949 resultados para data protection reform, data protection


Relevância:

60.00% 60.00%

Publicador:

Resumo:

The deleterious effect of superoxide radicals on cell growth and survival is predominately caused by rapid oxidation of labile [Fe-S] clusters in proteins. Oxidation of these clusters releases Fe(II) ions, which participate in Fenton chemistry that damages DNA. Here it is shown that elevated levels of the YggX protein increase the resistance of Salmonella enterica to superoxide stress, reverse enzymatic defects attributed to oxidized [Fe-S] clusters, and decrease the spontaneous mutation frequency. The data are consistent with a model in which YggX protects protein [Fe-S] clusters from oxidation.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The revelation of the top-secret US intelligence-led PRISM Programme has triggered wide-ranging debates across Europe. Press reports have shed new light on the electronic surveillance ‘fishing expeditions’ of the US National Security Agency and the FBI into the world’s largest electronic communications companies. This Policy Brief by a team of legal specialists and political scientists addresses the main controversies raised by the PRISM affair and the policy challenges that it poses for the EU. Two main arguments are presented: First, the leaks over the PRISM programme have undermined the trust that EU citizens have in their governments and the European institutions to safeguard and protect their privacy; and second, the PRISM affair raises questions regarding the capacity of EU institutions to draw lessons from the past and to protect the data of its citizens and residents in the context of transatlantic relations. The Policy Brief puts forward a set of policy recommendations for the EU to follow and implement a robust data protection strategy in response to the affair.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

L’évolution continue des besoins d’apprentissage vers plus d’efficacité et plus de personnalisation a favorisé l’émergence de nouveaux outils et dimensions dont l’objectif est de rendre l’apprentissage accessible à tout le monde et adapté aux contextes technologiques et sociaux. Cette évolution a donné naissance à ce que l’on appelle l'apprentissage social en ligne mettant l'accent sur l’interaction entre les apprenants. La considération de l’interaction a apporté de nombreux avantages pour l’apprenant, à savoir établir des connexions, échanger des expériences personnelles et bénéficier d’une assistance lui permettant d’améliorer son apprentissage. Cependant, la quantité d'informations personnelles que les apprenants divulguent parfois lors de ces interactions, mène, à des conséquences souvent désastreuses en matière de vie privée comme la cyberintimidation, le vol d’identité, etc. Malgré les préoccupations soulevées, la vie privée en tant que droit individuel représente une situation idéale, difficilement reconnaissable dans le contexte social d’aujourd’hui. En effet, on est passé d'une conceptualisation de la vie privée comme étant un noyau des données sensibles à protéger des pénétrations extérieures à une nouvelle vision centrée sur la négociation de la divulgation de ces données. L’enjeu pour les environnements sociaux d’apprentissage consiste donc à garantir un niveau maximal d’interaction pour les apprenants tout en préservant leurs vies privées. Au meilleur de nos connaissances, la plupart des innovations dans ces environnements ont porté sur l'élaboration des techniques d’interaction, sans aucune considération pour la vie privée, un élément portant nécessaire afin de créer un environnement favorable à l’apprentissage. Dans ce travail, nous proposons un cadre de vie privée que nous avons appelé « gestionnaire de vie privée». Plus précisément, ce gestionnaire se charge de gérer la protection des données personnelles et de la vie privée de l’apprenant durant ses interactions avec ses co-apprenants. En s’appuyant sur l’idée que l’interaction permet d’accéder à l’aide en ligne, nous analysons l’interaction comme une activité cognitive impliquant des facteurs contextuels, d’autres apprenants, et des aspects socio-émotionnels. L'objectif principal de cette thèse est donc de revoir les processus d’entraide entre les apprenants en mettant en oeuvre des outils nécessaires pour trouver un compromis entre l’interaction et la protection de la vie privée. ii Ceci a été effectué selon trois niveaux : le premier étant de considérer des aspects contextuels et sociaux de l’interaction telle que la confiance entre les apprenants et les émotions qui ont initié le besoin d’interagir. Le deuxième niveau de protection consiste à estimer les risques de cette divulgation et faciliter la décision de protection de la vie privée. Le troisième niveau de protection consiste à détecter toute divulgation de données personnelles en utilisant des techniques d’apprentissage machine et d’analyse sémantique.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In the wake of the disclosures surrounding PRISM and other US surveillance programmes, this paper assesses the large-scale surveillance practices by a selection of EU member states: the UK, Sweden, France, Germany and the Netherlands. Given the large-scale nature of these practices, which represent a reconfiguration of traditional intelligence gathering, the paper contends that an analysis of European surveillance programmes cannot be reduced to a question of the balance between data protection versus national security, but has to be framed in terms of collective freedoms and democracy. It finds that four of the five EU member states selected for in-depth examination are engaging in some form of large-scale interception and surveillance of communication data, and identifies parallels and discrepancies between these programmes and the NSA-run operations. The paper argues that these programmes do not stand outside the realm of EU intervention but can be analysed from an EU law perspective via i) an understanding of national security in a democratic rule of law framework where fundamental human rights and judicial oversight constitute key norms; ii) the risks posed to the internal security of the Union as a whole as well as the privacy of EU citizens as data owners and iii) the potential spillover into the activities and responsibilities of EU agencies. The paper then presents a set of policy recommendations to the European Parliament.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This paper examines the challenges facing the EU regarding data retention, particularly in the aftermath of the judgment Digital Rights Ireland by the Court of Justice of the European Union (CJEU) of April 2014, which found the Data Retention Directive 2002/58 to be invalid. It first offers a brief historical account of the Data Retention Directive and then moves to a detailed assessment of what the judgment means for determining the lawfulness of data retention from the perspective of the EU Charter of Fundamental Rights: what is wrong with the Data Retention Directive and how would it need to be changed to comply with the right to respect for privacy? The paper also looks at the responses to the judgment from the European institutions and elsewhere, and presents a set of policy suggestions to the European institutions on the way forward. It is argued here that one of the main issues underlying the Digital Rights Ireland judgment has been the role of fundamental rights in the EU legal order, and in particular the extent to which the retention of metadata for law enforcement purposes is consistent with EU citizens’ right to respect for privacy and to data protection. The paper offers three main recommendations to EU policy-makers: first, to give priority to a full and independent evaluation of the value of the data retention directive; second, to assess the judgment’s implications for other large EU information systems and proposals that provide for the mass collection of metadata from innocent persons, in the EU; and third, to adopt without delay the proposal for Directive COM(2012)10 dealing with data protection in the fields of police and judicial cooperation in criminal matters.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In order to evaluate the success of a society, measuring well-being might be a fruitful avenue. For a long time, governments have trusted economic measures, Gross Domestic Product (GDP) in particular, to assess their success. However GDP is only a limited measure of economic success, which is not enough to show whether policies implemented by governments have a positive perceived impact on the people they represent. This paper belongs to the studies of the relationship between measures of well-being and economic factors. More precisely, it tries to evaluate the decrease in happiness and life satisfaction that can be observed in European countries in the 2000-2010 decade. It asks whether this deterioration is mainly due to microeconomic factors, such as income and individual characteristics, or rather to environmental (macroeconomics) factors such as unemployment, inflation or income inequality. Such aggregate factors could impact individual happiness per se because they are related to the perception of an aggregate risk of unemployment or income fall. In order to strengthen this interpretation, this paper checks whether the type of social protection regime existing in different countries mediates the impact of macroeconomic volatility on individual well-being. To go further, adopting the classification of welfare regimes proposed by Esping-Andersen (1990), it verifies whether the decreasing pattern of subjective well-being varies across these regimes. This is partly due to the aggregate social protection expenditure. Hence, this paper brings some additional evidence to the idea that macroeconomic uncertainty has a cost in terms of well-being. More protective social regimes are able to reduce this cost. It also proposes an evaluation of the welfare cost of unemployment and inflation (in terms of happiness and life satisfaction), in each of the different social protection regimes. Finally different measures of well-being, i.e. cognitive, hedonic and eudaimonic, are used to confirm the above mentioned result.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In its recent Schrems judgment the Luxembourg Court annulled Commission Decision 2000/520 according to which US data protection rules are sufficient to satisfy EU privacy rules regarding EU-US transfers of personal data, otherwise known as the ‘Safe Harbour’ framework. What does this judgment mean and what are its main implications for EU-US data transfers? In this paper the authors find that this landmark judgment sends a strong message to EU and US policy-makers about the need to ensure clear rules governing data transfers, so that people whose personal data is transferred to third countries have sufficient legal guarantees. Without such rules there is legal uncertainty and mistrust. Any future arrangement for the transatlantic transfer of data will therefore need to be firmly anchored in a framework of protection commensurate to the EU Charter of Fundamental Rights and the EU data protection architecture.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

