Academic literature on the topic 'Information privacy law'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Information privacy law.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Information privacy law"
Moreham, N. A. "BEYOND INFORMATION: PHYSICAL PRIVACY IN ENGLISH LAW." Cambridge Law Journal 73, no. 2 (July 2014): 350–77. http://dx.doi.org/10.1017/s0008197314000427.
Full textO’Callaghan, Patrick. "False Privacy and Information Games." Journal of European Tort Law 4, no. 3 (November 1, 2013): 282–305. http://dx.doi.org/10.1515/jetl-2013-0019.
Full textLitman, Jessica. "Information Privacy/Information Property." Stanford Law Review 52, no. 5 (May 2000): 1283. http://dx.doi.org/10.2307/1229515.
Full textRowlingson, R. R. "Marrying privacy law to information security." Computer Fraud & Security 2006, no. 8 (August 2006): 4–6. http://dx.doi.org/10.1016/s1361-3723(06)70408-0.
Full textCiocchetti, Corey A. "E-Commerce and Information Privacy: Privacy Policies as Personal Information Protectors." American Business Law Journal 44, no. 1 (March 2007): 55–126. http://dx.doi.org/10.1111/j.1744-1714.2007.00031.x.
Full textBlume, Peter. "Danish Data Protection with Respect to Law Libraries." International Journal of Legal Information 31, no. 3 (2003): 452–61. http://dx.doi.org/10.1017/s0731126500003735.
Full textMoore, Adam D. "Privacy, Speech, and the Law." Journal of Information Ethics 22, no. 1 (April 1, 2013): 21–43. http://dx.doi.org/10.3172/jie.22.1.21.
Full textZhu, Wei. "Personal Information Security Environment Monitoring and Law Protection Using Big Data Analysis." Journal of Environmental and Public Health 2022 (October 7, 2022): 1–12. http://dx.doi.org/10.1155/2022/1558161.
Full textHartshorne, John. "The need for an intrusion upon seclusion privacy tort within English law." Common Law World Review 46, no. 4 (November 23, 2017): 287–305. http://dx.doi.org/10.1177/1473779517739798.
Full textSolove, Daniel J. "Privacy and Power: Computer Databases and Metaphors for Information Privacy." Stanford Law Review 53, no. 6 (July 2001): 1393. http://dx.doi.org/10.2307/1229546.
Full textDissertations / Theses on the topic "Information privacy law"
Cofone, Ignacio Nicolas <1987>. "Privacy Tradeoffs in Information Technology Law." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amsdottorato.unibo.it/7246/.
Full textHering, Ana-Klara. "Post-mortem relational privacy expanding the sphere of personal information protected by privacy law /." [Gainesville, Fla.] : University of Florida, 2009. http://purl.fcla.edu/fcla/etd/UFE0024742.
Full textEl-Sheikh, Mahmoud Mohamed Omar. "Developing a Libyan information privacy framework." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/65866/1/Mahmoud%20Mohamed%20Omar_El-Sheikh_Thesis.pdf.
Full textMora, Guerra Mario Ivan. "Privacy law issues for encryption and government control in Mexico." Thesis, McGill University, 1996. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=27462.
Full textThis thesis studies the legal challenge of achieving a balanced legislative answer that ensures maximum protection of privacy without conflicting with law enforcement. It also warns the Mexican Consultant Committee on Informatic Policies about the potential problems that the use of encryption technologies will create in Mexico and proposes some solutions.
Mexico is urged to reform its laws pertaining to privacy and confidentiality, and to regulate the illegal and beneficial uses of encryption, in order to achieve a comprehensive and poised legal and administrative infrastructure for information technologies, privacy and encryption. We lay out basic legal parameters to shape a future encryption law in Mexico, emphasizing that the Mexican Government should guarantee that any Mexican can use, develop, market, import or export any encryption product, and that in no event should the Mexican Government impose any compulsory encryption standard. In order to control the criminal use of encryption, we suggest lawful compulsory decryption and certain encryption use restrictions in cases where these technologies are found to have been used to further a crime.
Cofone, Ignacio Nicolas [Verfasser], and Klaus [Akademischer Betreuer] Heine. "Privacy Tradeoffs in Information Technology Law / Ignacio Nicolas Cofone ; Betreuer: Klaus Heine." Hamburg : Staats- und Universitätsbibliothek Hamburg, 2017. http://d-nb.info/1124591397/34.
Full textCofone, Ignacio Nicolas Verfasser], and Klaus [Akademischer Betreuer] [Heine. "Privacy Tradeoffs in Information Technology Law / Ignacio Nicolas Cofone ; Betreuer: Klaus Heine." Hamburg : Staats- und Universitätsbibliothek Hamburg, 2017. http://d-nb.info/1124591397/34.
Full textBurdon, Mark. "The conceptual and operational compatibility of data breach notification and information privacy laws." Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/47512/1/Mark_Burdon_Thesis.pdf.
Full textGrigalashvili, Mariam. "Taxpayers’ rights protection during exchange of information : Whether taxpayers’ rights (right to privacy, participation rights) aresufficiently protected during exchange of information." Thesis, Uppsala universitet, Juridiska institutionen, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-409537.
Full textElliott, Anne A. "Rights in Conflict: Freedom of Information versus the Family Education Rights and Privacy Act." Ohio University Honors Tutorial College / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ouhonors1341505659.
Full textBanerjea-Brodeur, Nicolas Paul. "Advance passenger information passenger name record : privacy rights and security awareness." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=80909.
Full textPassenger Name Record access permits authorities to have additional data that could identify individuals requiring more questioning prior to border control clearance. This data does not cause in itself privacy issues other than perhaps the potential retention and manipulation of information that Border Control Authorities may acquire. In essence, bilateral agreements between governments should be sought in order to protect national legislation.
The common goal of the airline industry is to ensure safe and efficient air transport. API and PNR should be viewed as formalities that can facilitate border control clearance and prevent the entrance of potentially high-risk individuals.
Books on the topic "Information privacy law"
1959-, Schwartz Paul M., ed. Information privacy law. 4th ed. New York: Wolters Kluwer Law & Business, 2011.
Find full textMarc, Rotenberg, and Schwartz Paul M. 1959-, eds. Information privacy law. 2nd ed. New York: Aspen Publishers, 2005.
Find full text1959-, Schwartz Paul M., ed. Information privacy law. 3rd ed. New York, NY: Aspen Publishers, 2008.
Find full textTucker, Greg. Information privacy law in Australia. Melbourne, Australia: Longman Professional, 1992.
Find full textWacks, Raymond. Personal information: Privacy and the law. Oxford: Clarendon Press, 1993.
Find full textWacks, Raymond. Personal information: Privacy and the law. Oxford: Clarendon Press, 1989.
Find full text1959-, Schwartz Paul M., ed. Privacy, information, and technology. 3rd ed. New York: Wolters Kluwer Law & Business, 2011.
Find full text1959-, Schwartz Paul M., ed. Privacy, information, and technology. 2nd ed. New York: Aspen Publishers, 2008.
Find full textBook chapters on the topic "Information privacy law"
Vedder, Anton. "Privacy 3.0." In Information Technology and Law Series, 17–28. The Hague, The Netherlands: T. M. C. Asser Press, 2011. http://dx.doi.org/10.1007/978-90-6704-731-9_2.
Full textKlitou, Demetrius. "Privacy-Invading Technologies." In Information Technology and Law Series, 49–69. The Hague: T.M.C. Asser Press, 2014. http://dx.doi.org/10.1007/978-94-6265-026-8_4.
Full textLeenes, Ronald, and Bert-Jaap Koops. "‘Code’ and Privacy or How Technology is Slowly Eroding Privacy." In Information Technology and Law Series, 141–203. The Hague: T.M.C. Asser Press, 2006. http://dx.doi.org/10.1007/978-90-6704-595-7_5.
Full textKlitou, Demetrius. "Privacy, Liberty and Security." In Information Technology and Law Series, 13–25. The Hague: T.M.C. Asser Press, 2014. http://dx.doi.org/10.1007/978-94-6265-026-8_2.
