Academic literature on the topic 'Consumer Data Protection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Consumer Data Protection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Consumer Data Protection"

1

Okechukwu Ukwueze, Festus, and Justin Ibegbulem. "DECONSTRUCTING NIGERIA’S DATA PROTECTION REGIME FROM CONSUMER PROTECTION PERSPECTIVE." Law, State and Telecommunications Review 13, no. 1 (May 26, 2021): 94–118. http://dx.doi.org/10.26512/lstr.v13i1.31850.

Full text
Abstract:
Purpose – The purpose of this paper is to make a case for the recognition of privacy and personal data protection as species of consumer rights in Nigeria in line with the revised United Nations Guidelines for Consumer Protection (UNGCP) by amending existing laws or enacting a new law to provide for personal data protection regime for consumers. Methodology/Approach/Design – The study follows a structured review of relevant extant legislation on consumer protection and personal data protection, namely the Federal Competition and Consumer Protection Act 2018 (FCCPA) and the Nigeria Data Protection Regulation 2019 (NDPR). Findings – The paper identifies that the provisions of Nigeria’s foremost consumer protection legislation, FCCPA, does cover electronic commerce (e-commerce) or consumer privacy and personal data protection while the NDPR, subsidiary legislation on personal data protection, which is yet to be effectively implemented is too general as to provide the consumers the much-needed privacy protection in their dealings with businesses. Practical Implications–Given the importance Recognition of data privacy and personal data protection as a species of consumer rights helps in understanding consumer protection in online transactions and opens opportunities for future research on consumer privacy and data protection. Originality/Value – Given the importance attached to the protection of consumer privacy and the various ramifications of transactions involving exposure of consumers’ personal data, recognition of privacy consumers’ rights to privacy is vital in consolidating knowledge of consumer rights and identifying paths for future research.
APA, Harvard, Vancouver, ISO, and other styles
2

Hermawanto, Dedi, Bachrul Amiq, and Subekti Subekti. "Legal Protection Of Consumer Data Of E-Commerce." Ipso Jure 1, no. 11 (December 27, 2024): 35–41. https://doi.org/10.62872/sa0j1d24.

Full text
Abstract:
This research will explore the use of technology so that it can strengthen the legal system in Indonesia and examine best legal practices in various countries to improve consumer data protection in e-commerce. Consumer protection legal research is increasingly urgent given the risks that continue to evolve and have a significant impact on consumers. The formulation of this research problem is: 1) How is the protection of business civil law in providing protection for consumers related to the misuse of consumer personal data in e-commerce transactions? 2) What are the legal actions against the misuse of consumer data in e-commerce? This thesis research uses normative legal types on consumer protection and misuse of personal data while also researching legal aspects that regulate consumer rights and the protection of unauthorized users. The results of the study show that the protection of consumers' personal data in e-commerce transactions in Indonesia is regulated by various laws and regulations, which are relevant to the civil law aspects of business. Cases of misuse of consumer data in e-commerce have encouraged increased awareness of the importance of protecting consumer rights in civil relations between consumers and business actors.
APA, Harvard, Vancouver, ISO, and other styles
3

Hidayah, Ardhiana, and Marsitiningsih Marsitiningsih. "Aspek Hukum Perlindungan Data Konsumen E-Commerce." Kosmik Hukum 20, no. 1 (August 19, 2020): 56. http://dx.doi.org/10.30595/kosmikhukum.v20i1.8251.

Full text
Abstract:
Consumer data protection is part of the consumer protection aspect of online transactions or e-commerce activities. This research is a normative legal research based on library research. This study aims to know and understand that personal data is part of the constitutional rights of citizens, so that the state is obliged to protect dignity, respect and integrity of consumers as human beings. The use of any information through electronic media that involves a person's personal data must be done with the consent of the person concerned. The misuse of consumer data is a major problem in legal protection to consumers. Consumer data protection only relies on Ministerial Regulation Number 20 Year 2016 concerning Protection of Personal Data which cannot be used as a basis for solving the problem of data misuse. There needs to be a special institution in processing law enforcement in the context of protecting consumer data.Keywords: Consumer Data Protection
APA, Harvard, Vancouver, ISO, and other styles
4

Destyarini, Normalita. "Ensuring Personal Data Protection in Telemedicine Services." Jurnal Dinamika Hukum 24, no. 2 (August 21, 2024): 218. http://dx.doi.org/10.20884/1.jdh.2024.24.2.3869.

Full text
Abstract:
The development of technology utilization in terms of the business sector in various fields makes its own challenges in providing consumer protection. then it is necessary to know that the Personal Data Protection of telemedicine service users provides consumer protection accommodation. There are aspects of protection for consumers as service users of personal data. Control of personal data should be carried out by companies that use technology in their business activities, in this case the organizers of electronic systems as required by existing regulations. The protection of consumers has been accommodated in the Consumer Protection Law (1999). Problems with data leaks that occur in Indonesia are problems experienced by consumers as users of digital services. Protection of personal data is a basic right of citizens and therefore the role of the State as the competent authority in the management and regulation of personal data. To ensure accommodation of personal data protection in the business development of digital start-up companies, it is necessary to study the accommodation of personal data protection as a form of protection for consumers in the Consumer Protection Law ( 1999) by Digital Start-up Companies as service providers. Normative research method with conceptual and legal approach is used to explain the facts. The results of this study show that the Consumer Protection Law (1999) on Consumer Protection has not provided regulatory accommodation that provides data protection for consumers of telemedicine. Output from this research can be a guideline for consumer protection practices in digital start-ups as required by the Consumer Protection Law (1999) and recommendations for relevant stakeholders in digital start-up services.Keywords: Consumer Protection; Personal Data Protection; Start-Up.
APA, Harvard, Vancouver, ISO, and other styles
5

Rizal, Muhammad Saiful, Yuliati Yuliati, and Siti Hamidah. "PERLINDUNGAN HUKUM ATAS DATA PRIBADI BAGI KONSUMEN DALAM KLAUSULA EKSONERASI TRANSPORTASI ONLINE." Legality : Jurnal Ilmiah Hukum 27, no. 1 (July 22, 2019): 68. http://dx.doi.org/10.22219/jihl.v27i1.8959.

Full text
Abstract:
The exoneration clause is still used in the online transportation agreement clause, when the user registers. This has an impact on the legal uncertainty for consumers in the protection of their personal data managed by the application business actors. This study aims to analyze the presence or absence of violations in Article 18 of the Consumer Protection Law related to exoneration clauses in online transportation, and forms of legal protection of consumer personal data in standard contracts. This research is a normative legal research, with a statue approach and comparative approach. The results of this study are that application business actors have transferred the responsibility of protecting consumer personal data which should be the obligation of the application business actor. The application of exoneration clauses carried out by application businesses is very detrimental to consumers by feeling insecure and comfortable in using online transportation services. Forms of legal protection from the government related to consumer personal data in using online transportation services with the obligation of businesses to revise and replace losses suffered by consumers.
APA, Harvard, Vancouver, ISO, and other styles
6

Azhari, Arfi. "LEGAL REVIEW OF CONSUMER LAW PROTECTION ON PERSONAL DATA ON DIGITAL PLATFORM." Indonesia Private Law Review 2, no. 1 (March 24, 2021): 59–72. http://dx.doi.org/10.25041/iplr.v2i1.2189.

