900 resultados para Information privacy law
Resumo:
This article aims to provide courts and policymakers with an analytical framework that, building upon the traditional rationales of IP exhaustion doctrine, identifies factors which advocate for a modulation or flexibilization of the role of exhaustion in copyright law. Factors include (i) the personal features of acquirers of copies of copyrighted works, distinguishing between consumers and commercial users; (ii) whether post-sale restrictions have been adequately communicated to acquirers and have been agreed in the contract or license; (iii) the degree of complexity of the acquired goods and their prospects of productive uses and interoperability; (iv) the role of other exclusive rights in providing rightholders with indirect control over uses of the copies in the aftermarket; (v) the impact of post-sale restraints in preventing opportunism in long-term contracts and in reducing deadweight losses created by IP pricing; and (vi) the temporal scope of post-sale restraints. After setting out this analytical framework, the ECJ Judgement in Oracle v. UsedSoft is discussed.
Resumo:
The mathematical models of the complex reality are texts belonging to a certain literature that is written in a semi-formal language, denominated L(MT) by the authors whose laws linguistic mathematics have been previously defined. This text possesses linguistic entropy that is the reflection of the physical entropy of the processes of real world that said text describes. Through the temperature of information defined by Mandelbrot, the authors begin a text-reality thermodynamic theory that drives to the existence of information attractors, or highly structured point, settling down a heterogeneity of the space text, the same one that of ontologic space, completing the well-known law of Saint Mathew, of the General Theory of Systems and formulated by Margalef saying: “To the one that has more he will be given, and to the one that doesn't have he will even be removed it little that it possesses.
Resumo:
National Highway Traffic Safety Administration, Office of Driver and Pedestrian Research, Washington, D.C.
Resumo:
National Highway Traffic Safety Administration, Washington, D.C.
Resumo:
"March 1970."
Resumo:
"Printed for the use of the Office of the Secretary of the Senate."
Resumo:
A major inhibitor to e-commerce stems from the reluctance consumers have to complete transactions because of concern over the use of private information divulged in online transaction processing. Because e-commerce occurs in a global environment, cultural factors are likely to have a significant impact on this concern. Building on work done in the area of culture and privacy, and also trust and privacy, we explore the three way relationship between culture, privacy and trust. Better, more appropriate, and contemporary measures of culture have recently been espoused, and a better understanding and articulation of internet users information privacy concern has been developed. We present the results of an exploratory study that builds on the work of Milberg, Gefen, and Bellman to better understand and test the effect that national culture has on trust and internet privacy.
Resumo:
If we classify variables in a program into various security levels, then a secure information flow analysis aims to verify statically that information in a program can flow only in ways consistent with the specified security levels. One well-studied approach is to formulate the rules of the secure information flow analysis as a type system. A major trend of recent research focuses on how to accommodate various sophisticated modern language features. However, this approach often leads to overly complicated and restrictive type systems, making them unfit for practical use. Also, problems essential to practical use, such as type inference and error reporting, have received little attention. This dissertation identified and solved major theoretical and practical hurdles to the application of secure information flow. ^ We adopted a minimalist approach to designing our language to ensure a simple lenient type system. We started out with a small simple imperative language and only added features that we deemed most important for practical use. One language feature we addressed is arrays. Due to the various leaking channels associated with array operations, arrays have received complicated and restrictive typing rules in other secure languages. We presented a novel approach for lenient array operations, which lead to simple and lenient typing of arrays. ^ Type inference is necessary because usually a user is only concerned with the security types for input/output variables of a program and would like to have all types for auxiliary variables inferred automatically. We presented a type inference algorithm B and proved its soundness and completeness. Moreover, algorithm B stays close to the program and the type system and therefore facilitates informative error reporting that is generated in a cascading fashion. Algorithm B and error reporting have been implemented and tested. ^ Lastly, we presented a novel framework for developing applications that ensure user information privacy. In this framework, core computations are defined as code modules that involve input/output data from multiple parties. Incrementally, secure flow policies are refined based on feedback from the type checking/inference. Core computations only interact with code modules from involved parties through well-defined interfaces. All code modules are digitally signed to ensure their authenticity and integrity. ^
Resumo:
Cette thèse s’intéresse à la protection de la vie privée informationnelle dans le contexte de la biosécurité. La biosécurité se définit comme le processus qui vise à prendre en charge, dans une optique de sécurité nationale, les menaces et dangers que représentent les épidémies de maladies infectieuses pour la santé des populations humaines et la sécurité de l’État. Notre projet remet en question l’idée selon laquelle la conduite des activités de surveillance de la santé publique implique nécessairement une diminution de la protection offerte aux renseignements personnels sur la santé. Nos recherches tendent à démontrer que la conciliation de la surveillance de la santé et la protection de la vie privée est non seulement possible, mais qu’elle est surtout nécessaire. Nous portons plus précisément notre attention sur le cas de la collecte et de l’utilisation de renseignements dépersonnalisés sur la santé par les systèmes de surveillance syndromique. Bien calibrée et soigneusement réglementée, cette forme novatrice et particulière de surveillance offrirait le double avantage de réduire les risques d’atteintes à la vie privée des individus et d’augmenter de manière considérable l’efficacité des capacités étatiques en matière de détection des épidémies.
Resumo:
Cette thèse s’intéresse à la protection de la vie privée informationnelle dans le contexte de la biosécurité. La biosécurité se définit comme le processus qui vise à prendre en charge, dans une optique de sécurité nationale, les menaces et dangers que représentent les épidémies de maladies infectieuses pour la santé des populations humaines et la sécurité de l’État. Notre projet remet en question l’idée selon laquelle la conduite des activités de surveillance de la santé publique implique nécessairement une diminution de la protection offerte aux renseignements personnels sur la santé. Nos recherches tendent à démontrer que la conciliation de la surveillance de la santé et la protection de la vie privée est non seulement possible, mais qu’elle est surtout nécessaire. Nous portons plus précisément notre attention sur le cas de la collecte et de l’utilisation de renseignements dépersonnalisés sur la santé par les systèmes de surveillance syndromique. Bien calibrée et soigneusement réglementée, cette forme novatrice et particulière de surveillance offrirait le double avantage de réduire les risques d’atteintes à la vie privée des individus et d’augmenter de manière considérable l’efficacité des capacités étatiques en matière de détection des épidémies.
Resumo:
Cet essai est présenté en tant que mémoire de maîtrise dans le cadre du programme de droit des technologies de l’information. Ce mémoire traite de différents modèles d’affaires qui ont pour caractéristique commune de commercialiser les données dans le contexte des technologies de l’information. Les pratiques commerciales observées sont peu connues et l’un des objectifs est d’informer le lecteur quant au fonctionnement de ces pratiques. Dans le but de bien situer les enjeux, cet essai discutera d’abord des concepts théoriques de vie privée et de protection des renseignements personnels. Une fois ce survol tracé, les pratiques de « data brokerage », de « cloud computing » et des solutions « analytics » seront décortiquées. Au cours de cette description, les enjeux juridiques soulevés par chaque aspect de la pratique en question seront étudiés. Enfin, le dernier chapitre de cet essai sera réservé à deux enjeux, soit le rôle du consentement et la sécurité des données, qui ne relèvent pas d’une pratique commerciale spécifique, mais qui sont avant tout des conséquences directes de l’évolution des technologies de l’information.
Resumo:
Cet essai est présenté en tant que mémoire de maîtrise dans le cadre du programme de droit des technologies de l’information. Ce mémoire traite de différents modèles d’affaires qui ont pour caractéristique commune de commercialiser les données dans le contexte des technologies de l’information. Les pratiques commerciales observées sont peu connues et l’un des objectifs est d’informer le lecteur quant au fonctionnement de ces pratiques. Dans le but de bien situer les enjeux, cet essai discutera d’abord des concepts théoriques de vie privée et de protection des renseignements personnels. Une fois ce survol tracé, les pratiques de « data brokerage », de « cloud computing » et des solutions « analytics » seront décortiquées. Au cours de cette description, les enjeux juridiques soulevés par chaque aspect de la pratique en question seront étudiés. Enfin, le dernier chapitre de cet essai sera réservé à deux enjeux, soit le rôle du consentement et la sécurité des données, qui ne relèvent pas d’une pratique commerciale spécifique, mais qui sont avant tout des conséquences directes de l’évolution des technologies de l’information.
Resumo:
A number of laws in Canada which uphold rights are referred to as quasi-constitutional by the courts in recognition of their special importance. Quasi-constitutional statutes are enacted through the regular legislative process, although they are being interpreted and applied in a fashion which has become remarkably similar to constitutional law, and are therefore having an important affect over other legislation. Quasi-constitutionality has surprisingly received limited scholarly attention, and very few serious attempts at explaining its significance have been made. This dissertation undertakes a comprehensive study of quasi-constitutionality which considers its theoretical basis, its interpretation and legal significance, as well as its similarities to comparable forms of law in other Commonwealth jurisdictions. Part I examines the theoretical basis of quasi-constitutionality and its relationship to the Constitution. As a statutory and common law form of fundamental law, quasi-constitutionality is shown to signify an association with the Canadian Constitution and the foundational principles that underpin it. Part II proceeds to consider the special rules of interpretation applied to quasi-constitutional legislation, the basis of this interpretative approach, and the connection between the interpretation of similar provisions in quasi-constitutional legislation and the Constitution. As a statutory form of fundamental law, quasi-constitutional legislation is given a broad, liberal and purposive interpretation which significantly expands the rights which they protect. The theoretical basis of this approach is found in both the fundamental nature of the rights upheld by quasi-constitutional legislation as well as legislative intent. Part III explores how quasi-constitutional statutes affect the interpretation of regular legislation and how they are used for the purposes of judicial review. Quasi-constitutional legislation has a significant influence over regular statutes in the interpretative exercise, which in some instances results in conflicting statutes being declared inoperable. The basis of this form of judicial review is demonstrated to be rooted in statutory interpretation, and as such it provides an interesting model of rights protection and judicial review that is not conflated to constitutional and judicial supremacy.
Resumo:
Trata-se de estudo que procurou conhecer como o usuário do Programa Saúde da Família (PSF) percebe o direito à privacidade e à confidencialidade de suas informações reveladas ao agente comunitário de saúde (ACS) e como relaciona a visita domiciliar ao seu direito à privacidade. Estudo qualitativo, de natureza exploratória e como instrumento de investigação elaborou-se um roteiro de entrevistas semiestruturadas, com questões abertas, realizadas com usuários de uma Unidade do PSF do município de São Paulo. Os resultados mostraram que os usuários não consideram a entrada do ACS em suas residências como uma invasão à sua privacidade e que esse profissional é visto, muitas vezes, apenas como um facilitador do acesso ao serviço de saúde. Constatou-se tendência em se admitir que as informações dadas em sigilo podem ser reveladas pelo ACS. Notou-se a importância das relações de gênero e do cuidado quando da revelação de determinadas condições de saúde. Enfermidades como AIDS, tuberculose, câncer, doenças da próstata e o diabetes apareceram como doenças que podem causar preconceito e, nesse sentido, não deveriam ser reveladas ao ACS, a não ser pela necessidade do acesso mais rápido às consultas médicas. Pareceu, ainda, haver certa passividade do usuário em relação à percepção da falta de respeito ao sigilo das suas informações.
Resumo:
Objectives: Main Objective: to identify ethical problems in primary care according to nurses` and doctors` perceptions. Secondary Objective: to know ethical issues of patient-professional relationships in primary care. Design: Synthesis to integrate and reinterpret primary results of qualitative studies. Setting: Primary healthcare centers, Sao Paulo, SP, Brazil. Participants and/or context: Incidental sample of 34 nurses and 36 medical doctors working in primary healthcare centers selected by convenience. Methods: Individual, semi-structured interviews to identity situations considered as sources of ethical problems. The sample is socially representative of primary care health centers and professionals. Data collection assured discourse saturation. Hermeneutic-dialectical discourse analysis was used to study the results. Results: Patient-professional relationships and team work were the main sources of ethical problems. The most important problems were patient information, privacy, confidentiality, interpersonal relationship, linkage and patient autonomy. These issues reflect the recent changes in clinical relation ships and show the peculiarities of primary care with its continuous care which lasts a long time. Healthcare involves multiprofessional team work in the midst of the patient claims for autonomy. Good care of patients needs requires a relationship based on communication and cooperation, and includes feelings and values, with communication skills. Conclusions: Ethical problems in primary care are common situations. For quality and humane primary care the relationship should consist of dialogue, trust and cooperation. (C) 2009 Elsevier Espana, S.L. All rights reserved.