19 resultados para Data Protection Authorities
em CentAUR: Central Archive University of Reading - UK
Resumo:
This article analyses the results of an empirical study on the 200 most popular UK-based websites in various sectors of e-commerce services. The study provides empirical evidence on unlawful processing of personal data. It comprises a survey on the methods used to seek and obtain consent to process personal data for direct marketing and advertisement, and a test on the frequency of unsolicited commercial emails (UCE) received by customers as a consequence of their registration and submission of personal information to a website. Part One of the article presents a conceptual and normative account of data protection, with a discussion of the ethical values on which EU data protection law is grounded and an outline of the elements that must be in place to seek and obtain valid consent to process personal data. Part Two discusses the outcomes of the empirical study, which unveils a significant departure between EU legal theory and practice in data protection. Although a wide majority of the websites in the sample (69%) has in place a system to ask separate consent for engaging in marketing activities, it is only 16.2% of them that obtain a consent which is valid under the standards set by EU law. The test with UCE shows that only one out of three websites (30.5%) respects the will of the data subject not to receive commercial communications. It also shows that, when submitting personal data in online transactions, there is a high probability (50%) of incurring in a website that will ignore the refusal of consent and will send UCE. The article concludes that there is severe lack of compliance of UK online service providers with essential requirements of data protection law. In this respect, it suggests that there is inappropriate standard of implementation, information and supervision by the UK authorities, especially in light of the clarifications provided at EU level.
Resumo:
The European Union sees the introduction of the ePassport as a step towards rendering passports more secure against forgery while facilitating more reliable border controls. In this paper we take an interdisciplinary approach to the key security and privacy issues arising from the use of ePassports. We further anallyse how European data protection legislation must be respected and what additional security measures must be integrated in order to safeguard the privacy of the EU ePassport holder.
Resumo:
With the advent of mass digitization projects, such as the Google Book Search, a peculiar shift has occurred in the way that copyright works are dealt with. Contrary to what has so far been the case, works are turned into machine-readable data to be automatically processed for various purposes without the expression of works being displayed to the public. In the Google Book Settlement Agreement, this new kind of usage is referred to as ‘non-display uses’ of digital works. The legitimacy of these uses has not yet been tested by Courts and does not comfortably fit in the current copyright doctrine, plainly because the works are not used as works but as something else, namely as data. Since non-display uses may prove to be a very lucrative market in the near future, with the potential to affect the way people use copyright works, we examine non-display uses under the prism of copyright principles to determine the boundaries of their legitimacy. Through this examination, we provide a categorization of the activities carried out under the heading of ‘non-display uses’, we examine their lawfulness under the current copyright doctrine and approach the phenomenon from the spectrum of data protection law that could apply, by analogy, to the use of copyright works as processable data.
Resumo:
This paper highlights some communicative and institutional challenges to using ensemble prediction systems (EPS) in operational flood forecasting, warning, and civil protection. Focusing in particular on the Swedish experience, as part of the PREVIEW FP6 project, of applying EPS to operational flood forecasting, the paper draws on a wider set of site visits, interviews, and participant observation with flood forecasting centres and civil protection authorities (CPAs) in Sweden and 15 other European states to reflect on the comparative success of Sweden in enabling CPAs to make operational use of EPS for flood risk management. From that experience, the paper identifies four broader lessons for other countries interested in developing the operational capacity to make, communicate, and use EPS for flood forecasting and civil protection. We conclude that effective training and clear communication of EPS, while clearly necessary, are by no means sufficient to ensure effective use of EPS. Attention must also be given to overcoming the institutional obstacles to their use and to identifying operational choices for which EPS is seen to add value rather than uncertainty to operational decision making by CPAs.
Resumo:
Effective disaster risk management relies on science-based solutions to close the gap between prevention and preparedness measures. The consultation on the United Nations post-2015 framework for disaster risk reduction highlights the need for cross-border early warning systems to strengthen the preparedness phases of disaster risk management, in order to save lives and property and reduce the overall impact of severe events. Continental and global scale flood forecasting systems provide vital early flood warning information to national and international civil protection authorities, who can use this information to make decisions on how to prepare for upcoming floods. Here the potential monetary benefits of early flood warnings are estimated based on the forecasts of the continental-scale European Flood Awareness System (EFAS) using existing flood damage cost information and calculations of potential avoided flood damages. The benefits are of the order of 400 Euro for every 1 Euro invested. A sensitivity analysis is performed in order to test the uncertainty in the method and develop an envelope of potential monetary benefits of EFAS warnings. The results provide clear evidence that there is likely a substantial monetary benefit in this cross-border continental-scale flood early warning system. This supports the wider drive to implement early warning systems at the continental or global scale to improve our resilience to natural hazards.