Full text
Abstract:
Legal protection for consumers must be considered because the existence of consumers is prone to fraud. Personal consumer data protect one form of legal protection for consumers in conducting transactions with business actors, both domestic and foreign transactions. With the times at this time, consumer data that exists on business actors, both in the form of state-owned enterprises or business actors in the private form, is a lot of consumer data that these business actors trade and this consumer data is widely known. The problem studied is how the consumer’s legal protection of personal data on digital platforms. Research methods are using normative research methods, namely by explaining the issues and views of consumer legal protection of personal data on existing legal regulatory, digital platforms. The results illustrate that for now, consumer legal protection of personal data on digital platforms still refers to several laws and regulations in Indonesia. The government is also preparing a Draft Law on Personal Data Protection, which will become lex specialis. For the protection of personal consumer data in Indonesia related to personal data on digital platforms.
APA, Harvard, Vancouver, ISO, and other styles
7

Ayu, Dena, Mursal Mursal, Putri Jianti, Doli Witro, and Rifqi Nurdiansyah. "A Sociological Approach to Consumer Protection in E-Commerce Transactions During the Covid-19 Pandemic." Khazanah Hukum 4, no. 3 (September 10, 2022): 181–91. http://dx.doi.org/10.15575/kh.v4i3.18690.

Full text
Abstract:
This article uses a sociological approach to discuss consumer protection in the sales system through e-commerce during the covid-19 pandemic. This study aims to provide legal certainty to consumers by highlighting consumer protection laws and the role of the government in protecting people who make transactions in e-commerce. This article is juridical-normative research. This article uses qualitative data that is a literature study. In this case, two types of data are used: primary and secondary data. Primary data includes Law Number 8 of 1999 concerning Consumer Protection. At the same time, secondary data is obtained from library sources such as books, scientific articles, theses, dissertations, research reports, internet websites, and other data sources. Miles et al. used the qualitative data analysis technique, namely data condensation, data presentation, and concluding. The analysis results show that the consumer protection law does not only apply to consumers but to everyone who transacts in it. Consumer protection is very much needed to maintain security and provide convenience for sellers and buyers in carrying out economic transactions in the covid-19 pandemic. The role of law in consumer protection following the Consumer Protection Law Number 8 of 1999 provides efforts to ensure legal certainty to protect consumers.
APA, Harvard, Vancouver, ISO, and other styles
8

Kurniawan, Agung Suma, and Levina Yustitianingtyas. "Consumer Data Protection Against Online Loan Debt Payments." Jurnal Justiciabelen 6, no. 1 (July 28, 2023): 52. http://dx.doi.org/10.30587/justiciabelen.v6i1.6170.

Full text
Abstract:
In the era of digital economy innovation, people are trying to find new findings in the procurement of services for lending activities, which can be seen from the existence of money lending services on a digital basis which are considered to be able to build growth and the national economy. The type of observation used in this research is coherent research. Resolving disputes over payment of online loan debt and protecting consumer data is a complex problem in today's digital era. Consumers often become victims of the protection of their personal data by irresponsible online lenders. The sources of data used in this study are document laws, laws and regulations, and legal doctrines related to problem solving and consumer data protection. In using online loan services, consumers must provide a number of personal data, such as; name, address, telephone number, bank account number and other information. This can raise concerns for consumers regarding their security and privacy. To provide protection to consumers, data from the Indonesian fintech association (aftech), in 2019 there were around 15 million users of online loan services in Indonesia. In 2020 this number has increased by around 21 million users. In 2021 it is estimated that the number of users will increase again to 27 million. The results of this study indicate that consumer data protection and dispute resolution policies in Indonesia still need to be strengthened. bank account number and other data information. This can raise concerns for consumers regarding their security and privacy. To provide protection to consumers, data from the Indonesian fintech association (aftech), in 2019 there were around 15 million users of online loan services in Indonesia. In 2020 this number has increased by around 21 million users. In 2021 it is estimated that the number of users will increase again to 27 million. The results of this study indicate that consumer data protection and dispute resolution policies in Indonesia still need to be strengthened. bank account number and other data information. This can raise concerns for consumers regarding their security and privacy. To provide protection to consumers, data from the Indonesian fintech association (aftech), in 2019 there were around 15 million users of online loan services in Indonesia. In 2020 this number has increased by around 21 million users. In 2021 it is estimated that the number of users will increase again to 27 million. The results of this study indicate that consumer data protection and dispute resolution policies in Indonesia still need to be strengthened. in 2019 there were around 15 million users of online loan services in Indonesia. In 2020 this number has increased by around 21 million users. In 2021 it is estimated that the number of users will increase again to 27 million. The results of this study indicate that consumer data protection and dispute resolution policies in Indonesia still need to be strengthened. in 2019 there were around 15 million users of online loan services in Indonesia. In 2020 this number has increased by around 21 million users. In 2021 it is estimated that the number of users will increase again to 27 million. The results of this study indicate that consumer data protection and dispute resolution policies in Indonesia still need to be strengthened.
APA, Harvard, Vancouver, ISO, and other styles
9

Reyna, Agustin, Natali Helberger, and Frederik Zuiderveen Borgesius. "The perfect match?a closer look at the relationship between eu consumer law and data protection law." Common Market Law Review 54, Issue 5 (October 1, 2017): 1427–65. http://dx.doi.org/10.54648/cola2017118.

Full text
Abstract:
In modern markets, many companies offer so-called “free” services and monetize consumer data they collect through those services. This paper argues that consumer law and data protection law can usefully complement each other. Data protection law can also inform the interpretation of consumer law. Using consumer rights, consumers should be able to challenge excessive collection of their personal data. Consumer organizations have used consumer law to tackle data protection infringements. The interplay of data protection law and consumer protection law provides exciting opportunities for a more integrated vision on “data consumer law”.
APA, Harvard, Vancouver, ISO, and other styles
10

Lakli, Nadia, and Amina Chenaa. "MECHANISMS FOR PROTECTING THE PERSONAL DATA OF THE ELECTRONIC CONSUMER IN ALGERIAN LAW (BETWEEN LEGAL TEXTS AND ACTUAL APPLICATION)." Journal of Law and Sustainable Development 13, no. 5 (May 26, 2025): e04448. https://doi.org/10.55908/sdgs.v13i5.4448.

Full text
Abstract:
Objectives: This study aims to examine the legal mechanisms available in Algerian legislation that provide protection for electronic consumers, with a specific focus on safeguarding their personal data and the security of payment card transactions. The study seeks to highlight the legal vulnerabilities of consumers in electronic contracts and explore how existing laws address these risks. Theoretical Framework: The research is grounded in the principles of consumer protection law, data privacy, and cybersecurity. It explores the concept of the “electronic consumer” as the weaker contractual party in e-commerce and relies on theories related to digital rights, consent, and obligations of electronic service providers. The framework also draws on international legal standards, such as the General Data Protection Regulation (GDPR), to assess the alignment and adequacy of Algerian legislation. Method: The study adopts a descriptive and analytical legal approach, analyzing relevant Algerian legal texts, including consumer protection laws, data protection statutes, and cybercrime legislation. It involves a critical review of statutory provisions and case law (where available) to assess the extent to which these laws protect electronic consumers’ personal data and payment methods. Results and Discussion: The analysis reveals that Algerian legislation recognizes the need to protect electronic consumers, especially concerning the handling of personal data and the security of payment transactions. Legal texts mandate that electronic suppliers safeguard consumer information and implement secure electronic payment systems. However, challenges persist in terms of enforcement, legal clarity, and consumer awareness. The study finds that although legislative progress has been made, there is a need for more comprehensive, technology-specific updates and mechanisms to effectively prevent and respond to electronic fraud and data breaches. Research Implications: This research underscores the importance of continuously updating national legislation in response to evolving digital threats and consumer vulnerabilities. It also provides a foundation for policymakers and legal scholars to evaluate the effectiveness of current legal protections and to consider harmonization with international standards for better protection of electronic consumers. Originality/Value: This study provides a focused legal analysis of electronic consumer protection in Algeria, a topic that is under-researched in regional academic literature. It highlights both strengths and gaps in the existing legal framework and offers practical insights for enhancing consumer confidence in digital markets by promoting stronger regulatory protections for personal data and payment security.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Consumer Data Protection"

1

Koutsias, Marios. "Consumer protection and global trade in the digital environment : the case of data protection." Thesis, University of Essex, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.437826.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

D'AMICO, Alessia. "Optimising regulatory responses to consumer disempowerment over personal data in the digital world." Doctoral thesis, European University Institute, 2021. https://hdl.handle.net/1814/71844.

Full text
Abstract:
Defence date: 06 July 2021
Examining Board: Professor Giorgio Monti (Tilburg University); Professor Michal Gal (University of Haifa); Professor Orla Lynskey (London School of Economics); Professor Peter Drahos (European University Institute)
This thesis addresses the problem of individuals’ lack of control over personal data in the digital world. It sheds light on market and regulatory failures that lie behind the status quo and proposes a framework to improve regulatory responses. The two regulatory regimes that are at the core of this thesis are EU data protection regulation, which protects individuals’ fundamental rights over data, and EU competition law, which safeguards the sound functioning of the market and consumers’ economic interests. Despite the existence of these two regulatory regimes, individuals do not have sufficient control over personal data collected by digital firms, whose control over large datasets is a factor contributing to market monopolisation. The thesis argues that one reason for the shortcomings of today’s regulatory framework is that the market failure is composed of a combination of factors, which are currently addressed by the different regimes relatively independently. This dichotomy hinders the development of an effective strategy to tackle the market failure in its entirety. The approach taken in this thesis is that by integrating the two regimes, it might be possible to close the gaps deriving from a narrow perception of their regulatory spaces. Hence, the thesis formulates a holistic approach, encompassing data protection regulation and competition law, designed to increase the effectiveness of the regulatory framework as a whole. Different dimensions of the regimes’ interrelation are analysed, to uncover new ways to harness their complementarity and minimise their inconsistencies and overlaps. The thesis looks at how the regimes can incorporate elements from each other to inform their policies and application of their rules, as well as developing a complementary enforcement strategy. The holistic framework ultimately allows both regimes to better tailor their regulatory responses to the functioning of the digital market and take account of the diverse elements that constitute the market failure they seek to correct.
APA, Harvard, Vancouver, ISO, and other styles
3

Kamleitner, Bernadette, and Vince Mitchell. "Your Data Is My Data: A Framework for Addressing Interdependent Privacy Infringements." Sage, 2019. http://dx.doi.org/10.1177/0743915619858924.

Full text
Abstract:
Everyone holds personal information about others. Each person's privacy thus critically depends on the interplay of multiple actors. In an age of technology integration, this interdependence of data protection is becoming a major threat to privacy. Yet current regulation focuses on the sharing of information between two parties rather than multiactor situations. This study highlights how current policy inadequacies, illustrated by the European Union General Data Protection Regulation, can be overcome by means of a deeper understanding of the phenomenon. Specifically, the authors introduce a new phenomenological framework to explain interdependent infringements. This framework builds on parallels between property and privacy and suggests that interdependent peer protection necessitates three hierarchical steps, "the 3Rs": realize, recognize, and respect. In response to observed failures at these steps, the authors identify four classes of intervention that constitute a toolbox addressing what can be done by marketers, regulators, and privacy organizations. While the first three classes of interventions address issues arising from the corresponding 3Rs, the authors specifically advocate for a fourth class of interventions that proposes radical alternatives that shift the responsibilities for privacy protection away from consumers.
APA, Harvard, Vancouver, ISO, and other styles
4

Liljedahl, Hildebrand Teodor, and Filip Nyquist. "Cookies, GDPR and Dark patterns : Effect on consumer privacy." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21726.

Full text
Abstract:
The European General Data Protection Regulation has changed how users interact with cookie notices online. The rules state that users consent must be given via a clear, affirmative act and easily withdrawable by the end-user. Dark patterns, a way of tricking a user into giving more consent than needed with the help of, for example,size of objects, text and button colour could be applied to these notices to trick the user into giving more consent than needed. The objective of the thesis study was to develop a scraper in Python which could analyze web pages automatically against a set of created measurable parameters. That means that first, measurable parameters needed to be defined for the scraper, and then, implemented in such a way that it automatically could find and analyze cookie notices. The scraper was implemented in Python with the help of the browser testing libraries called Splinter and Selenium. The results from the experiment showed that the size of the notices was mostly small, but some pages used up the whole page for the notice. The amount of pre-ticked boxes and the readability of the notices also showed usage of dark patterns. The conclusion that can be drawn from the result is that the GDPR and e-Privacydirective have affected the usage in most web pages, as they seem to use some types of dark patterns to trick the user into giving more consent than is needed to be able to use the web page, and with an improved scraper, the result could show even more

Presentation har redan ägt rum på zoom 

APA, Harvard, Vancouver, ISO, and other styles
5

Lui, W. C. "Flexible authorizations in workflow management systems." Click to view the E-thesis via HKUTO, 2002. http://sunzi.lib.hku.hk/hkuto/record/B42577135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lachheb, Tawfik. "A secure client/server java application programming interface." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2561.

Full text
Abstract:
The purpose of this project is to develop a generic Java Application Programming Interface (API) that would be used to provide security and user privacy to functions such as data transfer, key management, digital signature, etc.
APA, Harvard, Vancouver, ISO, and other styles
7

Lui, W. C., and 雷永祥. "Flexible authorizations in workflow management systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2002. http://hub.hku.hk/bib/B42577135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ilesanmi, Olufemi Olajide. "Privacy in RFID Transit Systems : A case study of SL - Storstockholms Lokaltrafik." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177584.

Full text
Abstract:
Radio Frequency Identification (RFID) is a technology that facilitates wirelesscommunication. It is being widely used for access control purposes to aid administration ofservices. As with most wireless technologies, RFID has its challenges, due to its medium (radio waves) of communication, which makes it susceptible to signal interception and other possible attacks. The goal of this project is to investigate the insecurities in the implementation of the RFID system in transit (Storstockholms Lokaltrafik, Stockholm) systems. Due to the nature of the system, spatial information about consumers are accumulated over time thereby attracting some level of interests either legitimate or illegitimate, and raising some concerns. This thesis, takes into consideration the vulnerabilities of the RFID system and the potential security risks consumers of the system are exposed to, a detailed analysis is carried out on the existing infrastructure with the goal of exposing the shortcomings of the systems and proposing mitigating solutions. After an extensive work, seven (7) threats to privacy and security of RFID users were elaborated. Also discussion, about how different legislations around the world enforced data handling regulations in relation to commuter data, is carried out. Finally, most recent threats to consumer privacy are taken into consideration, as well as security in the mass transit field to put together a list of recommended safe practices. The work shows that RFID does pose significant threat to consumer privacy. One might argue that RFID has its benefits in its various implementations. However the fact remains that there are issues with regards to privacy that must to be addressed.
APA, Harvard, Vancouver, ISO, and other styles
9

Alleme, Apo. "La protection du consommateur à l'épreuve des technologies de l'information et de la communication : étude du droit ivoirien à la lumière du droit français." Thesis, Perpignan, 2019. http://www.theses.fr/2019PERP0016/document.

Full text
Abstract:
Les technologies de l’information et de la communication (TIC) qui recouvrent l’ensemble des outils et techniques résultant de la convergence des télécommunications ont révolutionné les comportements et les habitudes des consommateurs. Si ces technologies ne se limitent pas au réseau internet c’est la montée d’internet qui a renouvelé la problématique de la protection du consommateur. En réponse, le législateur ivoirien a, à travers la loi de 2016 relative à la consommation, essayé de s’arrimer aux standards internationaux relatifs à la protection du consommateur. Le nouveau dispositif adopté s’ajoute au droit positif ivoirien et au cadre législatif communautaire (UEMOA et CEDEAO). Cependant, le système se révèle insuffisant et, à certains égards, inadapté à la protection du consommateur, notamment dans l’hypothèse d’une vente conclue par le canal des TIC. Ces insuffisances s’observent au moment de la formation et de l’exécution du contrat de vente. Dans ce contexte, le cadre législatif français qui étend ses sources dans le droit communautaire européen peut, à bien d’égards, inspirer le législateur ivoirien. Il ne s’agit pas de transposer intégralement ce système en droit ivoirien. En effet, à l’épreuve des TIC, la protection du consommateur passe par la recherche de nouveaux points d’équilibre entre le consommateur et le professionnel
Information and communication technologies (ICTs), which encompass all the tools and techniques resulting from the convergence of telecommunications, have revolutionized the behavior and habits of consumers. These technologies are not limited to the Internet, the rise of which has renewed the problem of consumer protection. In response, the Ivorian legislator, through the 2016 law on consumption, tried to be consistent with international standards relating to consumer protection. The new mechanism adopted is in addition to current Ivorian law and the Community legislative framework (UEMOA and ECOWAS). However, the system is proving insufficient and, in some respects, unsuitable for consumer protection, especially in the event of a sale through the ICT channel. These deficiencies occur at the time of the formation and enforcement of the sales contract. In this context, the French legislative framework that extends its sources in European Community law can, in many ways, inspire the Ivorian legislator. It does not entail the total transposition of the French system into the Ivorian law. Actually, with the new challenges of ICTs, the protection of the consumer can only be guaranteed by the search for equilibrium between the consumer and the professional
APA, Harvard, Vancouver, ISO, and other styles
10

Pokorná, Adéla. "Ochrana spotřebitele v bankovnictví." Master's thesis, Vysoká škola ekonomická v Praze, 2007. http://www.nusl.cz/ntk/nusl-4881.

Full text
Abstract:
The significance of personal data protection in the Czech Republic and in other developed countries has been continually increasing. A bank's security system breakdown can cause not only a misuse of the client's personal data but also a financial loss that harms the client and the bank reputation as well. The aim of the thesis is an analysis of the direct banking security and protection means of sensitive data of prime banks on the Czech market. First chapter characterises the consumer protection issues in regard of banking. The second part of the thesis concentrates on the area of direct banking, its forms, possible threats and the particular security tools used by local banks. Last section consists of an analysis of the survey among the banks and their clients.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Consumer Data Protection"

1

Metz, Rainer, Jörg Binding, Pan Haifeng, and Florian Huber, eds. Consumer data protection in Brazil, China and Germany. Göttingen: Göttingen University Press, 2016. http://dx.doi.org/10.17875/gup2016-960.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ferretti, Federico. EU Competition Law, the Consumer Interest and Data Protection. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-08906-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bakhoum, Mor, Beatriz Conde Gallego, Mark-Oliver Mackenrodt, and Gintarė Surblytė-Namavičienė, eds. Personal Data in Competition, Consumer Protection and Intellectual Property Law. Berlin, Heidelberg: Springer Berlin Heidelberg, 2018. http://dx.doi.org/10.1007/978-3-662-57646-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Parham, Martin A. Mass marketing and consumer fraud: Background, issues, and data. Hauppauge, NY: Nova Science Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Parham, Martin A. Mass marketing and consumer fraud: Background, issues, and data. Hauppauge, NY: Nova Science Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cristiano, Iurilli, and Vecchio Gianfrancesco, eds. Il nuovo diritto dei consumatori: Il contratto, la conciliazione, la tutela collettiva. Torino: G. Giappichelli, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cristiano, Iurilli, and Vecchio Gianfrancesco, eds. Il nuovo diritto dei consumatori: Il contratto, la conciliazione, la tutela collettiva. Torino: G. Giappichelli, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Thomas, Liisa M. Thomas on data breach: A practical guide to handling data breach notifications worldwide. 2nd ed. [Eagan, MN]: Thomson Reuters/Westlaw, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chow, Stephen Y., Barbara B. Anthony, and Ellen M. Giblin. Identity theft--consumer view. Boston, MA: MCLE New England, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Commerce, Trade, and Consumer Protection. Cybersecurity and consumer data: What's at risk for the consumer? : hearing before ... 108th Congress, 1st session, November 19, 2003. Washington, DC: U.S. G.P.O., 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Consumer Data Protection"

1

Ma, Jingyuan. "Data Regulation, Consumer Protection and Competition Law." In Regulating Data Monopolies, 217–32. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-8766-2_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Guerra, Giorgia. "Dark Patterns and the Scraping Consumer Consent." In Privacy, Data Protection and Data-driven Technologies, 41–67. London: Routledge, 2024. http://dx.doi.org/10.4324/9781003502791-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ferretti, Federico. "Competition, the Consumer Interest, and Data Protection." In EU Competition Law, the Consumer Interest and Data Protection, 93–122. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-08906-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Graef, Inge. "Blurring Boundaries of Consumer Welfare." In Personal Data in Competition, Consumer Protection and Intellectual Property Law, 121–51. Berlin, Heidelberg: Springer Berlin Heidelberg, 2018. http://dx.doi.org/10.1007/978-3-662-57646-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bieker, Felix, and Marit Hansen. "Consumer Privacy and Data Protection in the EU." In The Routledge Handbook of Privacy and Social Media, 300–313. New York: Routledge, 2023. http://dx.doi.org/10.4324/9781003244677-34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mačėnaitė, Milda. "Protecting Children Online: Combining the Rationale and Rules of Personal Data Protection Law and Consumer Protection Law." In Personal Data in Competition, Consumer Protection and Intellectual Property Law, 331–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 2018. http://dx.doi.org/10.1007/978-3-662-57646-5_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hornuf, Lars, Sonja Mangold, and Yayun Yang. "Data Protection Law in Germany, the United States, and China." In Data Privacy and Crowdsourcing, 19–79. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-32064-4_3.

Full text
Abstract:
AbstractThis chapter examines data protection laws in Germany, the United States, and China. We describe the most important legal sources and principles of data protection and emphasize the rights of data subjects, with particular attention to personal and sensitive data. The legal frameworks for data protection on crowdsourcing platforms in the three countries show significant differences, but also some similarities. In the United States no federal omnibus regulation on the protection of personal data exists so far. The state of California recently enacted a consumer protection law similar to the GDPR. China started developing its privacy legislation after Germany and the United States, in some parts again similar to the GDPR. A characteristic of the Chinese approach is the different protection regime of personal rights with respect to private actors and to the state government. While privacy rights have expanded in the private sector, threats to privacy posed by state actors have received little attention in Chinese jurisprudence.
APA, Harvard, Vancouver, ISO, and other styles
8

Truli, Emmanuela. "The General Data Protection Regulation and Civil Liability." In Personal Data in Competition, Consumer Protection and Intellectual Property Law, 303–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 2018. http://dx.doi.org/10.1007/978-3-662-57646-5_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Maksó, Bianka. "Binding Corporate Rules As a New Concept for Data Protection in Data Transfers." In Personal Data in Competition, Consumer Protection and Intellectual Property Law, 501–25. Berlin, Heidelberg: Springer Berlin Heidelberg, 2018. http://dx.doi.org/10.1007/978-3-662-57646-5_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zarsky, Tal. "Responding to the Inevitable Outcomes of Profiling: Recent Lessons from Consumer Financial Markets, and Beyond." In Data Protection in a Profiled World, 53–74. Dordrecht: Springer Netherlands, 2010. http://dx.doi.org/10.1007/978-90-481-8865-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Consumer Data Protection"

1

Xu, Xingshuai, and Zhecheng Li. "A Blockchain-Based Medical Data Security Sharing Scheme Supporting Single-Factor Combined Authentication and Identity Privacy Protection." In 2025 5th International Conference on Consumer Electronics and Computer Engineering (ICCECE), 679–88. IEEE, 2025. https://doi.org/10.1109/iccece65250.2025.10984943.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hayden, Thomas, Joseph Mazzella, Keith Parker, and Christophe Baete. "Predictive Analytics and Machine Learning in Integrated External Corrosion Management." In CONFERENCE 2023, 1–7. AMPP, 2023. https://doi.org/10.5006/c2023-19393.

Full text
Abstract:
Abstract Integrated External Corrosion Management (IECM) is a novel framework developed for pipeline operators to model, identify, and optimize external corrosion risk and costs using a data-driven approach. Over the last decade, Machine Learning (ML) has transformed industries from consumer technology to product design to industrial systems. In corrosion, the Association for Materials Protection and Performance (AMPP) has added a symposium for specialists designing and optimizing machine learning algorithms detection and management. This work is not about a specific algorithm or technology set. Instead, this work presents a framework for incorporating the output of a predictive algorithm with an IECM framework. This work considers the interplay between in-line inspection (ILI), direct assessment, close interval surveys, and mechanistic modeling. Lastly, this work describes an external corrosion management system that is fully "observable", an environment where the state of any component in a pipeline system can either be directly observed or inferred in near real-time.
APA, Harvard, Vancouver, ISO, and other styles
3

Rosanova, Giuseppe. "ENERGY SMART GRIDS AND SUSTAINABLEDEVELOPMENT: THE PRINCIPLE OF "MAXIMUM DATA PROTECTION"." In 11th SWS International Scientific Conferences on SOCIAL SCIENCES - ISCSS 2024, 345–52. SGEM WORLD SCIENCE, 2024. https://doi.org/10.35603/sws.iscss.2024/vs03/23.

Full text
Abstract:
The paper addresses the impact of smart grids on the energy sector and personal rights. Renewable conversion of the energy cycle has been deemed insufficient over time, and the production perspective has been complemented by innovation and research that have changed the transition process, which now also involves the digitization of the entire electricity system. Sustainable development is also technological, incorporating both the energy transition and the digital transition, aimed at creating an efficient electricity system that can reduce consumption, lower energy prices, protect the environment and safeguard the interests of stakeholders, both producers and consumers, especially those who are vulnerable or poor. The intertwining of the two transitions was captured, first by European legislative acts in 2009 and developed in the Fourth Energy Package, with the creation of smart grids. Smart grids, as the energy sectoral declination of the smart city model, give the electricity grid a new qualification that frees it from the merely passive vision of reducing it to the status of a means of transporting energy, to consider it as a tool for realising energy efficiency, allocating resources and protecting all those connected to it. The harmful impact of smart grids on the right to privacy and on all users� rights of freedom imposes the need to envisage a new Euro-European energy digital law aimed at providing general rules to regulate the proper exploitation of data collected by the network, without affecting the rights of all users of the network. In the area of negative effects, it emerged that smart grids restrict the rights of the individual in terms of personal identity and personal freedom, directing the behaviour and everyday choices of all�energy consumers. Protection tools include the introduction of a special and detailed informed consent by users and the provision of non-judicial dispute resolution tools that allow for faster protection of rights.
APA, Harvard, Vancouver, ISO, and other styles
4

Scantlebury, David, Takashi Tsukada, Yuan Feng Yang, and Min Du. "Long-Term Cathodic Protection Performance Data of Two Off-Shore Structures." In CORROSION 2009, 1–7. NACE International, 2009. https://doi.org/10.5006/c2009-09522.

Full text
Abstract:
Abstract Two marine steel structures which are both largely uncoated except for the splash zone and both fully submerged are described. Both are cathodically protected with Al/Zn/In sacrificial anodes,. They are a Japanese structure installed in 1973 and based on the DNV recommendations and a Chinese structure in 1996 according to the NACE recommendations. The cathodic protection systems of these structures have been extensively monitored, anode and structure potentials versus time, depth, anode output versus time, and these values are compared with the values from the codes of practice to see how the expected and real behaviour compare and contrast. It may be seen that the design criteria originally employed provided insufficient initial current density according to the standards but that the steady state design current density was very generous leading to a substantial over design of the structures. The cathodic protection system for the older structure is shown to be at its end of life in 2006 with the anodes almost fully consumed. Even so, the structure potential is still within the recommended protection potential criterion of -800mV Ag/AgCl/sea water.
APA, Harvard, Vancouver, ISO, and other styles
5

Moran, James P., James D. Chrzan, Henry O. Pate, and Felix Fernandez. "Corrosion Performance of Aluminum Alloys for Use in Deep-Water Riser Systems." In CORROSION 2014, 1–12. NACE International, 2014. https://doi.org/10.5006/c2014-4454.

Full text
Abstract:
Abstract The use of aluminum alloys in drilling riser systems is one method to reduce riser weight, thereby allowing a given drilling platform to drill in deeper water than would be possible with a steel riser system. One of the key performance drivers needed for successful implementation of aluminum into riser systems is corrosion resistance. In this paper, we will discuss seawater corrosion testing conducted on candidate aluminum alloys for offshore applications. Samples were exposed in natural seawater for time periods up to 1 year, both with and without cathodic protection. Cathodic protection was applied using several different anode types, and several cathode/anode area ratios. Corrosion potentials and the galvanic currents between sacrificial anodes and test-samples were measured. Results include a summary of the severity of corrosion as a function of alloy and cathodic protection, as well as a treatment of the corrosion potential and current data. The findings indicate that with adequate cathodic protection, candidate aluminum alloys for off-shore riser systems exhibit excellent resistant to pitting corrosion. Electrochemical data indicate that different anode types are consumed and/or passivated at different rates, and provide different levels and time-lengths of sacrificial protection.
APA, Harvard, Vancouver, ISO, and other styles
6

Barrett, Matt, Mill Jawed, Dylan Bolch, William Maize, and Tony da Costa. "A Statistical Approach to Rectifier Groundbed Remaining Service Life Prediction." In CONFERENCE 2025, 1–10. AMPP, 2025. https://doi.org/10.5006/c2025-00555.

Full text
Abstract:
Abstract The rectifier groundbed is a key component of an Impressed Current Cathodic Protection (ICCP) system in that it is consumed over time. The rate of consumption is based on many contributing factors including anode mass and material, surrounding soil properties, seasonal effects and rectifier operating conditions. Accurately forecasting the remaining service life of an anode groundbed has proven challenging for pipeline operators in the past, faced with the decision to replace the groundbed well before the anodes have been consumed or waiting until groundbed failure and risking a time period where the pipeline is no longer cathodically protected. We present a statistical approach to this problem, using remote-monitoring data and advanced data analytics techniques. A machine learning model is developed to classify rectifier readings as in their nominal phase or approaching the end of service life. We present and discuss what factors have the most influence on the model and discuss wider applicability on a large scale of rectifier datasets.
APA, Harvard, Vancouver, ISO, and other styles
7

Wehling, J. E. "A Galvanic Zinc-Hydrogel System For Cathodic Protection Of Reinforced Concrete Structures." In CORROSION 1999, 1–15. NACE International, 1999. https://doi.org/10.5006/c1999-99551.

Full text
Abstract:
Abstract Installations of galvanic cathodic protection anodes have been completed on bridge structures in Illinois, Virginia, Florida, Wisconsin, and Oregon, on parking garages in Illinois and Wisconsin, on high voltage transmission tower footings in California, and on condominium balconies in Florida. Some of these installations involve prestressed concrete. The installation of these systems will be described in detail and monitoring data will be presented for at least six months of active service. The system consists of a 10 mil zinc foil bonded to an ionically conductive hydrogel adhesive, which is applied directly to the surface of the steel-reinforced concrete. A copper wire connects the zinc anode to multiple steel rebars and/or strands. The performance is monitored by measuring the current flow in the wire, by measuring the amount of zinc consumed or, more generally, by taking depolarization readings at regular intervals. All of these measurements are an indication of the performance of the galvanic system and the corrosion of the steel rebars that is being prevented.
APA, Harvard, Vancouver, ISO, and other styles
8

Dykstra, B. G., J. E. Wehling, and J. L. Piazza. "Cathodic Protection of Steel Reinforced Concrete Structures Using a Galvanic Zinc Hydrogel System." In CORROSION 2002, 1–13. NACE International, 2002. https://doi.org/10.5006/c2002-02269.

Full text
Abstract:
Abstract There are over 500,000 condominium units along the Florida coastline, most of which have experienced significant corrosion of their steel reinforcements due primarily to chloride intrusion from the ocean salt spray. Some of the condominium associations in Florida have in the past five years recognized that cathodic protection is the only rehabilitation method that will truly prevent the corrosion of the reinforcing steel and the resultant concrete spalling and delamination. The installations of a galvanic zinc-hydrogel system will be described in detail, and monitoring data will be presented for at least six months of active service. The system consists of a 10-mil zinc foil bonded to an ionically conductive hydrogel adhesive, which is applied directly to the surface of the steel-reinforced concrete. A copper wire connects the zinc anode to multiple steel rebars. The performance is monitored by measuring the current flow in the wire, by measuring the amount of zinc consumed or, more generally, by taking depolarization readings at regular intervals. All of these measurements are an indication of the performance of the galvanic system and the corrosion of the steel rebars that is being prevented.
APA, Harvard, Vancouver, ISO, and other styles
9

Rosanova, Giuseppe. "IL RUOLO DELLE ALTERNATIVE DISPUTES RESOLUTION NEL FRAMEWORK ENERGETICO EUROPEO." In 11th SWS International Scientific Conferences on SOCIAL SCIENCES - ISCSS 2024, 275–82. SGEM WORLD SCIENCE, 2024. https://doi.org/10.35603/sws.iscss.2024/vs02/20.

Full text
Abstract:
The final frontier of European transitional energy law must be found in the introduction of a balanced and efficient system of climate and energy justice. The stratification, over time, of multiple rules in European Union law, both soft law and hard law, has, on the one hand, ensured legal certainty and regulation of the various aspects of the matter but, on the other hand, risks increasing litigation between the players in this field exponentially. The significant increase in the number of regulations governing the various aspects of the �energy community� entails the need to raise the level of protection for energy consumers and, consequently, the need to provide adequate remedies to safeguard their rights. Among the factors affecting the need to set up an adequate system of judicial protection is the proliferation of private subjects who, in the new guise of prosumers and prosumagers, enjoy powers that are more incisive in the energy cycle, even though they do not give up their formal consumerist position. One thinks, of the integration into the electricity system of the digital transition, which, alongside the energy transition, risks creating multiple problems in the private lives of users connected to the electricity grid, starting with security from cyber-attacks and ending with the uncontrolled dissemination of personal data, damaging the confidentiality, dignity and identity of the individual. The energy justice system will have to measure itself against these factors and consider the need to flank judicial intervention with extrajudicial intervention, which is quicker, cheaper and entrusted to trained, impartial and equidistant parties. The realisation of the true energy just transition cannot omit to address the issue of safeguarding rights, lest consumerist achievements remain mere statements of principle, lacking adequate protection.
APA, Harvard, Vancouver, ISO, and other styles
10

Adey, Robert A., Cristina Peratta, and John M. W. Baynham. "Using Modeling to Interpret and Expand CP Survey Data." In CORROSION 2012, 1–10. NACE International, 2012. https://doi.org/10.5006/c2012-01203.

Full text
Abstract:
Abstract Marine structures are frequently monitored or surveyed as part of an ongoing integrity management program to obtain data on corrosion potentials, anode consumption and in some cases field gradients. One objective is to determine how effective the CP system is at providing protection to the structure and another is to verify that sacrificial anodes are being consumed at a rate consistent with design assumptions. However it is not economic or in many cases even feasible to measure potentials on a complete structure or to collect data from all anodes, so the CP engineer is required to infer the condition of the overall structure from the available data. In particular for structures with complex geometry, the accuracy of data collected may not be reliable, as for example potential readings obtained with a measurement probe can be affected by nearby metal surfaces, leading to significant error in the data collected particularly for field gradients. Similarly access problems can result in error if the probe cannot be oriented or placed on the structure or anode in the required location. These issues require the CP engineer to use his judgment to determine which data to use and which to discard. Computer modeling has been used in the design of CP systems firstly to optimize the design, and secondly to provide assurance to the operator that requirements for anode life are met, and that the system will sustain the potentials required to protect the structure. In such a case the structure geometry and the anode design are supplied as data to the model and the model predicts the potentials and the anode consumption rates over the life of the structure. However another application of modeling is to use it to convert information we can measure into the information we want to know. In particular modeling can be used to expand limited survey data into a prediction of potentials on all structural surfaces, and to provide data on the performance of all anodes. A case study is presented in which computer modeling is used to evaluate data from a single survey, then to enhance the data to provide a view of potentials over the complete structure and to provide a view of consumption of all anodes.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Consumer Data Protection"

1

Durovic, Mateja, and Franciszek Lech. A Consumer Law Perspective on the Commercialization of Data. Universitätsbibliothek J. C. Senckenberg, Frankfurt am Main, 2021. http://dx.doi.org/10.21248/gups.64577.

Full text
Abstract:
Commercialization of consumers’ personal data in the digital economy poses serious, both conceptual and practical, challenges to the traditional approach of European Union (EU) Consumer Law. This article argues that mass-spread, automated, algorithmic decision-making casts doubt on the foundational paradigm of EU consumer law: consent and autonomy. Moreover, it poses threats of discrimination and under- mining of consumer privacy. It is argued that the recent legislative reaction by the EU Commission, in the form of the ‘New Deal for Consumers’, was a step in the right direction, but fell short due to its continued reliance on consent, autonomy and failure to adequately protect consumers from indirect discrimination. It is posited that a focus on creating a contracting landscape where the consumer may be properly informed in material respects is required, which in turn necessitates blending the approaches of competition, consumer protection and data protection laws.
APA, Harvard, Vancouver, ISO, and other styles
2

Bozzo Hauri, Sebastián. The New Frontier of Civil Liability: Artificial Intelligence, Autonomy, and Consumer Protection. Carver University; Universidad Autónoma de Chile, May 2025. https://doi.org/10.32457/bozzo2202599.

Full text
Abstract:
Technological evolution has entered a phase that challenges the very foundations of private law. The emergence of systems based on artificial intelligence (AI)—particularly in their most recent form, so-called AI agents—compels a reassessment of the traditional framework of civil liability, especially in the field of consumer law. The trajectory of AI has followed a path marked by three distinct waves. The first wave was predictive AI, trained on historical data to anticipate future behavior, as seen in recommendation engines and segmentation models. The second wave introduced generative AI—such as ChatGPT or Gemini—capable of producing text, images, or decisions based on prompts. However, it is the third wave, embodied by AI agents, that poses the greatest challenge: software capable of autonomous action, making decisions on behalf of users, interacting across platforms, and executing tasks with minimal human oversight.
APA, Harvard, Vancouver, ISO, and other styles
3

Herrera, Diego, Walter Pereira, Ludmila Volochen, and Ana María Zárate Moreno. Open Finance in Latin America and the Caribbean: Great Opportunities, Large Challenges. Inter-American Development Bank, June 2023. http://dx.doi.org/10.18235/0004937.

Full text
Abstract:
This document is a comprehensive study of open finance, its context, and its value for the financial system in Latin America and the Caribbean. It also delves into the intricacies of the open finance ecosystem and analyzes its risks and opportunities. The document describes the status of the development of open finance in the region and discusses the challenges faced in implementing the ecosystem there. Finally, this text guides financial regulators and supervisors, considering international best practices and regional distinctions. This document examines how the regulatory framework can contribute to handing power over data to financial consumers, allowing them to obtain better conditions for accessing and using financial products with security and efficiency. These conditions translate into facilitating access to the financial market for financially excluded consumers, reducing the prices for financial services among those already served, and facilitating portability or switching between providers. A study of the region highlights the benefits of open finance, such as increased competition, greater financial inclusion, and reduced entry barriers for consumers, but also acknowledges the risks, including cybersecurity and consumer-protection risks. The document emphasizes the need for robust data-protection regulations, consumer safeguards, and technological infrastructure to establish a sustainable and secure open finance ecosystem. The objective is to understand open finance, its role in the modern financial landscape, and its potential benefits and challenges. This document also aims to establish principles for a specific regulatory framework that facilitates the development of open finance in the region. This research is a collaborative effort between the Financial Data and Technology Association and the Inter-American Development Bank through its FintechLAC initiative.
APA, Harvard, Vancouver, ISO, and other styles
4

Serafica, Ramonette, and Queen Cel Oren. Should the Philippines Adopt Net Neutrality Regulations? Philippine Institute for Development Studies, April 2024. http://dx.doi.org/10.62986/pn2024.08.

Full text
Abstract:
Net neutrality is a contentious issue in internet regulation, looking at nondiscrimination and pricing policy. It espouses the idea that broadband service providers should charge consumers only once for internet access, not favor one content provider over another, and not charge content providers for sending information over broadband lines to end users. Advocates argue that this fosters innovation and protects freedom of expression, while critics warn that it could stifle investment and innovation. This paper examines the advantages and disadvantages of adopting net neutrality principles in the proposed Open Access in Data Transmission Act. While net neutrality can address legal obstacles, infrastructure gaps, and network discrimination, its unintended impacts on investment and innovation remain ambiguous. Thus, policymakers are advised to identify the public interest at stake, consider existing competition regulations and consumer protection laws, and assess possible impacts on the internet value chain. Also recommended is the elimination of barriers to entry and other restrictions within the internet access connectivity segment of the internet value chain.
APA, Harvard, Vancouver, ISO, and other styles
5

Kira, Beatriz, Rutendo Tavengerwei, and Valary Mumbo. Points à examiner à l'approche des négociations de Phase II de la ZLECAf: enjeux de la politique commerciale numérique dans quatre pays d'Afrique subsaharienne. Digital Pathways at Oxford, March 2022. http://dx.doi.org/10.35489/bsg-dp-wp_2022/01.

Full text
Abstract:
Realities such as the COVID-19 pandemic have expedited the move to online operations, highlighting the undeniable fact that the world is continuing to go digital. This emphasises the need for policymakers to regulate in a manner that allows them to harness digital trade benefits while also avoiding associated risk. However, given that digital trade remains unco-ordinated globally, with countries adopting different approaches to policy issues, national regulatory divergence on the matter continues, placing limits on the benefits that countries can obtain from digital trade. Given these disparities, ahead of the African Continental Free Trade Area (AfCFTA) Phase II Negotiations, African countries have been considering the best way to harmonise regulations on issues related to digital trade. To do this effectively, AfCFTA members need to identify where divergencies exist in their domestic regulatory systems. This will allow AfCFTA members to determine where harmonisation is possible, as well as what is needed to achieve such harmonisation. This report analyses the domestic regulations and policies of four focus countries – South Africa, Nigeria, Kenya and Senegal – comparing their regulatory approaches to five policy issues: i) regulation of online transactions; ii) cross-border data flows, data localisation, and personal data protection; iii) access to source code and technology transfer; iv) intermediary liability; and v) customs duties on electronic transmissions. The study highlights where divergencies exist in adopted approaches, indicating the need for the four countries – and AfCFTA members in general – to carefully consider the implications of the divergences, and determine where it is possible and beneficial to harmonise approaches. This was intended to encourage AfCFTA member states to take ownership of these issues and reflect on the reforms needed. As seen in Table 1 below, the study shows that the four countries diverge on most of the five policy issues. There are differences in how all four countries regulate online transactions – that is, e-signatures and online consumer protection. Nigeria was the only country out of the four to recognise all types of e-signatures as legally equivalent. Kenya and Senegal only recognise specific e-signatures, which are either issued or validated by a recognised institution, while South Africa adopts a mixed approach, where it recognises all e-signatures as legally valid, but provides higher evidentiary weight to certain types of e-signatures. Only South Africa and Senegal have specific regulations relating to online consumer protection, while Nigeria and Kenya do not have any clear rules. With regards to cross border data flows, data localisation, and personal data protection, the study shows that all four focus countries have regulations that consist of elements borrowed from the European Union (EU) General Data Protection Regulation (GDPR). In particular, this was regarding the need for the data subject's consent, and also the adequacy requirement. Interestingly, the study also shows that South Africa, Kenya and Nigeria also adopt data localisation measures, although at different levels of strictness. South Africa’s data localisation laws are mostly imposed on data that is considered critical – which is then required to be processed within South African borders – while Nigeria requires all data to be processed and stored locally, using local servers. Kenya imposes data localisation measures that are mostly linked to its priority for data privacy. Out of the four focus countries, Senegal is the only country that does not impose any data localisation laws. Although the study shows that all four countries share a position on customs duties on electronic transmissions, it is also interesting to note that none of the four countries currently have domestic regulations or policies on the subject. The report concludes by highlighting that, as the AfCFTA Phase II Negotiations aim to arrive at harmonisation and to improve intra-African trade and international trade, AfCFTA members should reflect on their national policies and domestic regulations to determine where harmonisation is needed, and whether AfCFTA is the right platform for achieving this efficiently.
APA, Harvard, Vancouver, ISO, and other styles
6

Rycroft, Taylor, Sabrina Larkin, Alexander Ganin, Treye Thomas, Joanna Matheson, Tessa Van Grack, Xinrong Chen, Kenton Plourde, Alan Kennedy, and Igor Linkov. A framework and pilot tool for the risk-based prioritization and grouping of nano-enabled consumer products. Engineer Research and Development Center (U.S.), August 2021. http://dx.doi.org/10.21079/11681/41721.

Full text
Abstract:
The use of engineered nanomaterials (ENMs) in consumer products has expanded rapidly, revealing both innovative improvements over conventional materials, and the potential for novel risks to human health and the environment. As the number of new nano-enabled products and the volume of toxicity data on ENMs continues to grow, regulatory agencies like the U.S. Consumer Product Safety Commission (CPSC) – a small, independent federal agency responsible for protecting consumers from unreasonable risks associated with product use – will require the ability to screen and group a diverse array of nano-enabled consumer products based on their potential risks to consumers. Such prioritization would allow efficient allocation of limited resources for subsequent testing and evaluation of high-risk products and materials. To enable this grouping and prioritization for further testing, we developed a framework that establishes a prioritization score by evaluating a nano-enabled product's potential hazard and exposure, as well as additional consideration of regulatory importance. We integrate the framework into a pilot version software tool and, using a hypothetical case study, we demonstrate that the tool can effectively rank nano-enabled consumer products and can be adjusted for use by agencies with different priorities. The proposed decision-analytical framework and pilot-version tool presented here could enable a regulatory agency like the CPSC to triage reported safety concerns more effectively and allocate limited resources more efficiently.
APA, Harvard, Vancouver, ISO, and other styles
7

Jones, Emily, Beatriz Kira, Anna Sands, and Danilo B. Garrido Alves. The UK and Digital Trade: Which way forward? Blavatnik School of Government, February 2021. http://dx.doi.org/10.35489/bsg-wp-2021/038.

Full text
Abstract:
The internet and digital technologies are upending global trade. Industries and supply chains are being transformed, and the movement of data across borders is now central to the operation of the global economy. Provisions in trade agreements address many aspects of the digital economy – from cross-border data flows, to the protection of citizens’ personal data, and the regulation of the internet and new technologies like artificial intelligence and algorithmic decision-making. The UK government has identified digital trade as a priority in its Global Britain strategy and one of the main sources of economic growth to recover from the pandemic. It wants the UK to play a leading role in setting the international standards and regulations that govern the global digital economy. The regulation of digital trade is a fast-evolving and contentious issue, and the US, European Union (EU), and China have adopted different approaches. Now that the UK has left the EU, it will need to navigate across multiple and often conflicting digital realms. The UK needs to decide which policy objectives it will prioritise, how to regulate the digital economy domestically, and how best to achieve its priorities when negotiating international trade agreements. There is an urgent need to develop a robust, evidence-based approach to the UK’s digital trade strategy that takes into account the perspectives of businesses, workers, and citizens, as well as the approaches of other countries in the global economy. This working paper aims to inform UK policy debates by assessing the state of play in digital trade globally. The authors present a detailed analysis of five policy areas that are central to discussions on digital trade for the UK: cross-border data flows and privacy; internet access and content regulation; intellectual property and innovation; e-commerce (including trade facilitation and consumer protection); and taxation (customs duties on e-commerce and digital services taxes). In each of these areas the authors compare and contrast the approaches taken by the US, EU and China, discuss the public policy implications, and examine the choices facing the UK.
APA, Harvard, Vancouver, ISO, and other styles
8

Abdul Hamid, Umar Zakir. Privacy for Software-defined Battery Electric Vehicles. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, June 2024. http://dx.doi.org/10.4271/epr2024012.

Full text
Abstract:
<div class="section abstract"><div class="htmlview paragraph">The integration of software-defined approaches with software-defined battery electric vehicles brings forth challenges related to privacy regulations, such as European Union’s General Data Protection Regulation and Data Act, as well as the California Consumer Privacy Act. Compliance with these regulations poses barriers for foreign brands and startups seeking entry into these markets. Car manufacturers and suppliers, particularly software suppliers, must navigate complex privacy requirements when introducing vehicles to these regions.</div><div class="htmlview paragraph"><b>Privacy for Software-defined Battery Electric Vehicles</b> aims to educate practitioners across different market regions and fields. It seeks to stimulate discussions for improvements in processes and requirements related to privacy aspects regarding these vehicles. The report covers the significance of privacy, potential vulnerabilities and risks, technical challenges, safety risks, management and operational challenges, and the benefits of compliance with privacy standards within the software-defined battery electric vehicle realm.</div><div class="htmlview paragraph"><a href="https://www.sae.org/publications/edge-research-reports" target="_blank">Click here to access the full SAE EDGE</a><sup>TM</sup><a href="https://www.sae.org/publications/edge-research-reports" target="_blank"> Research Report portfolio.</a></div></div>
APA, Harvard, Vancouver, ISO, and other styles
9

Ferrero-Regis, Tiziana, Zoe Mellick, and Justine Coneybeer. Stitching a future: Ethical labour and growth in the Queensland fashion and clothing industry. Queensland University of Technology, 2024. https://doi.org/10.5204/rep.eprints.254521.

Full text
Abstract:
Executive summary South-East Queensland (SEQ) is Australia’s third-largest regional hub for textile, clothing, and footwear (TCF) manufacturing in terms of economic output and workforce. As Australia pursues policies to reshore manufacturing, creating higher-quality jobs in areas such as sorting, repair, resale, remanufacture to meet environmental targets and growing consumer demand for sustainably and ethically produced goods, the importance of ethical accreditation frameworks has become more pronounced. The aim of this study is to explore stakeholder perceptions of the benefits and barriers of ethical accreditation for TCF businesses in SEQ. It provides recommendations that support the region as a leader in ethical TCF manufacturing while supporting sustainability goals and worker protection. This report draws on research conducted in 2024, which included in-depth interviews with both ECA-accredited and non-accredited manufacturers, as well as a survey targeting stakeholders in the SEQ TCF industry. Data collection was centred on three key objectives: to understand businesses knowledge about ethical accreditation; to understand the role that accreditation plays for the growth of the industry; and to evaluate the opportunities and barriers surrounding ethical accreditation in SEQ. The findings highlight a complex landscape in which TCF businesses in Queensland are grappling with challenges related to legal compliance, accreditation and local manufacturing growth. While there is an awareness of the benefits of ethical accreditation, barriers such as knowledge gaps, the costs and time involved in the accreditation process, and resistance to external audits remain prevalent. Government policies that favour accredited businesses suggests that targeted incentives and support mechanisms are key to overcoming these barriers. Additionally, the skills gap in local manufacturing calls for a more coordinated and long-term strategy to ensure the growth and sustainability of the sector both in Queensland and Australia. Addressing these issues will be crucial in fostering an ethical and competitive TCF industry in the state.
APA, Harvard, Vancouver, ISO, and other styles
10

Turner, Paul, and John O'Brien. Review of the FSA’s research programme on food hypersensitivity. Food Standards Agency, June 2021. http://dx.doi.org/10.46756/sci.fsa.bka542.

Full text
Abstract:
The overarching mission of the Food Standards Agency (FSA) is tothe ensure that food is safe, food is what it says it is and that consumers can make informed choices about what to eat. These are of central importance to consumers with food hypersensitivity(FHS).Food hypersensitivity (FHS) encompasses both immune-mediated food hypersensitivity (food allergy and coeliac disease) and non-immune food intolerances. FHS is a complex, multifactorial disease of concern to multiple stakeholders including consumers with FHS, their families, clinicians, regulatory agencies and policy makers, scientists, food manufacturers and food business operators. It affects around 5-8% of children and 2-3% of adults in the UK, and although rare, can be fatal. Public concern over FHS has grown in recent years. In the UK and elsewhere, food recalls due to the presence of undeclared allergens feature predominantly in food alerts; legislation over food labelling has become clearer, and consumers and producers are more aware of FHS. The FSA has been a major funder of research into FHS for over 2 decades, and the outputs of the research programme has had significant impacts at a national and global scale, most notably in the area of the prevention of FHS in children and the presence of declared and undeclared allergens in food products. Strengthening protections for consumers with FHS is a top priority for the FSA. The FSA has established a Food Hypersensitivity Programme Board to oversee and coordinate its work in this area. The working group was tasked with reviewing the research into FHS supported by the Food Standards Agency to date, and prioritising those priority areas where the current scientific evidence is limited and therefore should be a focus for future research investment. The aim –to make the UK the best country in the world for consumers with food hypersensitivity.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography