2 resultados para protection application
em Digital Peer Publishing
Resumo:
In January 2012, Poland witnessed massive protests, both in the streets and on the Internet, opposing ratification of the Anti-Counterfeiting Trade Agreement, which triggered a wave of strong anti-ACTA movements across Europe. In Poland, these protests had further far-reaching consequences, as they not only changed the initial position of the government on the controversial treaty but also actually started a public debate on the role of copyright law in the information society. Moreover, as a result of these events the Polish Ministry for Administration and Digitisation launched a round table, gathering various stakeholders to negotiate a potential compromise with regard to copyright law that would satisfy conflicting interests of various actors. This contribution will focus on a description of this massive resentment towards ACTA and a discussion of its potential reasons. Furthermore, the mechanisms that led to the extraordinary influence of the anti-ACTA movement on the governmental decisions in Poland will be analysed through the application of models and theories stemming from the social sciences. The importance of procedural justice in the copyright legislation process, especially its influence on the image of copyright law and obedience of its norms, will also be emphasised.
Resumo:
This article provides a holistic legal analysis of the use of cookies in Online Behavioural Advertising. The current EU legislative framework is outlined in detail, and the legal obligations are examined. Consent and the debates surrounding its implementation form a large portion of the analysis. The article outlines the current difficulties associated with the reliance on this requirement as a condition for the placing and accessing of cookies. Alternatives to this approach are explored, and the implementation of solutions based on the application of the Privacy by Design and Privacy by Default concepts are presented. This discussion involves an analysis of the use of code and, therefore, product architecture to ensure adequate protections.