Academic literature on the topic 'Law Privacy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Law Privacy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Law Privacy"

1

Grijpink, Jan. "Privacy Law." Computer Law & Security Review 17, no. 3 (May 2001): 154–60. http://dx.doi.org/10.1016/s0267-3649(01)00304-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cuijpers, Colette. "A Private Law Approach to Privacy; Mandatory Law Obliged?" SCRIPT-ed 4, no. 4 (December 15, 2007): 304–18. http://dx.doi.org/10.2966/scrip.040407.304.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cornock, Marc. "Privacy Law HandbookPrivacy Law Handbook." Nursing Standard 25, no. 40 (June 8, 2011): 30. http://dx.doi.org/10.7748/ns2011.06.25.40.30.b1216.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Davies, Simon. "Privacy law — Australia." Computer Law & Security Review 13, no. 6 (November 1997): 429–30. http://dx.doi.org/10.1016/s0267-3649(97)89793-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

McDonagh, Maeve. "Australian privacy law." Computer Law & Security Review 6, no. 5 (January 1991): 13–17. http://dx.doi.org/10.1016/0267-3649(91)90149-p.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Collins, Hugh. "The Decline of Privacy in Private Law." Journal of Law and Society 14, no. 1 (1987): 91. http://dx.doi.org/10.2307/1410299.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cohen, Julie E. "Turning Privacy Inside Out." Theoretical Inquiries in Law 20, no. 1 (March 16, 2019): 1–31. http://dx.doi.org/10.1515/til-2019-0002.

Full text
Abstract:
Abstract The problem of theorizing privacy moves on two levels, the first consisting of an inadequate conceptual vocabulary and the second consisting of an inadequate institutional grammar. Privacy rights are supposed to protect individual subjects, and so conventional ways of understanding privacy are subject-centered, but subject-centered approaches to theorizing privacy also wrestle with deeply embedded contradictions. And privacy’s most enduring institutional failure modes flow from its insistence on placing the individual and individualized control at the center. Strategies for rescuing privacy from irrelevance involve inverting both established ways of talking about privacy rights and established conventions for designing institutions to protect them. In terms of theory, turning privacy inside out entails focusing on the conditions that are needed to produce sufficiently private and privacy-valuing subjects. Institutionally, turning privacy inside out entails focusing on the design, production, and operational practices most likely to instantiate and preserve those conditions.
APA, Harvard, Vancouver, ISO, and other styles
8

Lemley, Mark. "Privacy, Property, and Publicity." Michigan Law Review, no. 117.6 (2019): 1153. http://dx.doi.org/10.36644/mlr.117.6.privacy.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Serwin, Andrew. "Privacy 3.0-The Principle of Proportionality." University of Michigan Journal of Law Reform, no. 42.4 (2009): 869. http://dx.doi.org/10.36646/mjlr.42.4.privacy.

Full text
Abstract:
Individual concern over privacy has existed as long as humans have said or done things they do not wish others to know about. In their groundbreaking law review article The Right to Privacy, Warren and Brandeis posited that the common law should protect an individual's right to privacy under a right formulated as the right to be let alone-Privacy 1.0. As technology advanced and societal values also changed, a belief surfaced that the Warren and Brandeis formulation did not provide sufficient structure for the development of privacy laws. As such, a second theoretical construct of privacy, Privacy 2.0 as expressed in Dean Prosser's work Privacy was created. Dean Prosser continued (or expanded) upon the concepts formulated by Warren and Brandeis, particularly in emphasizing the role of common law in protecting privacy. These works, while influential in their time, do not account for paradigm shifts in technology, or, perhaps more importantly, changes in how people live their lives. The unending advance of technology and changes in societal norms fundamentally dictate that privacy theory must change over time, or it will lose its relevance. Indeed, in today ' Web 2.0 world where many people instantly share very private aspects of their lives, one can hardly imagine a privacy concept more foreign than the right to be let alone. The question confronting modern-day privacy scholars is this: Can a common law based theory adequately address the shifting societal norms and rapid technological changes of today's Web 2.0 world where legislatures and government agencies, not courts, are more proactive on privacy protections? This Article argues that the answer is no and instead argues that the overarching principle of privacy of today should not be the right to be let alone, but rather the principle of proportionality. This is Privacy 3. 0.
APA, Harvard, Vancouver, ISO, and other styles
10

Austin, Lisa M. "Privacy and Private Law: The Dilemma of Justification." McGill Law Journal 55, no. 2 (December 16, 2010): 165–210. http://dx.doi.org/10.7202/045084ar.

Full text
Abstract:
In recent years there has been a remarkable convergence across several common law jurisdictions regarding the need to recognize some form of a tort of invasion of privacy, particularly with respect to the publication of private facts. Despite this convergence, the author argues that there remains a palpable “containment anxiety” at play in the jurisprudence that is responsible for a number of recurring tensions regarding the scope of protection. Instead of focusing on the question of how to define privacy, this paper frames the containment anxiety at issue in the cases in terms of a justificatory dilemma rather than a definitional one. Using the work of Mill and Kant, the author argues that if we understand privacy rights as protecting either the value of autonomy or freedom from harm then we can justify a narrow legal right to privacy. Although this can explain the containment anxiety in the jurisprudence, it severely undermines the growing recognition of the importance of privacy. Therefore this paper proposes an alternative justification for privacy rights that is rooted in the value of protecting identity interests, where identity is understood in terms of one's capacity for self-presentation.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Law Privacy"

1

Gibb, Susan Jennifer. "Privacy and Australian law." Title page, contents and abstract only, 1987. http://web4.library.adelaide.edu.au/theses/09PH/09phg4372.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Watt, Eliza. "Cyberspace, surveillance, law and privacy." Thesis, University of Westminster, 2017. https://westminsterresearch.westminster.ac.uk/item/q3xzx/cyberspace-surveillance-law-and-privacy.

Full text
Abstract:
The thesis titled, Cyberspace, Surveillance, Law and Privacy analyses the implications of state sponsored cyber surveillance on the exercise of the human right to privacy of communications and data privacy of individuals, subject to untargeted interception of digital communications. The principle aim of the thesis is to assess the legality of mass cyber surveillance of the Five Eyes alliance, with an emphasis on the United States and the United Kingdom. The study also considers the growing trend among the law enforcement agencies to access data without consent located in foreign jurisdictions without recourse to the Mutual Legal Assistance arrangements. The objective of the thesis is to demonstrate that these activities breach states’ human rights obligations under the international human rights frameworks and to show the unprecedented impact that surveillance technologies continue to have on this right. The research also highlights the inadequate protection of privacy in the internet. This leads to the evaluation of a number of possible legal solutions on the international level to the problem of mass surveillance, since the internet is a global environment designed for unrestricted data flows among jurisdictions and therefore facilitates continued violation of privacy of communications and data privacy. The thesis finds that bearing in mind (a) the highly politicised nature of the internet governance discourse, (b) the reluctance of states to subject peacetime espionage to international law regulation through a legally binding treaty, (c) the fact that international human rights law relating to privacy of communications is in need of modernization, (d) the reluctance of states to commit to a legally binding cyber treaty, (e) the slow pace with which customary cyber international law rules emerge and (f) the tendencies of states on the domestic level towards the introduction of draconian surveillance legislation at the expense of privacy, any progress in this regard at this stage will be piecemeal and likely to be achieved through a combination of the updating of the existing international and regional human rights and data protection instruments and soft law agreements.
APA, Harvard, Vancouver, ISO, and other styles
3

Paton, Elizabeth Katrine. "Privacy law and the media." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/28826.

Full text
Abstract:
This thesis explores the issue of how to reconcile the value of individual privacy with that of freedom of speech. It argues that there ought to be legal protection against invasion of privacy by the media, and that such protection should be seen as complementary to a system of free expression rather than opposed to such a system. A definition of privacy is outlined which, it is contended, meets the criteria for a coherent, neutral definition. Various reasons for valuing privacy and in favour of protecting the individual's reasonable expectations of privacy are identified. It is argued that lack of precision in the normative realm, in defining with certainty when privacy is invaded, should not be an excuse for leaving the individual without legal protection. There follows an examination of the protection of privacy against media incursions in English, New Zealand, Australian and Canadian law, other than the coincidental protection afforded by certain common law actions. There has been significant judicial and legislative recognition of the need to safeguard privacy interests, and many interesting developments in recent years are discussed. However, none of the countries considered has yet developed effective recourse for victims of unwarranted and invasive publications. It is argued that the relationship between privacy and free speech has been wrongly conceptualised, and that in fact both interests serve the same underlying set of values. Problems arise when privacy and free speech interests are balanced in the abstract rather than in context, and when a simplistic view of press freedom is adopted in disregard of the realities of the modern mass media. Invasive publications generally do not significantly advance free speech interests unless they help to provide the information needed for public decision-making. Furthermore, this information can in many cases be conveyed without detriment by withholding details which disclose identity. A three-step test is proposed to determine whether privacy and free speech interests can be reconciled without compromise to either of them, or whether it is necessary to balance these interests in the context of the case. It will also be maintained that a contextual approach is preferable to the adoption of categories such as "public figures" and "public places". These concepts tend to be misleading, and should be eschewed as analytical tools, since they confuse important questions which require separate analysis.
Law, Peter A. Allard School of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
4

Moreham, Nicole Anna. "Privacy and the common law." Thesis, University of Cambridge, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.615821.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jones, Peter John. "Privacy, photojournalism and the law." Thesis, University of Bristol, 2000. http://hdl.handle.net/1983/b809698d-83e3-4cec-ad13-cf41b7983195.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Poppleton, Esme. "Towards a privacy law : key influences." Thesis, University of Exeter, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.435548.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cofone, Ignacio Nicolas <1987&gt. "Privacy Tradeoffs in Information Technology Law." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amsdottorato.unibo.it/7246/4/Cofone_Ignacio_tesi.pdf.

Full text
Abstract:
The thesis aims to make the dynamics of the tradeoffs involving privacy more visible; both theoretically and in two of the central current policy debates in European data protection law, the right to be forgotten and online tracking. In doing so, it offers an explanation for data protection law from an economic perspective and provides a basis for the evaluation of further data protection measures.
APA, Harvard, Vancouver, ISO, and other styles
8

Cofone, Ignacio Nicolas <1987&gt. "Privacy Tradeoffs in Information Technology Law." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amsdottorato.unibo.it/7246/.

Full text
Abstract:
The thesis aims to make the dynamics of the tradeoffs involving privacy more visible; both theoretically and in two of the central current policy debates in European data protection law, the right to be forgotten and online tracking. In doing so, it offers an explanation for data protection law from an economic perspective and provides a basis for the evaluation of further data protection measures.
APA, Harvard, Vancouver, ISO, and other styles
9

Pepperell, Keith Craig. "Privacy, rights, and education /." The Ohio State University, 1990. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487686243819294.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Winkler, Stephanie D. "Protecting Online Privacy." UKnowledge, 2016. http://uknowledge.uky.edu/comm_etds/47.

Full text
Abstract:
Online privacy has become one of the greatest concerns in the United States today. There are currently multiple stakeholders with interests in online privacy including the public, industry, and the United States government. This study examines the issues surrounding the protection of online privacy. Privacy laws in the United States are currently outdated and do little to protect online privacy. These laws are unlikely to be changed as both the government and industry have interests in keeping these privacy laws lax. To bridge the gap between the desired level of online privacy and what is provided legally users may turn to technological solutions.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Law Privacy"

1

Brownlee, Charlene. Privacy law. New York: Law Journal Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Schwartz, Paul M., 1959- author and International Association of Privacy Professionals, eds. Privacy law fundamentals. 2nd ed. Portsmouth, NH: International Association of Privacy Professionals, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hébert, L. Camille. Employee privacy law. [St. Paul, Minn.]: West Group, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Marc, Rotenberg, and Schwartz Paul M. 1959-, eds. Information privacy law. 2nd ed. New York: Aspen Publishers, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

1959-, Schwartz Paul M., ed. Information privacy law. 4th ed. New York: Wolters Kluwer Law & Business, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Marc, Rotenberg, ed. Information privacy law. New York: Aspen Publishers, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

1959-, Schwartz Paul M., ed. Information privacy law. 3rd ed. New York, NY: Aspen Publishers, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schwartz, Paul M., 1959- author and International Association of Privacy Professionals, eds. Privacy law fundamentals. Portsmouth, NH: International Association of Privacy Professionals, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

M, Cohen Jay, ed. Privacy law and practice. New York, NY (11 Penn Plaza, New York 10001): M. Bender, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

A, Elder David. The law of privacy. Rochester, N.Y: Lawyers Cooperative Pub., 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Law Privacy"

