745 resultados para patron privacy


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Muito se tem falado sobre revolução tecnológica e do aparecimento constante de novas aplicações Web, com novas funcionalidades que visam facilitar o trabalho dos utilizadores. Mas será que estas aplicações garantem que os dados transmitidos são tratados e enviados por canais seguros (protocolos)? Que garantias é que o utilizador tem que mesmo que a aplicação utilize um canal, que prevê a privacidade e integridade de dados, esta não apresente alguma vulnerabilidade pondo em causa a informação sensível do utilizador? Software que não foi devidamente testado, aliado à falta de sensibilização por parte dos responsáveis pelo desenvolvimento de software para questões de segurança, levam ao aumento de vulnerabilidades e assim exponenciam o número de potenciais vítimas. Isto aliado ao efeito de desinibição que o sentimento de invisibilidade pode provocar, conduz ao facilitismo e consequentemente ao aumento do número de vítimas alvos de ataques informáticos. O utilizador, por vezes, não sabe muito bem do que se deve proteger, pois a confiança que depõem no software não pressupõem que os seus dados estejam em risco. Neste contexto foram recolhidos dados históricos relativos a vulnerabilidades nos protocolos SSL/TLS, para perceber o impacto que as mesmas apresentam e avaliar o grau de risco. Para além disso, foram avaliados um número significativo de domínios portugueses para perceber se os mesmos têm uma vulnerabilidade específica do protocolo SSL/TLS.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

De el estúdio de 195 exudados vaginales enviados por el Servicio de Ginecologia de este hospital, durante el período 1988-1990, hemos seleccionado aquellos en los que el cultivo fue positivo para estreptococos, 58 (30%) de los cuales 26 (44.8%) correspondia a Streptococcus morbillorum, 9 (15.5%) a Gardnerella vaginalis, 5 (8.6%) a Enterococcus faecalis-durans, y a Streptococcus agalactiae, 3 (5.1%) a Streptococcus mitis y Streptococcus mitis, 2 (3-4%) a Streptococcus bovis y Streptococcus cremoris y 1 (1.7%) a Streptococcus salivarius, Streptococcus equinus y Strptococcus sanguis II respectivamente. En todos los casos se observo antecedentes de actuacción medico- quirurjica en el tracto genital, y en el 52.8% de los casos fuô concomitante con el diagnostico clinico-micologico de candidiasis vaginal. La ideittificaccion bacteriologica se realizo mediante el sistema API 20 STREP (sistema api bioMêríeux GmbH, Nütingen, Alemania) dando un patron tipico ("excelente identificacción") para el Streptococcus morbillorum.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dissertação para obtenção do Grau de Doutora em Estatística e Gestão de Risco, Especialidade em Estatística

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This dissertation focuses on a rare 15th century commemorative programme that has thus far received little scholarly attention: the collective monument erected in the Founder’s Chapel, at the Monastery of Santa Maria da Vitória, Batalha, to house the remains of four Avis princes, members of what would become known as ‘the Illustrious Generation’. A patron is proposed for the commission of this erudite monument - the princes’ eldest brother, king Duarte I - arguing its integration into a broader propaganda programme to glorify the memory of the Avis dynasty founder, king João I. The dissertation then proceeds to discuss various highly innovative features of the monument, such as its pseudo-architectural character, its use of sophisticated heraldry and personal badges, the apparent absence of religious iconography on the tombs and, importantly, the collective nature of the programme, key to its interpretation. Using a semiotic approach, a discussion is also offered on the way the various formal, iconographic and conceptual novelties of the princes’ monument impacted on the 15th century monumental landscape in Portugal. Finally, the monument and the chapel housing it are looked at through the prism of the various readings that successive generations of viewers have projected onto it, from the time of its creation to the turn of the 20th century, in order to offer a more comprehensive understanding of the object as it stands today.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Based on a comparative analysis of celebrity magazines in Portugal and Brazil, this article analyses the representation of children of celebrities. Those magazines privilege an extreme personalisation of the stories and a strong valuation of the photographic image, representing children as a source of happiness and affection within the family. Nonetheless, drawing on celebrity studies and on children’s rights and their implications for journalism, we concluded that this positive representation frequently collides with the children’s rights to privacy, to be protected from public embarrassment and to be heard in the issues that affect them.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recordings and photographs obtained by private individuals can be two of the most relevant evidences in helping finding the truth; however, they can also conflict with fundamental rights such as privacy, spoken word or image of the targets. It is not enough that only the violation of the right to privacy is withdrawn because rights to spoken word or image, unattached from the first one, show up independently as the main violated rights and are criminally protected in article 199º of the criminal code. Its use as evidence is, on a first moment, dependent on the private's conduct lawfulness, as it is stated in article 167º of the criminal procedure code. In order to consider its lawfulness, and accept its use as evidence, portuguese higher courts have been defending constructions mostly based on legal causes of defense. Although agreeing with a more flexible position of weighing all the interests at stake instead of denying its use as evidence, we believe notwithstanding that some of these solutions are misleading and shall not be spared from critics. Lastly, even if we reach a positive conclusion about the lawfulness of obtaining and using recordings and photogtaphs carried out to court by private individuals, they must not be however automatically admitted as evidence, still being necessary to proceed to a separate weighting, within the criminal procedure and its own legal rules, about their real purposes in the case.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Online data collection is becoming increasingly common and has some advantages compared to traditional paper-and-pencil formats, such as reducing loss of data, increasing participants' privacy, and decreasing the effect of social desirability. However, the validity and reliability of this administration format must be established before results can be considered acceptable. The aim of this study was to evaluate the validity, reliability, and equivalence of paper-and-pencil and online versions of the Weight Concerns Scale (WCS) when applied to Brazilian university students. A crossover design was used, and the Portuguese version of the WCS (in both paper-and-pencil and online formats) was completed by 100 college students. The results indicated adequate fit in both formats. The simultaneous fit of data for both groups was excellent, with strong invariance between models. Adequate convergent validity, internal consistency, and mean score equivalence of the WCS in both formats were observed. Thus, the WCS presented adequate reliability and validity in both administration formats, with equivalence/stability between answers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

RESUMO - Os registos de enfermagem no Centro Hospitalar Lisboa Norte, E.P.E. (CHLN) são feitos em suporte de papel ou através de sistemas de informação (SI) próprios de cada serviço, com a utilização de várias aplicações como o Alert, Picis, etc. Esta diversidade gera alguns constrangimentos em termos de fluxo de informação, em virtude da falta de interoperabilidade dos respetivos sistemas. Esta realidade pode ter impactos na área da qualidade e segurança do utente, com a possibilidade de ocorrência de erros e/ou eventos adversos. Podem ainda ser notórios na área da privacidade e confidencialidade dos dados clínicos, na tomada de decisão, na gestão clínica e financeira e na produção de informação útil para a investigação científica. No CHLN está em curso a implementação de um SI capaz de dar resposta aos registos de enfermagem, integrados num registo de saúde eletrónico focado no utente que obedece à metodologia do processo de enfermagem e utiliza a linguagem codificada da Classificação Internacional para a Prática de Enfermagem (CIPE). Com o desenvolvimento desta investigação, devidamente autorizada pelo Conselho de Administração do CHLN, pretendeu-se dar resposta à pergunta de partida:  Estarão os enfermeiros, utilizadores do Desktop de Enfermagem do CHLN, satisfeitos com esse sistema de informação? Com esse propósito, foi elaborada uma abordagem exploratória com recurso a pesquisa bibliográfica sobre os sistemas de informação de enfermagem e a sua avaliação, com base no “Modelo de Sucesso dos Sistemas de Informação de DeLone e McLean”, tendo sido desenvolvido um estudo de caso com uma abordagem quantitativa, mediante a aplicação de um inquérito por questionário aos 262 enfermeiros do CHLN, nos serviços onde já utilizavam o referido SI, entre maio e junho de 2014, com uma taxa de resposta de 84%. Os resultados da aplicação do questionário, objeto de análise estatística univariada e bivariada com recurso a procedimentos descritivos e inferenciais, visando a produção de sínteses dirigidas aos objetivos do estudo, permitiram caracterizar o nível de satisfação dos enfermeiros, enquanto utilizadores do “desktop de enfermagem”, suportados por Tecnologias de Informação e Comunicação. Na escala utilizada (de 1 a 5), o nível médio de satisfação global (2,78) foi ligeiramente inferior ao seu ponto médio (3). No entanto, a maioria dos inquiridos (81,5%) não pretende abandonar o SI que utilizam. Os resultados obtidos permitem demonstrar que a satisfação dos enfermeiros face à implementação e utilização do SIE se trata de uma estratégia bem sucedida do CHLN, ainda que haja áreas onde foram evidenciados menores níveis de satisfação, tais como a “velocidade de processamento”, o “equipamento informático” e o “apoio técnico”, que podem ser alvo de uma maior atenção e reflexão pela gestão de topo, numa estratégia de melhoria contínua da qualidade, com importantes benefícios para a governação da instituição, para os profissionais e para os utentes, no futuro.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tax evasion and fraud threaten the economic and social objectives of modern tax systems, precluding the state funding for the satisfaction of collective needs and the fair distribution of wealth, being a violation of basic principles and values of our society. In tax law, to give tax administration the necessary powers to supervise and control the information provided by taxpayers and combat tax evasion and fraud, over the last years the grounds for a derogation of bank secrecy without judicial authorization have been extended, which raises some constitutional compatibility issues. Similarly, this tendency of making this legal regime more flexible and increasing automatic exchange of information has been followed by the European Union and the international community. Banking secrecy, as a professional secrecy, is an instrument to protect the right to privacy but also appears as an anti-abuse and repressive mechanism of evasive and fraudulent behaviors. Because of the conflict of interests will always be necessary to make a practical agreement between them, ensuring the legality and the due guarantees of the taxpayers but also an effective way to combat tax evasion and fraud. Bank secrecy cannot be one method to, behind the right to privacy, taxpayers practice illegal activities. But the practice of these irregular conducts also does not justify a total annihilation of the right to banking secrecy, uncovering all documents and bank information’s. Although considering the legislative changes, the administrative derogation of bank secrecy will always be what the tax administration does of it.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In these days, Internet and social media represent a big advance in communication. Using the internet brings people a lot of benefits and facilities, but with them comes risks and problems that are turning the line between public and private life smaller. The frequent use of internet and the unbridled use of it we see nowadays on its utilization brings problems related to people privacy, and the dividing line between private and public life is becoming more blurred and admitting the employer intromission on employee’s private life. So, it assumes the largest importance understand in which way this employee’s on exposure on social media brings problems and risks to employment relationship and establish some criteria in order to decide what needs legal protection. But should we affirm that protection when the employee’s publications on social media brings problems to the employer or the company? We think, in these cases, and considering some facts, employee’s private life should cede before the employer’s rights.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Images have gained a never before seen importance. Technological changes have given the Information Society extraordinary means to capture, treat and transmit images, wheter your own or those of others, with or without a commercial purpose, with no boundaries of time or country, without “any kind of eraser”. From the several different ways natural persons may engage in image processing with no commercial purpose, the cases of sharing pictures through social networks and video surveillance assume particular relevance. Consequently there are growing legitimate concerns with the protection of one's image, since its processing may sometimes generate situations of privacy invasion or put at risk other fundamental rights. With this in mind, the present thesis arises from the question: what are the existent legal instruments in Portuguese Law that enable citizens to protect themselves from the abusive usage of their own pictures, whether because that image have been captured by a smartphone or some video surveillance camera, whether because it was massively shared through a blog or some social network? There is no question the one's right to not having his or her image used in an abusive way is protected by the Portuguese constitution, through the article 26th CRP, as well as personally right, under the article 79th of the Civil Code, and finally through criminal law, articles 192nd and 193rd of the Criminal Code. The question arises in the personal data protection context, considering that one's picture, given certain conditions, is personal data. Both the Directive 95/46/CE dated from 1995 as well as the LPD from 1998 are applicable to the processing of personal data, but both exclude situations of natural persons doing so in the pursuit of activities strictly personal or family-related. These laws demand complex procedures to natural persons, such as the preemptive formal authorisation request to the Data Protection National Commission. Failing to do so a natural person may result in the application of fines as high as €2.500,00 or even criminal charges. Consequently, the present thesis aims to study if the image processing with no commercial purposes by a natural person in the context of social networks or through video surveillance belongs to the domain of the existent personal data protection law. To that effect, it was made general considerations regarding the concept of video surveillance, what is its regimen, in a way that it may be distinguishable from Steve Mann's definition of sousveillance, and what are the associated obligations in order to better understand the concept's essence. The application of the existent laws on personal data protection to images processing by natural persons has been analysed taking into account the Directive 95/46/CE, the LPD and the General Regulation. From this analysis it is concluded that the regimen from 1995 to 1998 is out of touch with reality creating an absence of legal shielding in the personal data protection law, a flaw that doesn't exist because compensated by the right to image as a right to personality, that anyway reveals the inability of the Portuguese legislator to face the new technological challenges. It is urgent to legislate. A contrary interpretation will evidence the unconstitutionality of several rules on the LPD due to the obligations natural persons are bound to that violate the right to the freedom of speech and information, which would be inadequate and disproportionate. Considering the recently approved General Regulation and in the case it becomes the final version, the use for natural person of video surveillance of private spaces, Google Glass (in public and private places) and other similar gadgets used to recreational purposes, as well as social networks are subject to its regulation only if the images are shared without limits or existing commercial purposes. Video surveillance of public spaces in all situations is subject to General Regulation provisions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The emergence of new technologies has introduced significant changes in the citizens life’s. There is a constant evolution of technological means and profound impact of their use in the habits of life of the human being. These new technological media are important tools in labor relations. The working and businesses worlds are increasingly turning to these new technologies, so that the use of video surveillance in the workplace is nowadays common. New technologies in general and the use of video surveillance in workplace in particular are providing ways to allow control of the work performance that are desired by most employers. However, the collection of images in the workplace often collides with the fundamental rights and freedoms of workers, in particular, with the right to privacy. The subject concerns the question of investigating is whether the images collected in workplace can be used as evidence in disciplinary proceedings. In fact, this issue is controversial. Doctrine and jurisprudence defend, at least, two responses for the same question. Those who understand that the evidence may be admitted for not violate any right of the worker, and others who argue that the evidence should not be admitted in disciplinary office. In the Portuguese legal system, there is, even, a new intermediate theory that begins to be defended, that only on certain occasions the evidence may be admitted. The solution to this problem involves the study of employment law and data video surveillance processing. Analysis of workers fundamental rights is fundamental to come to a grounded conclusion.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The number of houses damaged or destroyed after disasters is frequently large, and re-housing of homeless people is one of the most important tasks of reconstruction programmes. Reconstruction works often last long and during that time, it is essential to provide victims with the minimum conditions to live with dignity, privacy, and protection. This research intends to demonstrate the crucial role of temporary accommodation buildings to provide spaces where people can live and gradually resume their life until they have a permanent house. The study also aims to identify the main problems of temporary accommodation strategies and to discuss some principles and guidelines in order to reach better design solutions. It is found that temporary accommodation is an issue that goes beyond the simple provision of buildings, since the whole space for temporary settlement is important. Likewise, temporary accommodation is a process that should start before a disaster occurs, as a preventive pre-planning. In spite of being temporary constructions, these housing buildings are one of the most important elements to provide in emergency scenarios, contributing for better recovery and reconstruction actions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Security risk management is by definition, a subjective and complex exercise and it takes time to perform properly. Human resources are fundamental assets for any organization, and as any other asset, they have inherent vulnerabilities that need to be handled, i.e. managed and assessed. However, the nature that characterize the human behavior and the organizational environment where they develop their work turn these task extremely difficult, hard to accomplish and prone to errors. Assuming security as a cost, organizations are usually focused on the efficiency of the security mechanisms implemented that enable them to protect against external attacks, disregarding the insider risks, which are much more difficult to assess. All these demands an interdisciplinary approach in order to combine technical solutions with psychology approaches in order to understand the organizational staff and detect any changes in their behaviors and characteristics. This paper intends to discuss some methodological challenges to evaluate the insider threats and its impacts, and integrate them in a security risk framework, that was defined according to the security standard ISO/IEC_JTC1, to support the security risk management process.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Childhood protection is a subject with high value for the society, but, the Child Abuse cases are difficult to identify. The process from suspicious to accusation is very difficult to achieve. It must configure very strong evidences. Typically, Health Care services deal with these cases from the beginning where there are evidences based on the diagnosis, but they aren’t enough to promote the accusation. Besides that, this subject it’s highly sensitive because there are legal aspects to deal with such as: the patient privacy, paternity issues, medical confidentiality, among others. We propose a Child Abuses critical knowledge monitor system model that addresses this problem. This decision support system is implemented with a multiple scientific domains: to capture of tokens from clinical documents from multiple sources; a topic model approach to identify the topics of the documents; knowledge management through the use of ontologies to support the critical knowledge sensibility concepts and relations such as: symptoms, behaviors, among other evidences in order to match with the topics inferred from the clinical documents and then alert and log when clinical evidences are present. Based on these alerts clinical personnel could analyze the situation and take the appropriate procedures.