Full textEdwards, Chris, and Nigel Savage. "Data Privacy: the UK Experience." In Information Technology & The Law, 70–120. London: Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-11768-0_5.
Full textEdwards, Chris, and Nigel Savage. "Data Privacy: The Uk Experience." In Information Technology & The Law, 75–142. London: Macmillan Education UK, 1986. http://dx.doi.org/10.1007/978-1-349-08652-8_5.
Full textDeighton, John. "Market Solutions to Privacy Problems?" In Information Technology and Law Series, 137–46. The Hague: T.M.C. Asser Press, 2003. http://dx.doi.org/10.1007/978-90-6704-579-7_6.
Full textShanapinda, Stanley. "Location Information as Personal Information, to Better Protect Privacy." In Law, Governance and Technology Series, 119–59. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50255-3_6.
Full textRotter, Pawel, and Mark N. Gasson. "Implantable Medical Devices: Privacy and Security Concerns." In Information Technology and Law Series, 63–66. The Hague, The Netherlands: T. M. C. Asser Press, 2012. http://dx.doi.org/10.1007/978-90-6704-870-5_6.
Full textKlitou, Demetrius. "Assessing the Adequacy of a Privacy Legal Framework." In Information Technology and Law Series, 27–45. The Hague: T.M.C. Asser Press, 2014. http://dx.doi.org/10.1007/978-94-6265-026-8_3.
Full textConference papers on the topic "Information privacy law"
Bhatia, Jaspreet, and Travis D. Breaux. "Towards an information type lexicon for privacy policies." In 2015 IEEE Eighth International Workshop on Requirements Engineering and Law (RELAW). IEEE, 2015. http://dx.doi.org/10.1109/relaw.2015.7330207.
Full textShariatnasab, Mahshad, Farhad Shirani, and Zahid Anwar. "Privacy Limits in Power-Law Bipartite Networks under Active Fingerprinting Attacks." In 2022 IEEE International Symposium on Information Theory (ISIT). IEEE, 2022. http://dx.doi.org/10.1109/isit50566.2022.9834378.
Full textFeng, Wei. "Research on anti-counterfeiting encryption method of e-commerce users' privacy information under the protection of civil and Commercial Law." In 2021 13th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA). IEEE, 2021. http://dx.doi.org/10.1109/icmtma52658.2021.00164.
Full textPrasetyorini, Sinto. "The Scientific Synergy in Handling the Crisis of The Covid-19 Outbreak: Privacy Protection Vs. Public Information Transparency." In Proceedings of the 2nd International Conference on Law, Social Science, Economics, and Education, ICLSSEE 2022, 16 April 2022, Semarang, Indonesia. EAI, 2022. http://dx.doi.org/10.4108/eai.16-4-2022.2320047.
Full textSovova, Olga. "ERA OF DIGITIZATION: RE-DESIGNING PRIVACY PROTECTION IN HEALTH CARE." In NORDSCI International Conference Proceedings. Saima Consult Ltd, 2019. http://dx.doi.org/10.32008/nordsci2019/b2/v2/31.
Full textMartins Razera, Tatiele, Vinícius Brancher Almada, Vinícius Soares Nascimento, Gabriel Gussella de Araújo Martins, and Ademir Camillo Junior. "Análise da Política de Privacidade com a LGPD." In Computer on the Beach. Itajaí: Universidade do Vale do Itajaí, 2022. http://dx.doi.org/10.14210/cotb.v13.p304-305.
Full textĐurđić, Tamara. "PRAVO NA ZAŠTITU GENETSKE PRIVATNOSTI." In 14 Majsko savetovanje. University of Kragujevac, Faculty of Law, 2018. http://dx.doi.org/10.46793/xivmajsko.651dj.
Full textSoares, Álysson De Sá, Ricardo Batista Das Neves Junior, and Byron Leite Dantas Bezerra. "BID Dataset: a challenge dataset for document processing tasks." In Conference on Graphics, Patterns and Images. Sociedade Brasileira de Computação, 2020. http://dx.doi.org/10.5753/sibgrapi.est.2020.12997.
Full textMello, Victor, Tania Basso, and Regina Moraes. "A Test Process Model to Evaluate Performance Impact of Privacy Protection Solutions." In Workshop de Testes e Tolerância a Falhas. Sociedade Brasileira de Computação - SBC, 2014. http://dx.doi.org/10.5753/wtf.2014.22946.
Full textLADYCHENKO, Viktor. "INFORMATION POLICY IN THE ENVIRONMENTAL SPHERE IN THE CONTEXT OF SUSTAINABLE DEVELOPMENT OF UKRAINE AND THE EU." In RURAL DEVELOPMENT. Aleksandras Stulginskis University, 2018. http://dx.doi.org/10.15544/rd.2017.218.
Full textReports on the topic "Information privacy law"
Nadeau, T., A. Kiran Koushik, and R. Mediratta, eds. Virtual Private LAN Service (VPLS) Management Information Base. RFC Editor, July 2014. http://dx.doi.org/10.17487/rfc7257.
Full textAshley, Caitlyn, Elizabeth Spencer Berthiaume, Philip Berzin, Rikki Blassingame, Stephanie Bradley Fryer, John Cox, E. Samuel Crecelius, et al. Law and Policy Resource Guide: A Survey of Eminent Domain Law in Texas and the Nation. Edited by Gabriel Eckstein. Texas A&M University School of Law Program in Natural Resources Systems, 2017. http://dx.doi.org/10.37419/eenrs.eminentdomainguide.
Full textLustosa Rosario, Ana Carolina, Bar Ben Yaacov, Cecilia Franco Segura, Elena Arias Ortiz, Elena Heredero, Juanita Botero, Patrick Brothers, Thiago Payva, and Maria Spies. Education Technology in Latin America and the Caribbean. Inter-American Development Bank, December 2021. http://dx.doi.org/10.18235/0003828.
Full textRose, Jonathan, Josette Arévalo, Thaís Soares, Andreia Barcellos, Ruben Lamdany, and Dennis Leech. Evaluation of the Inter-American Development Bank's Governance. Inter-American Development Bank, September 2022. http://dx.doi.org/10.18235/0004486.
Full textLaguyás, Natalia, Fermín Vivanco, Carolina Carrasco, Carolina Piedrafita, and Camila De Ferrari. Proptech in Latin America and the Caribbean: How Technology Can Help Reduce the Housing Deficit. Inter-American Development Bank, September 2022. http://dx.doi.org/10.18235/0004483.
Full textHerbert, George, and Lucas Loudon. The Size and Growth Potential of the Digital Economy in ODA-eligible Countries. Institute of Development Studies (IDS), December 2021. http://dx.doi.org/10.19088/k4d.2021.016.
Full textRincón-Torres, Andrey Duván, Kimberly Rojas-Silva, and Juan Manuel Julio-Román. The Interdependence of FX and Treasury Bonds Markets: The Case of Colombia. Banco de la República, September 2021. http://dx.doi.org/10.32468/be.1171.
Full textBano, Masooda, and Daniel Dyonisius. Community-Responsive Education Policies and the Question of Optimality: Decentralisation and District-Level Variation in Policy Adoption and Implementation in Indonesia. Research on Improving Systems of Education (RISE), August 2022. http://dx.doi.org/10.35489/bsg-rise-wp_2022/108.
Full textVargas-Herrera, Hernando, Juan Jose Ospina-Tejeiro, Carlos Alfonso Huertas-Campos, Adolfo León Cobo-Serna, Edgar Caicedo-García, Juan Pablo Cote-Barón, Nicolás Martínez-Cortés, et al. Monetary Policy Report - April de 2021. Banco de la República de Colombia, July 2021. http://dx.doi.org/10.32468/inf-pol-mont-eng.tr2-2021.
Full textSaville, Alan, and Caroline Wickham-Jones, eds. Palaeolithic and Mesolithic Scotland : Scottish Archaeological Research Framework Panel Report. Society for Antiquaries of Scotland, June 2012. http://dx.doi.org/10.9750/scarf.06.2012.163.
Full text