1

Caristi, Dom, and William R. Davie. "Privacy." In Communication Law, 125–50. Second edition. | New York, NY : Routledge, 2018.: Routledge, 2018. http://dx.doi.org/10.4324/9781315448367-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Caristi, Dom, William R. Davie, and Laurie Thomas Lee. "Privacy." In Communication Law, 147–90. 3rd ed. New York: Routledge, 2021. http://dx.doi.org/10.4324/9781003091660-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hughes-Davies, Timon, and Nathan Tamblyn. "Privacy." In Tort Law, 317–35. Abingdon, Oxon ; New York, NY : Routledge, 2019. | Series: Routledge spotlights: Routledge, 2019. http://dx.doi.org/10.4324/9781315149097-14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mason, Alpheus Thomas, and Donald Grier Stephenson. "Privacy." In American Constitutional Law, 625–63. 18th ed. New York: Routledge, 2021. http://dx.doi.org/10.4324/9781003164340-14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mason, Alpheus Thomas, and Donald Grier Stephenson. "Privacy." In American Constitutional Law, 572–611. Seventeenth edition. | New York, NY : Routledge, 2017.: Routledge, 2017. http://dx.doi.org/10.4324/9781315394589-14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bobbitt, Randy. "Privacy." In Exploring Communication Law, 191–219. Second edition. | New York, NY : Routledge, 2018.: Routledge, 2017. http://dx.doi.org/10.4324/9781315232935-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Glass, Arthur. "Privacy and Law." In Modern Privacy, 59–72. London: Palgrave Macmillan UK, 2010. http://dx.doi.org/10.1057/9780230290679_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cofone, Ignacio N. "Privacy." In Encyclopedia of Law and Economics, 1644–48. New York, NY: Springer New York, 2019. http://dx.doi.org/10.1007/978-1-4614-7753-2_751.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cofone, Ignacio N. "Privacy." In Encyclopedia of Law and Economics, 1–4. New York, NY: Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-7883-6_751-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lee, William E., Daxton R. Stewart, and Jonathan Peters. "Privacy." In The Law of Public Communication, 186–244. 11th edition. | New York : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9781003043362-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Law Privacy"

1

Jordan, Cameron. "Law and privacy." In the 3rd annual conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1231047.1231080.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fuster, Gloria Gonzalez, and Serge Gutwirth. "Ethics, law and privacy: Disentangling law from ethics in privacy discourse." In 2014 IEEE International Symposium on Ethics in Engineering, Science, and Technology (ETHICS). IEEE, 2014. http://dx.doi.org/10.1109/ethics.2014.6893376.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Serebrennikova, Anna Valeryevna. "Criminal-law protection of the right to privacy and private life secret, the privacy of correspondence, post and telecommunication privacy in additional German criminal law." In XI International Scientific and Practical Conference. TSNS Interaktiv Plus, 2017. http://dx.doi.org/10.21661/r-118132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gatt, Lucilla, Ilaria Amelia Caggiano, Luigi Izzo, Alessandra Fabrocini, and Anna Anita Mollo. "Satellite Data Management and Privacy Law." In 2023 IEEE 10th International Workshop on Metrology for AeroSpace (MetroAeroSpace). IEEE, 2023. http://dx.doi.org/10.1109/metroaerospace57412.2023.10190018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Savage, Stefan, Ian Levy, Kobbi Nissim, Paul Ohm, Carmela Troncoso, and Nicole Wong. "Surveillance and privacy in the public and private sectors." In CSLAW '19: Symposium on Computer Science and Law. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3379921.3379926.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Abu-Nimeh, Saeed, and Nancy R. Mead. "Privacy Risk Assessment in Privacy Requirements Engineering." In 2009 Second International Workshop on Requirements Engineering and Law (RELAW). IEEE, 2009. http://dx.doi.org/10.1109/relaw.2009.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Xu, Fei, K. P. Chow, Jingsha He, and Xu Wu. "Privacy Reference Monitor - A Computer Model for Law Compliant Privacy Protection." In 2009 15th International Conference on Parallel and Distributed Systems. IEEE, 2009. http://dx.doi.org/10.1109/icpads.2009.63.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chor, B., and E. Kushilevitz. "A zero-one law for Boolean privacy." In the twenty-first annual ACM symposium. New York, New York, USA: ACM Press, 1989. http://dx.doi.org/10.1145/73007.73013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Massey, Aaron K., and Annie I. Antón. "A Requirements-based Comparison of Privacy Taxonomies." In 2008 Requirements Engineering and Law (RELAW). IEEE, 2008. http://dx.doi.org/10.1109/relaw.2008.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kesari, Aniket. "The Privacy-Fairness-Accuracy Frontier." In CSLAW '22: Symposium on Computer Science and Law. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3511265.3550437.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Law Privacy"

1

Eastman, Brittany. Facial Recognition Software and Privacy Law in Transportation Technology. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, May 2024. http://dx.doi.org/10.4271/epr2024011.

Full text
Abstract:
<div class="section abstract"><div class="htmlview paragraph">Data privacy questions are particularly timely in the automotive industry as—now more than ever before—vehicles are collecting and sharing data at great speeds and quantities. Though connectivity and vehicle-to-vehicle technologies are perhaps the most obvious, smart city infrastructure, maintenance, and infotainment systems are also relevant in the data privacy law discourse.</div><div class="htmlview paragraph"><b>Facial Recognition Software and Privacy Law in Transportation Technology</b> considers the current legal landscape of privacy law and the unanswered questions that have surfaced in recent years. A survey of the limited recent federal case law and statutory law, as well as examples of comprehensive state data privacy laws, is included. Perhaps most importantly, this report simplifies the balancing act that manufacturers and consumers are performing by complying with data privacy laws, sharing enough data to maximize safety and convenience, and protecting personal information.</div><div class="htmlview paragraph"><a href="https://www.sae.org/publications/edge-research-reports" target="_blank">Click here to access the full SAE EDGE</a><sup>TM</sup><a href="https://www.sae.org/publications/edge-research-reports" target="_blank"> Research Report portfolio.</a></div></div>
APA, Harvard, Vancouver, ISO, and other styles
2

Cachalia, Firoz, and Jonathan Klaaren. Digitalisation, the ‘Fourth Industrial Revolution’ and the Constitutional Law of Privacy in South Africa: Towards a public law perspective on constitutional privacy in the era of digitalisation. Digital Pathways at Oxford, July 2021. http://dx.doi.org/10.35489/bsg-dp-wp_2021/04.

Full text
Abstract:
In this working paper, our focus is on the constitutional debates and case law regarding the right to privacy, adopting a method that is largely theoretical. In an accompanying separate working paper, A South African Public Law Perspective on Digitalisation in the Health Sector, we employ the analysis developed here and focus on the specific case of digital technologies in the health sector. The topic and task of these papers lie at the confluence of many areas of contemporary society. To demonstrate and apply the argument of this paper, it would be possible and valuable to extend its analysis into any of numerous spheres of social life, from energy to education to policing to child care. In our accompanying separate paper, we focus on only one policy domain – the health sector. Our aim is to demonstrate our argument about the significance of a public law perspective on the constitutional right to privacy in the age of digitalisation, and attend to several issues raised by digitalisation’s impact in the health sector. For the most part, we focus on technologies that have health benefits and privacy costs, but we also recognise that certain technologies have health costs and privacy benefits. We also briefly outline the recent establishment (and subsequent events) in South Africa of a contact tracing database responding to the COVID-19 pandemic – the COVID-19 Tracing Database – a development at the interface of the law enforcement and health sectors. Our main point in this accompanying paper is to demonstrate the value that a constitutional right to privacy can bring to the regulation of digital technologies in a variety of legal frameworks and technological settings – from public to private, and from the law of the constitution to the ‘law’ of computer coding.
APA, Harvard, Vancouver, ISO, and other styles
3

Roberts, Tony, Abrar Mohamed Ali, Mohamed Farahat, Ridwan Oloyede, and Grace Mutung'u. Surveillance Law in Africa: a Review of Six Countries. Institute of Development Studies, October 2021. http://dx.doi.org/10.19088/ids.2021.059.

Full text
Abstract:
This review provides the first comparative analysis of African legal surveillance frameworks. The study identifies nine core principles derived from existing guidelines as an analytical framework to identify opportunities to strengthen privacy protection, while narrowly targeting surveillance on the most serious crimes. Six detailed country reports are synthesised in this comparative analysis to produce a series of actionable recommendations for policy, practice and further research.
APA, Harvard, Vancouver, ISO, and other styles
4

Cachalia, Firoz, and Jonathan Klaaren. A South African Public Law Perspective on Digitalisation in the Health Sector. Digital Pathways at Oxford, July 2021. http://dx.doi.org/10.35489/bsg-dp-wp_2021/05.

