To see the other types of publications on this topic, follow the link: Data protection.

Journal articles on the topic 'Data protection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Data protection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Gama, Cruz. "Data protection and personal data protection." Brazilian Journal of Clinical Medicine and Review 1, Suppl.1 (2023): 18. http://dx.doi.org/10.52600/2965-0968.bjcmr.2023.1.suppl.1.18.

Full text
Abstract:
In Angola, the right to privacy is one of the fundamental rights enshrined in the Constitution of the Republic. In addition to the Constitution, the legal framework on the protection of personal data is complemented by other laws, with regard to the Personal Data Protection Law, No. 22/11 of 17 June, which establishes legal rules for the processing of such data and establishes Data Protection (DPA), as the public authority responsible for monitoring compliance with those rules and exercising. The unequivocal and express consent of the data subject or his legal representative and prior notifica
APA, Harvard, Vancouver, ISO, and other styles
2

Chamberlain, Johanna, and Andreas Kotsios. "Data protection beyond data protection regulation." Stiftelsen Juridisk Fakultetslitteratur, no. 2024 2 (January 17, 2024): 397–424. http://dx.doi.org/10.53292/bd1fa11c.282687ef.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Varsha, Gehlot. "COMPARISON OF DATA PROTECTION LAWS IN INDIA WITH RESPECT TO GDPR." Indian Journal of Law and Society I, no. 8 (2024): 160–77. https://doi.org/10.5281/zenodo.10644661.

Full text
Abstract:
<strong>ABSTRACT</strong> <em>This academic legal analysis compares the General Data Protection Regulation (GDPR) of the European Union with India's Digital Personal Data Protection Act (DPDPA) to determine whether the two pieces of legislation are compatible with one another. As we live in an increasingly digital world where information is freely shared across borders, data protection has become a pressing legal and societal concern. In 2018, the General Data Protection Regulation (GDPR) became law, setting a global standard for stricter data protection procedures with an emphasis on protecti
APA, Harvard, Vancouver, ISO, and other styles
4

Alhababi, Hamad Hamed. "Cross-Border Data Transfer between the gcc Data Protection Laws and the gdpr." Global Journal of Comparative Law 13, no. 2 (2024): 178–200. http://dx.doi.org/10.1163/2211906x-13020003.

Full text
Abstract:
Abstract This article explores the procedures related to data protection laws in the Gulf Cooperation Council States (gcc) and the European Union (EU) regarding the General Data Protection Regulation (gdpr). It draws conclusions about the rules governing the transfer of personal information outside of a country. Transfers of personal data to foreign countries or international organizations are discussed, specifically, transfers based on an ‘adequacy’ judgment, or transfers subject to suitable protections. The article also highlights the primary modifications made to safeguard the outbound tran
APA, Harvard, Vancouver, ISO, and other styles
5

Rahmah, Siti, Darmiwati, and Fitri Wahyuni. "Perlindungan Hukum Terhadap Data Pribadi di Era Big Data." Jurnal Indragiri Penelitian Multidisiplin 4, no. 3 (2024): 43–50. https://doi.org/10.58707/jipm.v4i3.1043.

Full text
Abstract:
The increasingly massive use of information and communication technology has raised concerns about protecting personal data in the era of big data which can harm individuals. Big Data as a form of technological development has not been balanced with developments in legal regulations, so there is no harmony between the use of Big Data and legal regulations related to the protection of personal data. Regulations related to the protection of personal data that already exist in Indonesia cannot guarantee and protect confidentiality and overcome the problem of protecting citizens' personal data. Th
APA, Harvard, Vancouver, ISO, and other styles
6

Walker-Osborn, C., L. Fitzsimons, and J. Ruane. "Data Protection." ITNOW 55, no. 3 (2013): 38–39. http://dx.doi.org/10.1093/itnow/bwt050.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rowe, Heather, and Robin McGilligan. "DATA PROTECTION." Computer Law & Security Review 17, no. 5 (2001): 333–35. http://dx.doi.org/10.1016/s0267-3649(01)00511-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dinant, Jean-Marc, and Ewout Keuleers. "Data protection." Computer Law & Security Review 20, no. 1 (2004): 22–28. http://dx.doi.org/10.1016/s0267-3649(04)00005-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chalton, Simon. "Data protection." Computer Law & Security Review 13, no. 6 (1997): 425–28. http://dx.doi.org/10.1016/s0267-3649(97)89792-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sizer, Richard. "Data protection." Computer Law & Security Review 2, no. 5 (1987): 13–15. http://dx.doi.org/10.1016/0267-3649(87)90007-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Reynolds, Chris. "Data protection." Computer Law & Security Review 5, no. 6 (1990): 19–22. http://dx.doi.org/10.1016/0267-3649(90)90059-k.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Clark, Robert. "Data protection." Computer Law & Security Review 6, no. 6 (1991): 16–19. http://dx.doi.org/10.1016/0267-3649(91)90172-r.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

George, R. E. "Data protection." Physics Bulletin 37, no. 9 (1986): 363. http://dx.doi.org/10.1088/0031-9112/37/9/001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Saxby, S. "Data protection." Computer Law & Security Review 21, no. 3 (2005): 277. http://dx.doi.org/10.1016/j.clsr.2005.01.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Rowe, Heather. "Data protection." Computer Law & Security Review 10, no. 1 (1994): 47. http://dx.doi.org/10.1016/0267-3649(94)90092-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Mamanazarov, Sardor. "Methods and Tools for Personal Data Protection in Big Data: Analysis of Uzbekistan’s Legal Framework." International Journal of Law and Policy 3, no. 4 (2025): 20–40. https://doi.org/10.59022/ijlp.322.

Full text
Abstract:
This study examines methods and tools for protecting personal data in the Big Data context, with a focus on Uzbekistan’s legal framework. The research analyzes anonymization, pseudonymization, privacy notices, privacy impact assessments, privacy by design, and ethical approaches to data protection. Through comparative analysis with international standards such as GDPR, the study identifies significant gaps in Uzbekistan’s “On Personal Data” law, which lacks specific provisions on modern data protection tools. Research findings reveal that while basic protections exist, Uzbekistan’s legislation
APA, Harvard, Vancouver, ISO, and other styles
17

Editorial, Team IndraStra Global. "Understanding the DNA of EU's GDPR." IndraStra Global 004, no. 04 (2018): 0021. https://doi.org/10.5281/zenodo.1221358.

Full text
Abstract:
On May 25, 2018, a new data protection regulation touted as&nbsp;<strong>General Data Protection Regulation (GDPR), Regulation (European Union - EU) 2016/689</strong>, will come into force in the European Union (EU) and its 28 Member States. It will replace the&nbsp;<strong>1995 EU Data Protection Directive&nbsp;95/46/EC</strong>.&nbsp; The GDPR will have a significant impact in protecting the data and digital footprint of users of apps and another digital platform. It will provide significant new data privacy protections for individuals residing in EU&nbsp;states.
APA, Harvard, Vancouver, ISO, and other styles
18

Mishra, Amit. "Fundamental Rights and Data Protection (Balancing Innovation and Privacy in Light of Digital Personal Data Protection Act, 2023)." International Journal of Science and Research (IJSR) 13, no. 5 (2024): 332–37. http://dx.doi.org/10.21275/mr24504204804.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Khamidovna, Akbarova Marguba, Sharipov Bahodir Akilovich, Zhangazova Kumriniso Abdulvahobovna, and Nurdullaev Alisher Niyatilla ugli. "The Importance of Data Protection in Institutions." American Journal Of Applied Science And Technology 5, no. 4 (2025): 77–81. https://doi.org/10.37547/ajast/volume05issue04-17.

Full text
Abstract:
This article explores the necessity and challenges of data protection in institutions. The research utilized data collection and analysis methods, including surveys and interviews. The results of the study demonstrated the effectiveness of data protection methods and strategies. The findings indicate that data protection plays a crucial role in maintaining the organization’s reputation and ensuring customer trust.
APA, Harvard, Vancouver, ISO, and other styles
20

Khamidovna, Akbarova Marguba, Sharipov Bahodir Akilovich, Djangazova Kumriniso Abdulvahobovna, and Nurdullaev Alisher Niyatilla ugli. "New Approaches to Data Identification and Protection." American Journal Of Applied Science And Technology 5, no. 4 (2025): 82–86. https://doi.org/10.37547/ajast/volume05issue04-18.

Full text
Abstract:
The article examines the issue of ensuring information security and privacy. New techniques for data protection are proposed through encryption, maintaining anonymity, and other protective measures. It is shown that updating encryption algorithms and enhancing data anonymity can significantly improve the effectiveness of data protection. A roadmap for scientific and technological communities to develop new strategies for data protection is proposed.
APA, Harvard, Vancouver, ISO, and other styles
21

Begum, Shameena, V. Ratna Vasuki, and K. V. V. Srinivas K.V.V.Srinivas. "Data Security and Protection in Cloud Computing." International Journal of Scientific Research 1, no. 2 (2012): 31–34. http://dx.doi.org/10.15373/22778179/jul2012/9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Aljibawi, Mayas, and Roslan Ismail. "Personal Data Protection Acts: Concepts and Review." International Journal of Scientific Engineering and Research 2, no. 9 (2014): 12–16. https://doi.org/10.70729/j2013362.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Aruna, K. B., A. LallithaShri, Aravindh ., Jayakumar ., and Jayasurya . "Protection for Multi Owner Data Sharing Scheme." Bonfring International Journal of Advances in Image Processing 7, no. 1 (2017): 01–05. http://dx.doi.org/10.9756/bijaip.10485.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

-. "Data Protection Agreement." ASA Bulletin 37, Issue 4 (2019): 838–52. http://dx.doi.org/10.54648/asab2019076.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Blackwell, D. "Data protection countdown." Computer Bulletin 40, no. 3 (1998): 22–23. http://dx.doi.org/10.1093/combul/40.3.22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Gossman, P., and J. R. Wilkinson. "Data Protection Act." BMJ 295, no. 6610 (1987): 1418. http://dx.doi.org/10.1136/bmj.295.6610.1418.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Jakobs, Kai. "Data protection dangers." Science and Public Policy 29, no. 2 (2002): 149–50. http://dx.doi.org/10.1093/spp/29.2.149.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

BLUME, PETER. "Practical data protection." International Journal of Law and Information Technology 2, no. 2 (1994): 194–209. http://dx.doi.org/10.1093/ijlit/2.2.194.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Priest, R. G. "Data Protection Act." Psychiatric Bulletin 12, no. 5 (1988): 204. http://dx.doi.org/10.1192/pb.12.5.204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Dhont, Jan, and Yves Poullet. "Data protection — Belgium." Computer Law & Security Review 16, no. 1 (2000): 5–19. http://dx.doi.org/10.1016/s0267-3649(00)87063-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Rowe, Heather. "EU data protection." Computer Law & Security Review 16, no. 1 (2000): 41–42. http://dx.doi.org/10.1016/s0267-3649(00)87072-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Jackson, Margaret. "DATA PROTECTION - AUSTRALIA." Computer Law & Security Review 16, no. 3 (2000): 166–69. http://dx.doi.org/10.1016/s0267-3649(00)88911-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Bygrave, Lee A. "EUROPEAN DATA PROTECTION." Computer Law & Security Review 16, no. 4 (2000): 252–57. http://dx.doi.org/10.1016/s0267-3649(00)89134-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Carey, Peter, and David Berry. "DATA PROTECTION — SECURITY." Computer Law & Security Review 18, no. 2 (2002): 112–13. http://dx.doi.org/10.1016/s0267-3649(02)03010-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Ajana, Btihaj. "Reinventing data protection?" Identity in the Information Society 2, no. 3 (2009): 355–58. http://dx.doi.org/10.1007/s12394-009-0025-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Davies, David. "Data protection corner." Computer Law & Security Review 1, no. 5 (1986): 9–11. http://dx.doi.org/10.1016/0267-3649(86)90007-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Kolb, Angela. "Data protection — Germany." Computer Law & Security Review 7, no. 3 (1991): 123–26. http://dx.doi.org/10.1016/0267-3649(91)90089-e.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Poullet, Y., and M. H. Boulanger. "Data protection — medicine." Computer Law & Security Review 6, no. 5 (1991): 18–23. http://dx.doi.org/10.1016/0267-3649(91)90150-t.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Determann, Lothar. "Healthy Data Protection." Michigan Technology Law Review, no. 26.2 (2020): 229. http://dx.doi.org/10.36645/mtlr.26.2.healthy.

Full text
Abstract:
Modern medicine is evolving at a tremendous speed. On a daily basis, we learn about new treatments, drugs, medical devices, and diagnoses. Both established technology companies and start-ups focus on health-related products and services in competition with traditional healthcare businesses. Telemedicine and electronic health records have the potential to improve the effectiveness of treatments significantly. Progress in the medical field depends above all on data, specifically health information. Physicians, researchers, and developers need health information to help patients by improving diag
APA, Harvard, Vancouver, ISO, and other styles
40

Priest, R. G. "Data Protection Act." Bulletin of the Royal College of Psychiatrists 12, no. 5 (1988): 204. http://dx.doi.org/10.1192/s0140078900020162.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

McIntyre, T. J. "Reinventing data protection?" Computer Law & Security Review 26, no. 6 (2010): 673–76. http://dx.doi.org/10.1016/j.clsr.2010.07.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Bak, Başak. "Protecting Genetic Privacy in Biobanking through Data Protection Law by Dara Hallinan." Northern Ireland Legal Quarterly 76, no. 1 (2025): 146–49. https://doi.org/10.53386/nilq.v76i1.1187.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

ANA, DHAMO. "EUROPEAN GENERAL DATA PROTECTION REGULATION VS HABEAS DATA." INTERNATIONAL JOURNAL OF NEW HORIZONS IN THE SOCIAL SCIENCES 1, no. 1 (2024): 37–40. https://doi.org/10.5281/zenodo.10600296.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Poongodi, R. K. "Biometric for Data Protection." International Journal for Research in Applied Science and Engineering Technology 13, no. 2 (2025): 159–63. https://doi.org/10.22214/ijraset.2025.66818.

Full text
Abstract:
Biometric data, including fingerprints, facial recognition, iris scans, and voice patterns, has become a vital tool in various industries, offering enhanced security and streamlined user experiences. However, the use of biometric data raises significant concerns regarding privacy and data protection due to its sensitive nature and potential for misuse. This abstract discusses the importance of protecting biometric data, examining the risks associated with its collection, storage, and processing, as well as the legal frameworks that govern its use. Key regulations such as the General Data Prote
APA, Harvard, Vancouver, ISO, and other styles
45

Shahul Ikram, Nur Adlin Hanisah. "DATA BREACHES EXIT STRATEGY: A COMPARATIVE ANALYSIS OF DATA PRIVACY LAWS." Malaysian Journal of Syariah and Law 12, no. 1 (2024): 135–47. http://dx.doi.org/10.33102/mjsl.vol12no1.458.

Full text
Abstract:
Data has become highly valuable in the era of digitalisation and is the main target of cybercriminals. Cybercriminals steal data by exploiting system vulnerabilities. The rise of catastrophic data breach incidents affects business operations, reputation and legal standing, leading to business disruptions, financial loss and reputation damage. These incidents have raised data security concerns. The frequent incident is partly due to insufficient security measures in place. This article employs doctrinal research focusing on legal principles based on legislation to analyse Malaysia’s legal frame
APA, Harvard, Vancouver, ISO, and other styles
46

Hallinan, D. "Opinions ∙ Data Protection without Data: Could Data Protection Law Apply without Personal Data Being Processed?" European Data Protection Law Review 5, no. 3 (2019): 293–99. http://dx.doi.org/10.21552/edpl/2019/3/5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Guzmán-Rodríguez, Héctor E. "Data Protection in Mexico: One Right, Two Systems, Different Protections and Uncontrolled Data Breaches." Global Privacy Law Review 2, Issue 2 (2021): 149–54. http://dx.doi.org/10.54648/gplr2021019.

Full text
Abstract:
To obtain a complete understanding of how data protection laws apply in Mexico, readers must start with the following fact: There are two main data protection laws in Mexico. One applies to companies and individuals processing personal data for non-household activities, the other provides the framework that all Mexican States shall follow to regulate data processing by public entities identified as ‘sujetos obligados’ or ‘obligated subjects’. Even when both laws regulate ‘data protection’ in a very similar way, a close look into them reveals that they provide different rights to data subjects
APA, Harvard, Vancouver, ISO, and other styles
48

Mendes de Leon, Pablo. "The Fight Against Terrorism Through Aviation: Data Protection Versus Data Protection." Air and Space Law 31, Issue 4/5 (2006): 320–30. http://dx.doi.org/10.54648/aila2006027.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Hu, Pengnian, and Qian Wei. "Research on Personal Data Protection of EU General Data Protection Regulation." IOP Conference Series: Materials Science and Engineering 806 (May 5, 2020): 012003. http://dx.doi.org/10.1088/1757-899x/806/1/012003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Hemmings, Nicholas, and Joseph Noar. "Data protection is changing − the new general data protection regulations (GDPR)." Orthodontic Update 11, no. 3 (2018): 110–14. http://dx.doi.org/10.12968/ortu.2018.11.3.110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!