8 resultados para information protection
em Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland
Resumo:
Tässä luomistyössä on esitetty tutkimus informaation suojaamisen menetelmien osalta paikallisissa ja ryhmäkuntaisissa verkoissa. Tutkimukseen kuuluu nykyaikaisten kryptagraafisten järjestelmien, Internetin/Intranetin ohjelmointikeinojen ja pääsyoikeuksien jakelumenetelmien analyysi. Tutkimusten perusteella on laadittu ohjelmiston prototyyppi HTML-tiedostojen suojaamista varten. Ohjelmiston laatimisprosessi on sisältänyt vaatimusten, järjestelmän ja suojelukomponenttien suunnittelun ja protytyypin testauksen. Ohjelmiston realisoinnin jälkeen kirjoitettiin käyttöohjeet. Ohjelmiston prototyyppi suojaa informaatiota HTML-tiedoston koko käytön aikana ja eri yrityksissä voidaan käyttää sitä pienien laajennuksien jälkeen.
Resumo:
1. Introduction "The one that has compiled ... a database, the collection, securing the validity or presentation of which has required an essential investment, has the sole right to control the content over the whole work or over either a qualitatively or quantitatively substantial part of the work both by means of reproduction and by making them available to the public", Finnish Copyright Act, section 49.1 These are the laconic words that implemented the much-awaited and hotly debated European Community Directive on the legal protection of databases,2 the EDD, into Finnish Copyright legislation in 1998. Now in the year 2005, after more than half a decade of the domestic implementation it is yet uncertain as to the proper meaning and construction of the convoluted qualitative criteria the current legislation employs as a prerequisite for the database protection both in Finland and within the European Union. Further, this opaque Pan-European instrument has the potential of bringing about a number of far-reaching economic and cultural ramifications, which have remained largely uncharted or unobserved. Thus the task of understanding this particular and currently peculiarly European new intellectual property regime is twofold: first, to understand the mechanics and functioning of the EDD and second, to realise the potential and risks inherent in the new legislation in economic, cultural and societal dimensions. 2. Subject-matter of the study: basic issues The first part of the task mentioned above is straightforward: questions such as what is meant by the key concepts triggering the functioning of the EDD such as presentation of independent information, what constitutes an essential investment in acquiring data and when the reproduction of a given database reaches either qualitatively or quantitatively the threshold of substantiality before the right-holder of a database can avail himself of the remedies provided by the statutory framework remain unclear and call for a careful analysis. As for second task, it is already obvious that the practical importance of the legal protection providedby the database right is in the rapid increase. The accelerating transformationof information into digital form is an existing fact, not merely a reflection of a shape of things to come in the future. To take a simple example, the digitisation of a map, traditionally in paper format and protected by copyright, can provide the consumer a markedly easier and faster access to the wanted material and the price can be, depending on the current state of the marketplace, cheaper than that of the traditional form or even free by means of public lending libraries providing access to the information online. This also renders it possible for authors and publishers to make available and sell their products to markedly larger, international markets while the production and distribution costs can be kept at minimum due to the new electronic production, marketing and distributionmechanisms to mention a few. The troublesome side is for authors and publishers the vastly enhanced potential for illegal copying by electronic means, producing numerous virtually identical copies at speed. The fear of illegal copying canlead to stark technical protection that in turn can dampen down the demand for information goods and services and furthermore, efficiently hamper the right of access to the materials available lawfully in electronic form and thus weaken the possibility of access to information, education and the cultural heritage of anation or nations, a condition precedent for a functioning democracy. 3. Particular issues in Digital Economy and Information Networks All what is said above applies a fortiori to the databases. As a result of the ubiquity of the Internet and the pending breakthrough of Mobile Internet, peer-to-peer Networks, Localand Wide Local Area Networks, a rapidly increasing amount of information not protected by traditional copyright, such as various lists, catalogues and tables,3previously protected partially by the old section 49 of the Finnish Copyright act are available free or for consideration in the Internet, and by the same token importantly, numerous databases are collected in order to enable the marketing, tendering and selling products and services in above mentioned networks. Databases and the information embedded therein constitutes a pivotal element in virtually any commercial operation including product and service development, scientific research and education. A poignant but not instantaneously an obvious example of this is a database consisting of physical coordinates of a certain selected group of customers for marketing purposes through cellular phones, laptops and several handheld or vehicle-based devices connected online. These practical needs call for answer to a plethora of questions already outlined above: Has thecollection and securing the validity of this information required an essential input? What qualifies as a quantitatively or qualitatively significant investment? According to the Directive, the database comprises works, information and other independent materials, which are arranged in systematic or methodical way andare individually accessible by electronic or other means. Under what circumstances then, are the materials regarded as arranged in systematic or methodical way? Only when the protected elements of a database are established, the question concerning the scope of protection becomes acute. In digital context, the traditional notions of reproduction and making available to the public of digital materials seem to fit ill or lead into interpretations that are at variance with analogous domain as regards the lawful and illegal uses of information. This may well interfere with or rework the way in which the commercial and other operators have to establish themselves and function in the existing value networks of information products and services. 4. International sphere After the expiry of the implementation period for the European Community Directive on legal protection of databases, the goals of the Directive must have been consolidated into the domestic legislations of the current twenty-five Member States within the European Union. On one hand, these fundamental questions readily imply that the problemsrelated to correct construction of the Directive underlying the domestic legislation transpire the national boundaries. On the other hand, the disputes arisingon account of the implementation and interpretation of the Directive on the European level attract significance domestically. Consequently, the guidelines on correct interpretation of the Directive importing the practical, business-oriented solutions may well have application on European level. This underlines the exigency for a thorough analysis on the implications of the meaning and potential scope of Database protection in Finland and the European Union. This position hasto be contrasted with the larger, international sphere, which in early 2005 does differ markedly from European Union stance, directly having a negative effect on international trade particularly in digital content. A particular case in point is the USA, a database producer primus inter pares, not at least yet having aSui Generis database regime or its kin, while both the political and academic discourse on the matter abounds. 5. The objectives of the study The above mentioned background with its several open issues calls for the detailed study of thefollowing questions: -What is a database-at-law and when is a database protected by intellectual property rights, particularly by the European database regime?What is the international situation? -How is a database protected and what is its relation with other intellectual property regimes, particularly in the Digital context? -The opportunities and threats provided by current protection to creators, users and the society as a whole, including the commercial and cultural implications? -The difficult question on relation of the Database protection and protection of factual information as such. 6. Dsiposition The Study, in purporting to analyse and cast light on the questions above, is divided into three mainparts. The first part has the purpose of introducing the political and rationalbackground and subsequent legislative evolution path of the European database protection, reflected against the international backdrop on the issue. An introduction to databases, originally a vehicle of modern computing and information andcommunication technology, is also incorporated. The second part sets out the chosen and existing two-tier model of the database protection, reviewing both itscopyright and Sui Generis right facets in detail together with the emergent application of the machinery in real-life societal and particularly commercial context. Furthermore, a general outline of copyright, relevant in context of copyright databases is provided. For purposes of further comparison, a chapter on the precursor of Sui Generi, database right, the Nordic catalogue rule also ensues. The third and final part analyses the positive and negative impact of the database protection system and attempts to scrutinize the implications further in the future with some caveats and tentative recommendations, in particular as regards the convoluted issue concerning the IPR protection of information per se, a new tenet in the domain of copyright and related rights.
Resumo:
The patent system was created for the purpose of promoting innovation by granting the inventors a legally defined right to exclude others in return for public disclosure. Today, patents are being applied and granted in greater numbers than ever, particularly in new areas such as biotechnology and information andcommunications technology (ICT), in which research and development (R&D) investments are also high. At the same time, the patent system has been heavily criticized. It has been claimed that it discourages rather than encourages the introduction of new products and processes, particularly in areas that develop quickly, lack one-product-one-patent correlation, and in which theemergence of patent thickets is characteristic. A further concern, which is particularly acute in the U.S., is the granting of so-called 'bad patents', i.e. patents that do not factually fulfil the patentability criteria. From the perspective of technology-intensive companies, patents could,irrespective of the above, be described as the most significant intellectual property right (IPR), having the potential of being used to protect products and processes from imitation, to limit competitors' freedom-to-operate, to provide such freedom to the company in question, and to exchange ideas with others. In fact, patents define the boundaries of ownership in relation to certain technologies. They may be sold or licensed on their ownor they may be components of all sorts of technology acquisition and licensing arrangements. Moreover, with the possibility of patenting business-method inventions in the U.S., patents are becoming increasingly important for companies basing their businesses on services. The value of patents is dependent on the value of the invention it claims, and how it is commercialized. Thus, most of them are worth very little, and most inventions are not worth patenting: it may be possible to protect them in other ways, and the costs of protection may exceed the benefits. Moreover, instead of making all inventions proprietary and seeking to appropriate as highreturns on investments as possible through patent enforcement, it is sometimes better to allow some of them to be disseminated freely in order to maximize market penetration. In fact, the ideology of openness is well established in the software sector, which has been the breeding ground for the open-source movement, for instance. Furthermore, industries, such as ICT, that benefit from network effects do not shun the idea of setting open standards or opening up their proprietary interfaces to allow everyone todesign products and services that are interoperable with theirs. The problem is that even though patents do not, strictly speaking, prevent access to protected technologies, they have the potential of doing so, and conflicts of interest are not rare. The primary aim of this dissertation is to increase understanding of the dynamics and controversies of the U.S. and European patent systems, with the focus on the ICT sector. The study consists of three parts. The first part introduces the research topic and the overall results of the dissertation. The second part comprises a publication in which academic, political, legal and business developments that concern software and business-method patents are investigated, and contentiousareas are identified. The third part examines the problems with patents and open standards both of which carry significant economic weight inthe ICT sector. Here, the focus is on so-called submarine patents, i.e. patentsthat remain unnoticed during the standardization process and then emerge after the standard has been set. The factors that contribute to the problems are documented and the practical and juridical options for alleviating them are assessed. In total, the dissertation provides a good overview of the challenges and pressures for change the patent system is facing,and of how these challenges are reflected in standard setting.
Resumo:
Valtion rajat ylittävät terveyspalvelut Euroopan unionissa sekä Euroopan unionin säädösten merkitys ja vaikutus erityisesti lääkejakeluun ja verenluovuttajille jaettavaan tiedotusaineistoon Valtion rajat ylittävä terveydenhuolto on suuren kiinnostuksen kohteena Euroopan unionissa. Resurssien hyödyntäminen parhaalla mahdollisella tavalla ja tiedon keskittäminen ovat tarpeen terveydenhuollon kustannusten alati noustessa. Terveydenhuoltopalvelut kuuluvat Euroopan sisämarkkinoiden vapaan liikkuvuuden piiriin. Euroopan unionilla ei ole kuitenkaan toimivaltaa säädellä terveydenhuoltojärjestelmiä, vaan sen mahdollisuudet ovat enimmäkseen kansanterveyden edistämisessä ja suojelussa, myös muilla toimialueilla kuin terveydenhuollossa. Tutkimuksen tavoitteena oli tutkia Euroopan unionin säädösten vaikutusta terveydenhuoltosektoriin, erityisesti valtion rajat ylittäviin terveydenhuoltopalveluihin. Erityiskohteena olivat lääkemääräyksen toimittaminen toisen Euroopan unionin jäsenmaan apteekista, resepti-lääkkeiden maahantuonti omaan henkilökohtaiseen käyttöön, sähköisen lääkemääräyksen käyttö kansallisesti ja mahdollisuudet sen käyttöön eri jäsenmaiden välillä, online-apteekkien soveltuvuus Euroopan unionin sisämarkkinoille sekä verenluovuttajille jaettavan tiedotusaineiston yhtenäistämistarve Euroopan unionin alueella. Tutkimuksen osa-alueiden aineisto koottiin vuosina 1999–2003, jolloin Euroopan unioniin kuului 15 jäsenmaata. Apteekit toimittivat useimmiten myös ei-kansalliset, toisessa Euroopan unionin jäsenmaassa annetut lääkemääräykset. Kaikki jäsenmaat rajoittivat lääkemääräyksen vaativien lääkkeiden maahantuontia. Rajoituksia oli maahantuontimäärissä ja -tavoissa. Lisäksi sairasvakuutuskorvausten saaminen ulkomailla lunastetuista reseptilääkkeistä oli hankalaa. Sähköiset lääkemääräykset olivat käytössä vain kahdessa maassa, mutta useissa maissa suunniteltiin niiden kokeilua. Standardit ja käyttöjärjestelmät olivat erilaisia eri maissa. Euroopan unionin alueelle on perustettu online-apteekkeja, joiden toiminta on kuitenkin vaatimatonta. Verenluovuttajille annettava tiedotusaineisto ei missään maassa täyttänyt veridirektiivin vaatimuksia. Tutkimuksen tulokset osoittivat kansallisten käytäntöjen eroavaisuuksien rajoittavan valtion rajat ylittäviä terveydenhuoltopalveluita. Vaikka Euroopan unionin tavoitteena ei ole yhtenäistää terveydenhuoltojärjestelmiä, on tarpeen arvioida uudelleen unionin ja jäsenmaiden välistä työnjakoa. Kansalliset terveydenhuoltojärjestelmät eivät ole erillään Euroopan sisämarkkinoista, jotka merkittävästi vaikuttavat terveydenhuoltoon.
Resumo:
This study examines information security as a process (information securing) in terms of what it does, especially beyond its obvious role of protector. It investigates concepts related to ‘ontology of becoming’, and examines what it is that information securing produces. The research is theory driven and draws upon three fields: sociology (especially actor-network theory), philosophy (especially Gilles Deleuze and Félix Guattari’s concept of ‘machine’, ‘territory’ and ‘becoming’, and Michel Serres’s concept of ‘parasite’), and information systems science (the subject of information security). Social engineering (used here in the sense of breaking into systems through non-technical means) and software cracker groups (groups which remove copy protection systems from software) are analysed as examples of breaches of information security. Firstly, the study finds that information securing is always interruptive: every entity (regardless of whether or not it is malicious) that becomes connected to information security is interrupted. Furthermore, every entity changes, becomes different, as it makes a connection with information security (ontology of becoming). Moreover, information security organizes entities into different territories. However, the territories – the insides and outsides of information systems – are ontologically similar; the only difference is in the order of the territories, not in the ontological status of entities that inhabit the territories. In other words, malicious software is ontologically similar to benign software; they both are users in terms of a system. The difference is based on the order of the system and users: who uses the system and what the system is used for. Secondly, the research shows that information security is always external (in the terms of this study it is a ‘parasite’) to the information system that it protects. Information securing creates and maintains order while simultaneously disrupting the existing order of the system that it protects. For example, in terms of software itself, the implementation of a copy protection system is an entirely external addition. In fact, this parasitic addition makes software different. Thus, information security disrupts that which it is supposed to defend from disruption. Finally, it is asserted that, in its interruption, information security is a connector that creates passages; it connects users to systems while also creating its own threats. For example, copy protection systems invite crackers and information security policies entice social engineers to use and exploit information security techniques in a novel manner.
Resumo:
Targeted measures bring the greatest benefits for environmental protection in agriculture final report of the TEHO Plus project (2011–2014). Particular priority areas of the project activities included creating a training package for agri-environment advisers and testing it, farm-specific advisory services and exploitation of experiences of advice provision, putting together an information package of agri-environment issues, farm-level experiments, and development of water quality monitoring. The recommendations issued by advisers on targeting environmental measures were based on utilising geographical information material and nutrient balances. The project was implemented in cooperation by Southwest Finland Centre for Economic Development, Transport and the Environment, MTK-Satakunta and MTK-Varsinais-Suomi. The project received funding from the Ministry of Agriculture and Forestry and the Ministry of the Environment. Participating farmers, with whom environmental advice was developed and experiments were carried out, were important partners for the project. The operating area of the project was Satakunta and Varsinais-Suomi in Southwest Finland, but its outcomes can be exploited nationally. A national perspective was ensured by close cooperation with actors in different provinces. This final report describes project experiences and outcomes including environmental advisory services, training of agri-environmental advisers, farm visits and the feedback received from farmers on agri-environmental advice, development of water quality monitoring, experiments and project work.
Resumo:
Changes in the abundance of top predators have brought about notable, cascading effects in ecosystems around the world. In this thesis, I examined several potential trophic cascades in boreal ecosystems, and their separate interspecific interactions. The main aim of the thesis was to investigate whether predators in the boreal forests have direct or indirect cascading effects on the lower trophic levels. First, I compared the browsing effects of different mammalian herbivores by excluding varying combinations of voles, hares and cervids from accessing the seedlings of silver birch (Betula pendula), Scots pine (Pinus sylvestris) and Norway spruce (Picea abies). Additionally, I studied the effect of simulated predation risk on vole browsing by using auditory cues of owls. Moving upwards on the trophic levels, I examined the intraguild interactions between the golden eagle (Aquila chrysaetos), and its mesopredator prey, the red fox (Vulpes vulpes) and the pine marten (Martes martes). To look at an entire potential trophic cascade, I further studied the combined impacts of eagles and mesopredators on the black grouse (Tetrao tetrix) and the hazel grouse (Tetrastes bonasia), predicting that the shared forest grouse prey would benefit from eagle presence. From the tree species studied, birch appears to be the most palatable one for the mammalian herbivores. I observed growth reductions in the presences of cervids and low survival associated with hares and voles, which suggests that they all weaken regeneration in birch stands. Furthermore, the simulated owl predation risk appeared to reduce vole browsing on birches in late summer, although the preferred grass forage is then old and less palatable. Browsing by voles and hares had a negative effect on the condition and survival of Scots pine, but in contrast, the impact of mammalian herbivores on spruce was found to be small, at least when more preferred food is available. I observed that the presence of golden eagles had a negative effect on the abundance of adult black grouse but a positive, protective effect on the proportion of juveniles in both black grouse and hazel grouse. Yet, this positive effect was not dependent on the abundance foxes or martens, nor did eagles seem to effectively decrease the abundance of these mesopredators. Conversely, the protection effect on grouse could arise from fear effects and also be mediated by other mesopredators. The results of this thesis provide important new information about trophic interactions in the boreal food webs. They highlight how different groups of mammalian herbivores vary in their effects on the growth and condition of different tree seedlings. Lowered cervid abundances could improve birch regeneration, which indirectly supports the idea that the key predators of cervids could cause cascading effects also in Fennoscandian forests. Owls seem to reduce vole browsing through an intimidation effect, which is a novel result of the cascading effects of owl vocalisation and could even have applications for protecting birch seedlings. In the third cascade examined in this thesis, I found the golden eagle to have a protective effect on the reproducing forest grouse, but it remains unclear through which smaller predators this effect is mediated. Overall, the results of this thesis further support the idea that there are cascading effects in the forests of Northern Europe, and that they are triggered by both direct and non‐lethal effects of predation.
Datenherrschaft – an Ethically Justified Solution to the Problem of Ownership of Patient Information
Resumo:
Patient information systems are crucial components for the modern healthcare and medicine. It is obvious that without them the healthcare cannot function properly – one can try to imagine how brain surgery could be done without using information systems to gather and show information needed for an operation. Thus, it can be stated that digital information is irremovable part of modern healthcare. However, the legal ownership of patient information lacks a coherent and justified basis. The whole issue itself is actually bypassed by controlling pa- tient information with different laws and regulations how patient information can be used and by whom. Nonetheless, the issue itself – who owns the patient in- formation – is commonly missed or bypassed. This dissertation show the problems if the legislation of patient information ownership is not clear. Without clear legislation, the outcome can be unexpected like it seems to be in Finland, Sweden and United Kingdom: the lack of clear regulation has come up with unwanted consequences because of problematic Eu- ropean Union database directive implementation in those countries. The legal ownership is actually granted to the creators of databases which contains the pa- tient information, and this is not a desirable situation. In healthcare and medicine, we are dealing with issues such as life, health and information which are very sensitive and in many cases very personal. Thus, this dissertation leans on four philosophical theories form Locke, Kant, Heidegger and Rawls to have an ethically justified basis for regulating the patient infor- mation in a proper way. Because of the problems of property and ownership in the context of information, a new concept is needed and presented to replace the concept of owning, that concept being Datenherrschaft (eng. mastery over in- formation). Datenherrschaft seems to be suitable for regulating patient infor- mation because its core is the protection of one’s right over information and this aligns with the work of the philosophers whose theories are used in the work. The philosophical argumentation of this study shows that Datenherrschaft granted to the patients is ethically acceptable. It supports the view that patient should be controlling the patient information about themselves unless there are such specific circumstance that justifies the authorities to use patient information to protect other people’s basic rights. Thus, if the patients would be legally grant- ed Datenherrschaft over patient information we would endorse patients as indi- viduals who have their own and personal experience of their own life and have a strong stance against any unjustified paternalism in healthcare. Keywords: patient information, ownership, Datenherrschaft, ethics, Locke, Kant, Heidegger, Rawls