Resumo:
The aim of this research was to explore consumer perceptions of personalised nutrition and to compare these across three different levels of ‘‘medicalization’’: lifestyle assessment (no blood sampling); phenotypic assessment (blood sampling); genomic assessment (blood and buccal sampling). The protocol was developed from two pilot focus groups conducted in the UK. Two focus groups (one comprising only ‘‘older’’ individuals between 30 and 60 years old, the other of adults 18–65 yrs of age) were run in the UK, Spain, the Netherlands, Poland, Portugal, Ireland, Greece and Germany (N = 16). The analysis (guided using grounded theory) suggested that personalised nutrition was perceived in terms of benefit to health and fitness and that convenience was an important driver of uptake. Negative attitudes were associated with internet delivery but not with personalised nutrition per se. Barriers to uptake were linked to broader technological issues associated with data protection, trust in regulator and service providers. Services that required a fee were expected to be of better quality and more secure. An efficacious, transparent and trustworthy regulatory framework for personalised nutrition is required to alleviate consumer concern. In addition, developing trust in service providers is important if such services to be successful.
Resumo:
This article is concerned with the liability of search engines for algorithmically produced search suggestions, such as through Google’s ‘autocomplete’ function. Liability in this context may arise when automatically generated associations have an offensive or defamatory meaning, or may even induce infringement of intellectual property rights. The increasing number of cases that have been brought before courts all over the world puts forward questions on the conflict of fundamental freedoms of speech and access to information on the one hand, and personality rights of individuals— under a broader right of informational self-determination—on the other. In the light of the recent judgment of the Court of Justice of the European Union (EU) in Google Spain v AEPD, this article concludes that many requests for removal of suggestions including private individuals’ information will be successful on the basis of EU data protection law, even absent prejudice to the person concerned.
Resumo:
Since 1999, the National Commission for the Knowledge and Use of the Biodiversity (CONABIO) in Mexico has been developing and managing the “Operational program for the detection of hot-spots using remote sensing techniques”. This program uses images from the MODerate resolution Imaging Spectroradiometer (MODIS) onboard the Terra and Aqua satellites and from the Advanced Very High Resolution Radiometer of the National Oceanic and Atmospheric Administration (NOAA-AVHRR), which are operationally received through the Direct Readout station (DR) at CONABIO. This allows the near-real time monitoring of fire events in Mexico and Central America. In addition to the detection of active fires, the location of hot spots are classified with respect to vegetation types, accessibility, and risk to Nature Protection Areas (NPA). Besides the fast detection of fires, further analysis is necessary due to the considerable effects of forest fires on biodiversity and human life. This fire impact assessment is crucial to support the needs of resource managers and policy makers for adequate fire recovery and restoration actions. CONABIO attempts to meet these requirements, providing post-fire assessment products as part of the management system in particular for satellite-based burnt area mapping. This paper provides an overview of the main components of the operational system and will present an outlook to future activities and system improvements, especially the development of a burnt area product. A special focus will also be placed on the fire occurrence within NPAs of Mexico
Resumo:
Since the advent of the internet in every day life in the 1990s, the barriers to producing, distributing and consuming multimedia data such as videos, music, ebooks, etc. have steadily been lowered for most computer users so that almost everyone with internet access can join the online communities who both produce, consume and of course also share media artefacts. Along with this trend, the violation of personal data privacy and copyright has increased with illegal file sharing being rampant across many online communities particularly for certain music genres and amongst the younger age groups. This has had a devastating effect on the traditional media distribution market; in most cases leaving the distribution companies and the content owner with huge financial losses. To prove that a copyright violation has occurred one can deploy fingerprinting mechanisms to uniquely identify the property. However this is currently based on only uni-modal approaches. In this paper we describe some of the design challenges and architectural approaches to multi-modal fingerprinting currently being examined for evaluation studies within a PhD research programme on optimisation of multi-modal fingerprinting architectures. Accordingly we outline the available modalities that are being integrated through this research programme which aims to establish the optimal architecture for multi-modal media security protection over the internet as the online distribution environment for both legal and illegal distribution of media products.
Resumo:
There is a clear need for financial protection in the construction industry, both to guarantee satisfactory completion of construction projects and to guard against non-payment. However, the cost of financial protection is often felt to be disproportionately high, with unnecessary overlap between different measures. The Reading Construction Forum has commissioned and steered research which is published in this report in an effort to bring the problem out into the open and to clarify the various options open to the various parties and stakeholders in the construction process. "Financial Protection in the UK Building Industry" is the first definitive report on the subject, offering an accurate and simple guide that all levels within the construction industry can understand. This accessible new guide considers the problem of financial protection and clearly lays out the alternative solutions.It looks by turn at the client, the main contractor, and the sub-contractor, discussing which financial protection options are available to each of them, and considers the pros and cons of each option. The cost of each type of financial protection is weighed against the amount of protection provided and the risks involved. The book concludes with guidance for consultants, emphasising relevant points to consider when advising clients and contractors about which type of financial protection to choose. "Financial Protection in the UK Building Industry" was researched by a literature search, collection of statistical data, and financial data, as well as discussions with clients, contractors, sub-contractors and consultants. This investigation has shown that the direct costs of implementing financial protection measures are marginal, and that wider adoption of payment protection would create a more equitable situation between contracting parties.This guide will enable anyone in the construction industry to consider all the options, and determine what is the best solution for them. "Reading Construction Forum Financial Protection for the UK Building Industry" was complied by the University of Reading, funded by the Reading Construction Forum. The Forum has recently commissioned and steered a number of high-profile reports covering important aspects of the construction industry. Members of the Forum include major companies which are concerned with achieving high quality in the design, construction and use of commercial, retail and industrial buildings. All are committed to change and innovation in the British and European construction industries.
Resumo:
The proliferation of designated areas following the implementation of Natura 2000 in Greece has initiated changes in the protected area design and conservation policy making aiming at delivering action for biodiversity and integrative planning on a wider landscape. Following the sustainability concept, an integrative approach cannot realistically take place simply by extending the protected area and designations. The paper addresses public involvement and inter-sectoral coordination as major procedural elements of integrative management and evaluates the nature and strength of their negative or positive influences on the fulfillment of an integrative vision of nature conservation. A review of the history of protected areas and administration developments in Greece provide useful input in the research. The analysis has shown that the selected network of Natura 2000 sites has been superimposed upon the existing system and resulted in duplication of administrative effort and related legislation. As a result the overall picture of protected areas in the country appears complex, confusing and fragmented. Major failures to integrated conservation perspective can be traced to structural causes rooted in politico-economic power structures of mainstream policy and in a rather limited political commitment to conservation. It is concluded that greater realisation. of integrated conservation in Greece necessitates policy reforms related mainly to sectoral legal frameworks to promote environmentalism as well as an increased effort by the managing authorities to facilitate a broader framework of public dialogue and give local communities incentives to sustainably benefit from protected areas. (C) 2006 Elsevier Ltd. All rights reserved.
Resumo:
Mechanisms of nigral cell injury in Parkinson's disease remain unclear, although a combination of increased oxidative stress, the formation of catecholamine-quinones and the subsequent formation of neurotoxic cysteinyl-catecholamine conjugates may contribute. In the present study, peroxynitrite was observed to generate both 2-S- and 5-S-cysteinyl-dopamine and a dihydrobenzothiazine species, DHBT-1, following the reaction of dopamine with L-cysteine. The formation of 5-S-cysteinyl-dopamine and DHBT-1 in the presence of peroxynitrite induced significant neuronal injury. Pre-treatment of cortical neurons with pelargonidin, quercetin, hesperetin, caffeic acid, the 4'-O-Me derivatives of catechin and epicatechin (0.1-3.0 mu M) resulted in concentration dependant protection against 5-S-cysteinyl-dopamine-induced neurotoxicity. These data suggest that polyphenols may protect against neuronal injury induced by endogenous neurotoxins relevant to the aetiology of the Parkinson disease. (C) 2008 Elsevier Inc. All rights reserved.
Resumo:
The identification of criminal networks is not a routine exploratory process within the current practice of the law enforcement authorities; rather it is triggered by specific evidence of criminal activity being investigated. A network is identified when a criminal comes to notice and any associates who could also be potentially implicated would need to be identified if only to be eliminated from the enquiries as suspects or witnesses as well as to prevent and/or detect crime. However, an identified network may not be the one causing most harm in a given area.. This paper identifies a methodology to identify all of the criminal networks that are present within a Law Enforcement Area, and, prioritises those that are causing most harm to the community. Each crime is allocated a score based on its crime type and how recently the crime was committed; the network score, which can be used as decision support to help prioritise it for law enforcement purposes, is the sum of the individual crime scores.