952 resultados para data breach notification law


Relevância:

40.00% 40.00%

Publicador:

Resumo:

The strategic management of information plays a fundamental role in the organizational management process since the decision-making process depend on the need for survival in a highly competitive market. Companies are constantly concerned about information transparency and good practices of corporate governance (CG) which, in turn, directs relations between the controlling power of the company and investors. In this context, this article presents the relationship between the disclosing of information of joint-stock companies by means of using XBRL, the open data model adopted by the Brazilian government, a model that boosted the publication of Information Access Law (Lei de Acesso à Informação), nº 12,527 of 18 November 2011. Information access should be permeated by a mediation policy in order to subsidize the knowledge construction and decision-making of investors. The XBRL is the main model for the publishing of financial information. The use of XBRL by means of new semantic standard created for Linked Data, strengthens the information dissemination, as well as creates analysis mechanisms and cross-referencing of data with different open databases available on the Internet, providing added value to the data/information accessed by civil society.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This article provides a holistic legal analysis of the use of cookies in Online Behavioural Advertising. The current EU legislative framework is outlined in detail, and the legal obligations are examined. Consent and the debates surrounding its implementation form a large portion of the analysis. The article outlines the current difficulties associated with the reliance on this requirement as a condition for the placing and accessing of cookies. Alternatives to this approach are explored, and the implementation of solutions based on the application of the Privacy by Design and Privacy by Default concepts are presented. This discussion involves an analysis of the use of code and, therefore, product architecture to ensure adequate protections.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In the wake of the disclosures surrounding PRISM and other US surveillance programmes, this paper assesses the large-scale surveillance practices by a selection of EU member states: the UK, Sweden, France, Germany and the Netherlands. Given the large-scale nature of these practices, which represent a reconfiguration of traditional intelligence gathering, the paper contends that an analysis of European surveillance programmes cannot be reduced to a question of the balance between data protection versus national security, but has to be framed in terms of collective freedoms and democracy. It finds that four of the five EU member states selected for in-depth examination are engaging in some form of large-scale interception and surveillance of communication data, and identifies parallels and discrepancies between these programmes and the NSA-run operations. The paper argues that these programmes do not stand outside the realm of EU intervention but can be analysed from an EU law perspective via i) an understanding of national security in a democratic rule of law framework where fundamental human rights and judicial oversight constitute key norms; ii) the risks posed to the internal security of the Union as a whole as well as the privacy of EU citizens as data owners and iii) the potential spillover into the activities and responsibilities of EU agencies. The paper then presents a set of policy recommendations to the European Parliament.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This study examines the challenges posed to European law by third country access to data held by private companies for the purposes of law enforcement. It pays particular attention to the implications for rule of law and fundamental rights of foreign authorities’ direct access to electronic information falling outside pre-established channels of supranational cooperation. A special focus is given to EU-US relations and the practical issues emerging in transatlantic relations covering mutual legal assistance and evidence gathering for law enforcement purposes in criminal proceedings.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Though controversial the question of applying data protection laws to biological materials has only gotten a little attention in data privacy discourse. This article aims to contribute to this dearth by arguing that despite absence of positive intention from the architects to apply the EU Data privacy law to biological materials, a range of developments in Molecular Biology and nano-technology—usually mediated by advances in ICT—may provide persuasive grounds to do so. In addition, paucity of sufficient explication of key terms like ‘data/information’ in these legislations may fuel such tendency whereby laws originally intended for the informational world may end up applying to the biological world. The article also analyzes various predicaments that may arise from applying data privacy laws to biological materials. A focus is made on legislative sources at the EU level though national laws are relied on when pertinent.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In the past decade, the utilization of ambulance data to inform the prevalence of nonfatal heroin overdose has increased. These data can assist public health policymakers, law enforcement agencies, and health providers in planning and allocating resources. This study examined the 672 ambulance attendances at nonfatal heroin overdoses in Queensland, Australia, in 2000. Gender distribution showed a typical 70/30 male-to-female ratio. An equal number of persons with nonfatal heroin overdose were between 15 and 24 years of age and 25 and 34 years of age. Police were present in only 1 of 6 cases, and 28.1% of patients reported using drugs alone. Ambulance data are proving to be a valuable population-based resource for describing the incidence and characteristics of nonfatal heroin overdose episodes. Future studies could focus on the differences between nonfatal heroin overdose and fatal heroin overdose samples.

Relevância:

30.00% 30.00%

Publicador:

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In the region of self-organized criticality (SOC) interdependency between multi-agent system components exists and slight changes in near-neighbor interactions can break the balance of equally poised options leading to transitions in system order. In this region, frequency of events of differing magnitudes exhibits a power law distribution. The aim of this paper was to investigate whether a power law distribution characterized attacker-defender interactions in team sports. For this purpose we observed attacker and defender in a dyadic sub-phase of rugby union near the try line. Videogrammetry was used to capture players’ motion over time as player locations were digitized. Power laws were calculated for the rate of change of players’ relative position. Data revealed that three emergent patterns from dyadic system interactions (i.e., try; unsuccessful tackle; effective tackle) displayed a power law distribution. Results suggested that pattern forming dynamics dyads in rugby union exhibited SOC. It was concluded that rugby union dyads evolve in SOC regions suggesting that players’ decisions and actions are governed by local interactions rules.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This report is the primary output of Project 4: Copyright and Intellectual Property, the aim of which was to produce a report considering how greater access to and use of government information could be achieved within the scope of the current copyright law. In our submission for Project 4, we undertook to address: •the policy rationales underlying copyright and how they apply in the context of materials owned, held and used by government; • the recommendations of the Copyright Law Review Committee (CLRC) in its 2005 report on Crown copyright; • the legislative and regulatory barriers to information sharing in key domains, including where legal impediments such as copyright have been relied upon (whether rightly or wrongly) to justify a refusal to provide access to government data; • copyright licensing models appropriate to government materials and examples of licensing initiatives in Australia and other relevant jurisdictions; and • issues specific to the galleries, libraries, archives and museums (“GLAM”) sector, including management of copyright in legacy materials and “orphan” works. In addressing these areas, we analysed the submissions received in response to the Government 2.0 Taskforce Issues Paper, consulted with members of the Task Force as well as several key stakeholders and considered the comments posted on the Task Force’s blog. This Project Report sets out our findings on the above issues. It puts forward recommendations for consideration by the Government 2.0 Task Force on steps that can be taken to ensure that copyright and intellectual property promote access to and use of government information.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This report provides an introduction to our analyses of secondary data with respect to violent acts and incidents relating to males living in rural settings in Australia. It clarifies important aspects of our overall approach primarily by concentrating on three elements that required early scoping and resolution. Firstly, a wide and inclusive view of violence which encompasses measures of violent acts and incidents and also data identifying risk taking behaviour and the consequences of violence is outlined and justified. Secondly, the classification used to make comparisons between the city and the bush together with associated caveats is outlined. The third element discussed is in relation to national injury data. Additional commentary resulting from exploration, examination and analyses of secondary data is published online in five subsequent reports in this series.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This report focuses on our examination of extant data which have been sourced with respect to self-harm and suicide in Australia. Moreover, specific areas of concern regarding elevated rates of suicide for rural males and data anomalies which emerged during our examination of these data are discussed. Additional commentary resulting from exploration, examination and analyses of secondary data is published online in complementary reports in this series.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This report focuses on our examination of extant data which have been sourced with respect to intentional violence perpetrated or experienced by males in regional and remote Australia. The nature of intentional violent acts can be physical, sexual or psychological or involve deprivation or neglect. We have presented under the headings of: self-harm including suicide; homicide; assault, sexual assault and the threat of assault; child abuse; other family and intimate partner violence; harassment, stalking and bullying; alcohol related social violence; and animal abuse. State variations in interpersonal violence are also presented. Additional commentary resulting from exploration, examination and analyses of secondary data is published online in complementary reports in this series.