BACKGROUND Intravenous immunoglobulin (IVIG) proved to be an efficient anti-inflammatory treatment for a growing number of neuroinflammatory diseases and protects against the development of experimental autoimmune encephalomyelitis (EAE), a widely used animal model for multiple sclerosis (MS). METHODS The clinical efficacy of IVIG and IVIG-derived F(ab')2 fragments, generated using the streptococcal cysteine proteinase Ide-S, was evaluated in EAE induced by active immunization and by adoptive transfer of myelin-specific T cells. Frequency, phenotype, and functional characteristics of T cell subsets and myeloid cells were determined by flow cytometry. Antibody binding to microbial antigen and cytokine production by innate immune cells was assessed by ELISA. RESULTS We report that the protective effect of IVIG is lost in the adoptive transfer model of EAE and requires prophylactic administration during disease induction. IVIG-derived Fc fragments are not required for protection against EAE, since administration of F(ab')2 fragments fully recapitulated the clinical efficacy of IVIG. F(ab')2-treated mice showed a substantial decrease in splenic effector T cell expansion and cytokine production (GM-CSF, IFN-γ, IL-17A) 9 days after immunization. Inhibition of effector T cell responses was not associated with an increase in total numbers of Tregs but with decreased activation of innate myeloid cells such as neutrophils, monocytes, and dendritic cells. Therapeutically effective IVIG-derived F(ab')2 fragments inhibited adjuvant-induced innate immune cell activation as determined by IL-12/23 p40 production and recognized mycobacterial antigens contained in Freund's complete adjuvant which is required for induction of active EAE. CONCLUSIONS Our data indicate that F(ab')2-mediated neutralization of adjuvant contributes to the therapeutic efficacy of anti-inflammatory IgG. These findings might partly explain the discrepancy of IVIG efficacy in EAE and MS.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

L’évolution continue des besoins d’apprentissage vers plus d’efficacité et plus de personnalisation a favorisé l’émergence de nouveaux outils et dimensions dont l’objectif est de rendre l’apprentissage accessible à tout le monde et adapté aux contextes technologiques et sociaux. Cette évolution a donné naissance à ce que l’on appelle l'apprentissage social en ligne mettant l'accent sur l’interaction entre les apprenants. La considération de l’interaction a apporté de nombreux avantages pour l’apprenant, à savoir établir des connexions, échanger des expériences personnelles et bénéficier d’une assistance lui permettant d’améliorer son apprentissage. Cependant, la quantité d'informations personnelles que les apprenants divulguent parfois lors de ces interactions, mène, à des conséquences souvent désastreuses en matière de vie privée comme la cyberintimidation, le vol d’identité, etc. Malgré les préoccupations soulevées, la vie privée en tant que droit individuel représente une situation idéale, difficilement reconnaissable dans le contexte social d’aujourd’hui. En effet, on est passé d'une conceptualisation de la vie privée comme étant un noyau des données sensibles à protéger des pénétrations extérieures à une nouvelle vision centrée sur la négociation de la divulgation de ces données. L’enjeu pour les environnements sociaux d’apprentissage consiste donc à garantir un niveau maximal d’interaction pour les apprenants tout en préservant leurs vies privées. Au meilleur de nos connaissances, la plupart des innovations dans ces environnements ont porté sur l'élaboration des techniques d’interaction, sans aucune considération pour la vie privée, un élément portant nécessaire afin de créer un environnement favorable à l’apprentissage. Dans ce travail, nous proposons un cadre de vie privée que nous avons appelé « gestionnaire de vie privée». Plus précisément, ce gestionnaire se charge de gérer la protection des données personnelles et de la vie privée de l’apprenant durant ses interactions avec ses co-apprenants. En s’appuyant sur l’idée que l’interaction permet d’accéder à l’aide en ligne, nous analysons l’interaction comme une activité cognitive impliquant des facteurs contextuels, d’autres apprenants, et des aspects socio-émotionnels. L'objectif principal de cette thèse est donc de revoir les processus d’entraide entre les apprenants en mettant en oeuvre des outils nécessaires pour trouver un compromis entre l’interaction et la protection de la vie privée. ii Ceci a été effectué selon trois niveaux : le premier étant de considérer des aspects contextuels et sociaux de l’interaction telle que la confiance entre les apprenants et les émotions qui ont initié le besoin d’interagir. Le deuxième niveau de protection consiste à estimer les risques de cette divulgation et faciliter la décision de protection de la vie privée. Le troisième niveau de protection consiste à détecter toute divulgation de données personnelles en utilisant des techniques d’apprentissage machine et d’analyse sémantique.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Mode of access: Internet.