efficient state asset management is crucial for governments as they facilitate the fulfillment of their public functions, which include the provision of essential services and other public administration support. In recent times economies internationally and particularly in South east Asia, have displayed increased recognition of the importance of efficiencies across state asset management law, policies and practice. This has been exemplified by a surge in notable instances of reform in state asset management. A prominent theme in this phenomenon is the consideration of governance principles within the re-conceptualization of state asset management law and related policy, with many countries recognizing variability in the quality of asset governance and opportunities for profit as being critical factors. This issue is very current in Indonesia where a major reform process in this area has been confirmed by the establishment of a new Directorate of State Asset Management. The incumbent Director-General of State Asset Management has confirmed a re-emphasis on adherence to governance principles within applicable state asset management law and policy reform. This paper reviews aspects of the challenge of reviewing and reforming Indonesian practice within state asset management law and policy specifically related to public housing, public buildings, parklands, and vacant land. A critical issue in beginning this review is how Indonesia currently conceptualizes the notion of asset governance and how this meaning is embodied in recent changes in law and policy and importantly in options for future change. This paper discusses the potential complexities uniquely Indonesian characteristics such as decentralisation and regional autonomy regime, political history, and bureaucratic culture

Relevância:

20.00% 20.00%

Publicador:

Resumo:

There has been increasing international efforts to ensure that health care policies are evidence based. One area where there is a lack of ‘effectiveness’ evidence is in the use of end-of-life care pathways (EOLCP) (1). Despite the lack of evidence supporting the efficacy of the EOCLP, their use has been endorsed in the recent national palliative care strategy document in the UK (2). In addition, a publication endorsed by the Australian Government (titled: Supporting Australians to live well at the End of Life- National Palliative Care Strategy 2010) (3), recommended a national roll out of EOLCP across all sectors (primary, acute and aged care) in Australia. According to this document, it is a measure of “appropriateness” and “effectiveness” for promoting quality end-of-life care.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The enforcement of Intellectual Property rights poses one of the greatest current threats to the privacy of individuals online. Recent trends have shown that the balance between privacy and intellectual property enforcement has been shifted in favour of intellectual property owners. This article discusses the ways in which the scope of preliminary discovery and Anton Piller orders have been overly expanded in actions where large amounts of electronic information is available, especially against online intermediaries (service providers and content hosts). The victim in these cases is usually the end user whose privacy has been infringed without a right of reply and sometimes without notice. This article proposes some ways in which the delicate balance can be restored, and considers some safeguards for user privacy. These safeguards include restructuring the threshold tests for discovery, limiting the scope of information disclosed, distinguishing identity discovery from information discovery, and distinguishing information preservation from preliminary discovery.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Privacy has become one of the main impediments for e-health in its advancement to providing better services to its consumers. Even though many security protocols are being developed to protect information from being compromised, privacy is still a major issue in healthcare where privacy protection is very important. When consumers are confident that their sensitive information is safe from being compromised, their trust in these services will be higher and would lead to better adoption of these systems. In this paper we propose a solution to the problem of patient privacy in e-health through an information accountability framework could enhance consumer trust in e-health services and would lead to the success of e-health services.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In a similar fashion to many western countries, the political context of Japan has been transformed since the 1975 UN World Conference on Women, which eventually led to the establishment of the Basic Law for a Gender-equal Society in Japan in 1999. The Basic Law sets out a series of general guidelines across every field of society, including education. This trajectory policy research study targets gender issues in Japanese higher education and follows the development of the Basic Law and, in particular, how it has been interpreted by bureaucrats and implemented within the field of higher education. This feminist policy research study examines Japanese power relationships within the field of gender and identifies gender discourses embedded within Japanese gender equity policy documents. The study documents the experiences of, and strategies used by, Japanese feminists in relation to gender equity policies in education. Drawing on critical feminist theory and feminist critical discourse theory, the study explores the relationship between gender discourses and social practices and analyses how unequal gender relations have been sustained through the implementation of Japanese gender equity policy. Feminist critical policy analysis and feminist critical discourse analysis have been used to examine data collected through interviews with key players, including policy makers and policy administrators from the national government and higher education institutions offering teacher education courses. The study also scrutinises the minutes of government meetings, and other relevant policy documents. The study highlights the struggles between policy makers in the government and bureaucracy, and feminist educators working for change. Following an anti-feminist backlash, feminist discourses in the original policy documents were weakened or marginalised in revisions, ultimately weakening the impact of the Basic Law in the higher education institutions. The following four key findings are presented within the research: 1) tracking of the original feminist teachers’ movement that existed just prior to the development of the Basic Law in 1999; 2) the formation of the Basic Law, and how the policy resulted in a weakening of the main tenets of women’s policy from a feminist perspective; 3) the problematic manner in which the Basic Law was interpreted at the bureaucratic level; and 4) the limited impact of the Basic Law on higher education and the strategies and struggles of feminist scholars in reaction to this law.