Results 61 to 70 of about 109,887 (196)
GDPR bypass by design? Transient processing of data under the GDPR
Be it facial detection scanners placed in airports and supermarkets, microphones in mobile and home devices, or imaging systems in autonomous vehicles on the streets, pervasive computing technologies introduce evermore sensors into our daily environment.
Damian George +2 more
openaire +1 more source
An analysis of violations and sanctions following the GDPR
This paper investigates the violations and sanctions that have occurred following the implementation of the General Data Protection Regulation (GDPR).
Wanda Presthus, Kaja Felix Sønslien
doaj
Schrems II: Everything is Illuminated?
(Series Information) European Papers - A Journal on Law and Integration, 2020 5(2), 1045-1059 | European Forum Insight of 15 October 2020 | (Table of Contents) I. Introduction. - II. Schrems I and the background to Schrems II. - III.
Róisín Áine Costello
doaj +1 more source
Regulating Disruption: Blockchain, GDPR, and Questions of Data Sovereignty [PDF]
The article discusses the nature of law in cyberspace. Topics discussed include distinction between regulation as infringement of private autonomy and regulation as a collaborative enterprise; blockchain regulatory conundrum; and neoliberal market ...
Herian, Robert
core
A Blockchain-based Approach for Data Accountability and Provenance Tracking
The recent approval of the General Data Protection Regulation (GDPR) imposes new data protection requirements on data controllers and processors with respect to the processing of European Union (EU) residents' data. These requirements consist of a single
Azaria A. +3 more
core +1 more source
Romidepsin is an important therapeutic option for patients with peripheral T-cell lymphoma (PTCL). However, the timing of romidepsin administration remains controversial.
Satoshi Yamasaki +10 more
doaj +1 more source
After Over-Privileged Permissions: Using Technology and Design to Create Legal Compliance [PDF]
Consumers in the mobile ecosystem can putatively protect their privacy with the use of application permissions. However, this requires the mobile device owners to understand permissions and their privacy implications.
Madappa, Dhruv +2 more
core +1 more source
An analysis of violations and sanctions following the GDPR
This paper investigates the violations and sanctions that have occurred following the implementation of the General Data Protection Regulation (GDPR). The GDPR came into effect in May 2018 with the aim of strengthening the information privacy of European
Wanda Kristiania University College +4 more
doaj +1 more source
Analysis of Biometric Data Under the General Data Protection Regulation
The article deals with the topical issue of the current digital age, the questions related to the legal protection of biometric data, including the potentiality of their misuse.
Ján Matejka +2 more
doaj +1 more source
Preparing for GDPR:helping EU SMEs to manage data breaches [PDF]
Over the last decade, the number of small and medium (SME) businesses suffering data breaches has risen at an alarming rate. Knowing how to respond to inevitable data breaches is critically important.
Archibald, Jacqueline +2 more
core

