Results 261 to 270 of about 1,909,176 (306)

Personal Data Protection in Telemedicine

open access: yesLaw. Journal of the Higher School of Economics, 2016
openaire   +1 more source

A framework for personal data protection in the IoT

2016 11th International Conference for Internet Technology and Secured Transactions (ICITST), 2016
IoT personal devices are having an undoubtedly explosive growth as many different products become available on the market such as smart watches, contact lenses, fitness bands, microchips under skin, among others. These devices and their related applications process the collected sensor data and use them to provide services to their users; in addition ...
TORRE, ILARIA   +3 more
openaire   +1 more source

Google and Personal Data Protection

2012
This chapter discusses the interplay between the European personal data protection regime and two specific Google services, Interest-Based Advertising and Google Street View. The chapter assesses first the applicability of the Data Protection Directive, then jurisdictional issues, the principles relating to data quality, whether there is a legitimate ...
van der Sloot, B.   +1 more
openaire   +2 more sources

General data protection regulation — Protection of personal data in an organisation

2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2018
Personal data represent all data (identifiers) relating to an identified individual. Identifiers can include first name and last name, network IP address, MAC address, GPS location, telephone number, personal ID, biometric data and other relevant data in connection with personal identity.
Aleksandar Skendzic   +2 more
openaire   +1 more source

Protection of Personal Data Using Anonymization

2021
Data quality and security issues are very closely related. To ensure a high level of reliability in distributed systems and resilience from external attacks, the process of consolidating distributed data is critical. For consolidated systems, the access process relies heavily on data preprocessing, which, in turn, allows them to be anonymized.
Alexander V. Bogdanov   +8 more
openaire   +1 more source

Personalized Privacy Protection for Transactional Data

2014
Privacy protection in publication of transactional data is an important problem. However,the bulk of existing methods focus on a universal approach that exerts the same amount of preservation for all users and all sensitive values, without considering different requirements of users and different sensitivity of concrete attribute values.
Li-e Wang 0001, Xianxian Li
openaire   +1 more source

Privacy Management and Protection of Personal Data

2015
Abstract In this chapter, we will give detailed consideration to the ways in which the use of technology can infringe on privacy. We will consider technologies that have been around for the last decade revolutionizing the way in which we buy, communicate, contribute and obtain information, and emerging technologies, which use communicating objects ...
Laurent, Maryline   +1 more
openaire   +3 more sources

Cryptographic Protection of Personal Data Cards

1983
Plastic cards for different types of stored data are in wide use at present. Examples are credit cards and cards bearing access control information for automatic teller machines. More powerful devices with non-volatile read/write memory of several kilobytes, possibly with some intelligence, (Personal Data Cards), open new fields of applications in ...
Christian Müller-Schloer   +1 more
openaire   +1 more source

Standardizing Personal Data Protection

Abstract The Standardizing Personal Data Protection is the first book focusing on the role of technical standards in protecting individuals as regards the processing of their personal data. Through the lenses of legal pluralism and Transnational Private Regulation, the book studies the interaction of standardization as a private semi ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy