189 resultados para privacy policies
Resumo:
The central contention of this article is that there is a need for greater involvement of legislators in overseeing a systematic and rights-based scrutiny of the impact of legislation and policy. The recent operation of Australia s asylum laws and policies, in particular provides an illustration of the reforms required. Challenges to the rights of non-citizens in Australia and other jurisdictions serve as a reminder of the extent of change required before rights are firmly entrenched in the processes of government. A useful step forward would be to enhance the role of legislators in setting the criteria and agenda for post-enactment scrutiny in light of issues raised during pre-legislative scrutiny.
Resumo:
Employees' inability to balance work and non-work related responsibilities have resulted in an increase in stress related illnesses. Historically, research into the relationship between work and non-work has primarily focused on work/family conflict, predominately investigating the impact of this conflict on parents, usually mothers. To date research has not sufficiently examined the management practices that enable all 'individuals' to achieve a 'balance' between work and life. This study explores the relationship between contemporary life friendly HR management policies and work/life balance for individuals as well as the effect of managerial support to the policies. Self-report questionnaire data from 1,241 men and women is analysed and discussed to enable organizations to consider the use of life friendly policies and thus create a convergence between the well-being of employees and the effectiveness of the organization.
Resumo:
The Australian Government is about to release Australia’s first sustainable population policy. Sustainable population growth, among other things, implies sustainable energy demand. Current modelling of future energy demand both in Australia and by agencies such as the International Energy Agency sees population growth as one of the key drivers of energy demand. Simply increasing the demand for energy in response to population policy is sustainable only if there is a radical restructuring of the energy system away from energy sources associated with environmental degradation towards one more reliant on renewable fuels and less reliant on fossil fuels. Energy policy can also address the present nexus between energy consumption per person and population growth through an aggressive energy efficiency policy. The paper considers the link between population policies and energy policies and considers how the overall goal of sustainability can be achieved. The methods applied in this analysis draw on the literature of sustainable development to develop elements of an energy planning framework to support a sustainable population policy. Rather than simply accept that energy demand is a function of population increase moderated by an assumed rate of energy efficiency improvement, the focus is on considering what rate of energy efficiency improvement is necessary to significantly reduce the standard connections between population growth and growth in energy demand and what policies are necessary to achieve this situation. Energy efficiency policies can only moderate unsustainable aspects of energy demand and other policies are essential to restructure existing energy systems into on-going sustainable forms. Policies to achieve these objectives are considered. This analysis shows that energy policy, population policy and sustainable development policies are closely integrated. Present policy and planning agencies do not reflect this integration and energy and population policies in Australia have largely developed independently and whether the outcome is sustainable is largely a matter of chance. A genuinely sustainable population policy recognises the inter-dependence between population and energy policies and it is essential that this is reflected in integrated policy and planning agencies
Resumo:
The Australian Government is about to release Australia’s first sustainable population policy. Sustainable population growth, among other things, implies sustainable energy demand. Current modelling of future energy demand both in Australia and by agencies such as the International Energy Agency sees population growth as one of the key drivers of energy demand. Simply increasing the demand for energy in response to population policy is sustainable only if there is a radical restructuring of the energy system away from energy sources associated with environmental degradation towards one more reliant on renewable fuels and less reliant on fossil fuels. Energy policy can also address the present nexus between energy consumption per person and population growth through an aggressive energy efficiency policy. The paper considers the link between population policies and energy policies and considers how the overall goal of sustainability can be achieved. The methods applied in this analysis draw on the literature of sustainable development to develop elements of an energy planning framework to support a sustainable population policy. Rather than simply accept that energy demand is a function of population increase moderated by an assumed rate of energy efficiency improvement, the focus is on considering what rate of energy efficiency improvement is necessary to significantly reduce the standard connections between population growth and growth in energy demand and what policies are necessary to achieve this situation. Energy efficiency policies can only moderate unsustainable aspects of energy demand and other policies are essential to restructure existing energy systems into on-going sustainable forms. Policies to achieve these objectives are considered. This analysis shows that energy policy, population policy and sustainable development policies are closely integrated. Present policy and planning agencies do not reflect this integration and energy and population policies in Australia have largely developed independently and whether the outcome is sustainable is largely a matter of chance. A genuinely sustainable population policy recognises the inter-dependence between population and energy policies and it is essential that this is reflected in integrated policy and planning agencies
Resumo:
A patient-centric DRM approach is proposed for protecting privacy of health records stored in a cloud storage based on the patient's preferences and without the need to trust the service provider. Contrary to the current server-side access control solutions, this approach protects the privacy of records from the service provider, and also controls the usage of data after it is released to an authorized user.
Resumo:
Mandatory data breach notification laws are a novel and potentially important legal instrument regarding organisational protection of personal information. These laws require organisations that have suffered a data breach involving personal information to notify those persons that may be affected, and potentially government authorities, about the breach. The Australian Law Reform Commission (ALRC) has proposed the creation of a mandatory data breach notification scheme, implemented via amendments to the Privacy Act 1988 (Cth). However, the conceptual differences between data breach notification law and information privacy law are such that it is questionable whether a data breach notification scheme can be solely implemented via an information privacy law. Accordingly, this thesis by publications investigated, through six journal articles, the extent to which data breach notification law was conceptually and operationally compatible with information privacy law. The assessment of compatibility began with the identification of key issues related to data breach notification law. The first article, Stakeholder Perspectives Regarding the Mandatory Notification of Australian Data Breaches started this stage of the research which concluded in the second article, The Mandatory Notification of Data Breaches: Issues Arising for Australian and EU Legal Developments (‘Mandatory Notification‘). A key issue that emerged was whether data breach notification was itself an information privacy issue. This notion guided the remaining research and focused attention towards the next stage of research, an examination of the conceptual and operational foundations of both laws. The second article, Mandatory Notification and the third article, Encryption Safe Harbours and Data Breach Notification Laws did so from the perspective of data breach notification law. The fourth article, The Conceptual Basis of Personal Information in Australian Privacy Law and the fifth article, Privacy Invasive Geo-Mashups: Privacy 2.0 and the Limits of First Generation Information Privacy Laws did so for information privacy law. The final article, Contextualizing the Tensions and Weaknesses of Information Privacy and Data Breach Notification Laws synthesised previous research findings within the framework of contextualisation, principally developed by Nissenbaum. The examination of conceptual and operational foundations revealed tensions between both laws and shared weaknesses within both laws. First, the distinction between sectoral and comprehensive information privacy legal regimes was important as it shaped the development of US data breach notification laws and their subsequent implementable scope in other jurisdictions. Second, the sectoral versus comprehensive distinction produced different emphases in relation to data breach notification thus leading to different forms of remedy. The prime example is the distinction between market-based initiatives found in US data breach notification laws compared to rights-based protections found in the EU and Australia. Third, both laws are predicated on the regulation of personal information exchange processes even though both laws regulate this process from different perspectives, namely, a context independent or context dependent approach. Fourth, both laws have limited notions of harm that is further constrained by restrictive accountability frameworks. The findings of the research suggest that data breach notification is more compatible with information privacy law in some respects than others. Apparent compatibilities clearly exist as both laws have an interest in the protection of personal information. However, this thesis revealed that ostensible similarities are founded on some significant differences. Data breach notification law is either a comprehensive facet to a sectoral approach or a sectoral adjunct to a comprehensive regime. However, whilst there are fundamental differences between both laws they are not so great to make them incompatible with each other. The similarities between both laws are sufficient to forge compatibilities but it is likely that the distinctions between them will produce anomalies particularly if both laws are applied from a perspective that negates contextualisation.
Resumo:
This publication is the first in a series of scholarly reports on research-based practice related to the First Year Experience in Higher Education. This report synthesises evidence about practice-based initiatives and pragmatic approaches in Aotearoa (New Zealand) and Australia that aim to enhance the experience of commencing students in the higher education sector. Trends in policies, programs and practices ... examines the first year experience literature from 2000-2010. It acknowledges the uniqueness of the Australasian socio-political context and its influence on the interests and output of researchers. The review surveyed almost 400 empirical reports and conceptual discussions produced over the decade that dealt with the stakeholders, institutions and the higher education sector in Australasia. The literature is examined through two theoretical constructs or “lenses”: first, a set of first year curriculum design principles and second, the generational approach to describing the maturation of initiatives. These outcomes and suggested directions for further research provide the challenges and the opportunities for FYE adherents, both scholars and practitioners, to grapple with in the next decade.
Resumo:
To provide privacy protection, cryptographic primitives are frequently applied to communication protocols in an open environment (e.g. the Internet). We call these protocols privacy enhancing protocols (PEPs) which constitute a class of cryptographic protocols. Proof of the security properties, in terms of the privacy compliance, of PEPs is desirable before they can be deployed. However, the traditional provable security approach, though well-established for proving the security of cryptographic primitives, is not applicable to PEPs. We apply the formal language of Coloured Petri Nets (CPNs) to construct an executable specification of a representative PEP, namely the Private Information Escrow Bound to Multiple Conditions Protocol (PIEMCP). Formal semantics of the CPN specification allow us to reason about various privacy properties of PIEMCP using state space analysis techniques. This investigation provides insights into the modelling and analysis of PEPs in general, and demonstrates the benefit of applying a CPN-based formal approach to the privacy compliance verification of PEPs.
Resumo:
Nursing personnel are consistently identified as one of the occupational groups most at risk of work-related musculoskeletal disorders. During the moving and handling of bariatric patients, the weight of the patient combined with atypical body mass contributes to a significant risk of injury to the care provider and patient. This is further compounded by the shape, mobility and co-operation of the patient. The aim of this study was determine user experiences and design requirements for mobile hoists with bariatric patients. Structured interviews were conducted with six experienced injury management staff from the Manual Task Services department of three hospitals in Adelaide, South Australia. All staff had experience in patient handling, the use of patient handling equipment and the provision of patient handling training. A series of open-ended questions were structured around five main themes: 1) patient factors; 2) building/vehicle space and design; 3) equipment and furniture; 4) communication; and 5) staff issues. Questions focussed on the use of mobile hoists for lifting and transferring bariatric patients. Interviews were supplemented with a walk-through of the hospital to view the types of mobile hoists used, and the location and storage of equipment. Across the three hospitals there were differing classification systems to define bariatric patients. Ensuring patient dignity, respect and privacy were viewed as important in the management and rehabilitation of bariatric patients. Storage and space constraints were considered factors restricting the use of mobile floor hoists, with ceiling hoists being the preferred method for patient transfers. When using mobile floor hoists, the forces required to push, pull and manoeuvre, as well as sudden unstable movements of the hoist were considered important risks factors giving rise to a risk of injury to the care provider. Record keeping and purchasing policies appeared to inhibit the effective use of patient handling equipment. The moving and handling of bariatric patients presents complex and challenging issues. A co-ordinated and collaborative approach for moving and handling bariatric patients is needed across the range of care providers. Designers must consider both user and patient requirements.
Resumo:
Privacy is an important component of freedom and plays a key role in protecting fundamental human rights. It is becoming increasingly difficult to ignore the fact that without appropriate levels of privacy, a person’s rights are diminished. Users want to protect their privacy - particularly in “privacy invasive” areas such as social networks. However, Social Network users seldom know how to protect their own privacy through online mechanisms. What is required is an emerging concept that provides users legitimate control over their own personal information, whilst preserving and maintaining the advantages of engaging with online services such as Social Networks. This paper reviews “Privacy by Design (PbD)” and shows how it applies to diverse privacy areas. Such an approach will move towards mitigating many of the privacy issues in online information systems and can be a potential pathway for protecting users’ personal information. The research has also posed many questions in need of further investigation for different open source distributed Social Networks. Findings from this research will lead to a novel distributed architecture that provides more transparent and accountable privacy for the users of online information systems.
Resumo:
An important issue facing Canadians today is crime control and prevention. Research done in the late 1980s and early 1990s by three sociologists shows that Canadian federal criminal justice policies and practices adopted by the Mulroney government from 1984 to 1990 were inconsistent with US ‘law and order’ models in place at that time. However, since the mid‐1990s, Canadian federal and provincial governments have mimicked some US authoritarian and gender‐blind means of curbing crime. The main objective of this paper is to provide some key examples of criminal justice policy transfer from the USA in Canada. At first glance, Canada may appear to be a ‘kinder, gentler nation,’ but not to the extent assumed by many, if not most, outside observers.
Resumo:
Left realists contend that people lacking legitimate means of solving the problem of relative deprivation may come into contact with other frustrated disenfranchised people and form subcultures, which in turn, encourage criminal behaviors. Absent from this theory is an attempt to address how, today, subcultural development in North America and elsewhere is heavily shaped simultaneously by the recent destructive consequences of right-wing Friedman or Chicago School economic policies and marginalized men's attempts to live up to the principles of hegemonic masculinity. The purpose of this paper, then, is to offer a new left realist theory that emphasizes the contribution of these two key determinants.
Resumo:
Institutions represent the ‘technologies of the social.’ They are increasingly modelled and transported to other cultures and societies, and criminal justice institutions—traditional, parochial, and local as they are—are no exception to this. Problems of crime and insecurity have engendered the travelling of institutions from the centre to the periphery and vice versa. This paper will explore the problems which arise from travelling and modelling, and from the transport and creation of institutions in the area of criminal justice. An important feature in the travel of criminal justice institutions is the use of ‘local knowledge’ and its role in this process.