Full text
Abstract:
We explored some of the questions posed by digitalisation in an accompanying working paper focused on constitutional theory: Digitalisation, the ‘Fourth Industrial Revolution’ and the Constitutional Law of Privacy in South Africa. In that paper, we asked what legal resources are available in the South African legal system to respond to the risk and benefits posed by digitalisation. We argued that this question would be best answered by developing what we have termed a 'South African public law perspective'. In our view, while any particular legal system may often lag behind, the law constitutes an adaptive resource that can and should respond to disruptive technological change by re-examining existing concepts and creating new, more adequate conceptions. Our public law perspective reframes privacy law as both a private and a public good essential to the functioning of a constitutional democracy in the era of digitalisation. In this working paper, we take the analysis one practical step further: we use our public law perspective on digitalisation in the South African health sector. We do so because this sector is significant in its own right – public health is necessary for a healthy society – and also to further explore how and to what extent the South African constitutional framework provides resources at least roughly adequate for the challenges posed by the current 'digitalisation plus' era. The theoretical perspective we have developed is certainly relevant to digitalisation’s impact in the health sector. The social, economic and political progress that took place in the 20th century was strongly correlated with technological change of the first three industrial revolutions. The technological innovations associated with what many are terming ‘the fourth industrial revolution’ are also of undoubted utility in the form of new possibilities for enhanced productivity, business formation and wealth creation, as well as the enhanced efficacy of public action to address basic needs such as education and public health.
APA, Harvard, Vancouver, ISO, and other styles
5

Durovic, Mateja, and Franciszek Lech. A Consumer Law Perspective on the Commercialization of Data. Universitätsbibliothek J. C. Senckenberg, Frankfurt am Main, 2021. http://dx.doi.org/10.21248/gups.64577.

Full text
Abstract:
Commercialization of consumers’ personal data in the digital economy poses serious, both conceptual and practical, challenges to the traditional approach of European Union (EU) Consumer Law. This article argues that mass-spread, automated, algorithmic decision-making casts doubt on the foundational paradigm of EU consumer law: consent and autonomy. Moreover, it poses threats of discrimination and under- mining of consumer privacy. It is argued that the recent legislative reaction by the EU Commission, in the form of the ‘New Deal for Consumers’, was a step in the right direction, but fell short due to its continued reliance on consent, autonomy and failure to adequately protect consumers from indirect discrimination. It is posited that a focus on creating a contracting landscape where the consumer may be properly informed in material respects is required, which in turn necessitates blending the approaches of competition, consumer protection and data protection laws.
APA, Harvard, Vancouver, ISO, and other styles
6

Eastman, Brittany. Legal Issues Facing Automated Vehicles, Facial Recognition, and Privacy Rights. SAE International, July 2022. http://dx.doi.org/10.4271/epr2022016.

Full text
Abstract:
Facial recognition software (FRS) is a form of biometric security that detects a face, analyzes it, converts it to data, and then matches it with images in a database. This technology is currently being used in vehicles for safety and convenience features, such as detecting driver fatigue, ensuring ride share drivers are wearing a face covering, or unlocking the vehicle. Public transportation hubs can also use FRS to identify missing persons, intercept domestic terrorism, deter theft, and achieve other security initiatives. However, biometric data is sensitive and there are numerous remaining questions about how to implement and regulate FRS in a way that maximizes its safety and security potential while simultaneously ensuring individual’s right to privacy, data security, and technology-based equality. Legal Issues Facing Automated Vehicles, Facial Recognition, and Individual Rights seeks to highlight the benefits of using FRS in public and private transportation technology and addresses some of the legitimate concerns regarding its use by private corporations and government entities, including law enforcement, in public transportation hubs and traffic stops. Constitutional questions, including First, Forth, and Ninth Amendment issues, also remain unanswered. FRS is now a permanent part of transportation technology and society; with meaningful legislation and conscious engineering, it can make future transportation safer and more convenient.
APA, Harvard, Vancouver, ISO, and other styles
7

DeYoung, Henry, Deepak Garg, Dilsun Kaynar, and Anupam Datta. Logical Specification of the GLBA and HIPAA Privacy Laws. Fort Belvoir, VA: Defense Technical Information Center, April 2010. http://dx.doi.org/10.21236/ada571991.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Demirer, Mert, Diego Jiménez-Hernández, Dean Li, and Sida Peng. Data, Privacy Laws and Firm Production: Evidence from the GDPR. Federal Reserve Bank of Chicago, 2024. http://dx.doi.org/10.21033/wp-2024-02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Phulwani, Bhawesh. Necessity of stringent data privacy laws in the United States. Ames (Iowa): Iowa State University, August 2023. http://dx.doi.org/10.31274/cc-20240624-1043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Székely, Miguel, Aída Arango, and Ana Miranda. Modelos para mejorar la alineación entre las entidades de formación y la empresa privada. Inter-American Development Bank, December 2018. http://dx.doi.org/10.18235/0001493.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography