900 resultados para Information privacy law


Relevância:

30.00% 30.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

An on-line survey of experts was conducted to solicit their views on policy priorities in the area of information and communication technologies (ICT) in the Caribbean. The experts considered the goal to “promote teacher training in the use of ICTs in the classroom” to be the highest priority, followed by goals to “reduce the cost of broadband services” and “promote the use of ICT in emergency and disaster prevention, preparedness and response.” Goals in the areas of cybercrime, e-commerce, egovernment, universal service funds, consumer protection, and on-line privacy rounded out the top 10. Some of the lowest ranked goals were those related to coordinating the management of infrastructure changes. These included the switchover for digital terrestrial television (DTT) and digital FM radio, cloud computing for government ICT, the introduction of satellite-based internet services, and the installation of content distribution networks (CDNs). Initiatives aimed at using ICT to promote specific industries, or specific means of promoting the digital economy, tended toward the centre of the rankings. Thus, a general pattern emerged which elevated the importance of focusing on how ICT is integrated into the broader society, with economic issues a lower priority, and concerns about coordination on infrastructure issues lower still.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Este artigo é parte do relatório Cybersecurity Are We Ready in Latin America and the Caribbean?

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Thesis (Master's)--University of Washington, 2016-06

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Thesis (Ph.D.)--University of Washington, 2016-06

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Using the work and ideas of French theorist Michel Foucault the writer examines s 3LA of the Crimes Act, which provides law enforcement officers with power to compel a person to reveal their private encryption keys and other personal information, and concludes that such a section creates fear, redirects flow of power between law enforcement agencies and citizens, and creates resistance.

Relevância:

30.00% 30.00%

Publicador:

Relevância:

30.00% 30.00%

Publicador:

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Current policy issues surrounding management of the Great Artesian Basin - historical development of existing legislation and institutions - hydrological and historical background information - development of concerns over unsustainable use of resources and possible adverse environmental impacts - recent developments associated with the general reforms to water law and policy initiated by the Council of Australian Governments (COAG) - comparison of issues surrounding the Murray-Darling Basin and the Great Artesian Basin.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The South Pacific is an area of emerging importance to lawyers in North America and throughout the world. Dr. Care's bibliography provides a comprehensive introduction to the legal materials of Melanesia, Micronesia, and Polynesia.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Context information is used by pervasive networking and context-aware programs to adapt intelligently to different environments and user tasks. As the context information is potentially sensitive, it is often necessary to provide privacy protection mechanisms for users. These mechanisms are intended to prevent breaches of user privacy through unauthorised context disclosure. To be effective, such mechanisms should not only support user specified context disclosure rules, but also the disclosure of context at different granularities. In this paper we describe a new obfuscation mechanism that can adjust the granularity of different types of context information to meet disclosure requirements stated by the owner of the context information. These requirements are specified using a preference model we developed previously and have since extended to provide granularity control. The obfuscation process is supported by our novel use of ontological descriptions that capture the granularity relationship between instances of an object type.