Добірка наукової літератури з теми "Confidentialité des clients"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Confidentialité des clients".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Confidentialité des clients":

1

Brasel, Kelsey R., and Brian E. Daugherty. "Cook and Thomas, LLC: Balancing Auditor Liability, Client Confidentiality, and the Public Interest." Issues in Accounting Education 32, no. 1 (October 1, 2015): 17–32. http://dx.doi.org/10.2308/iace-51318.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
ABSTRACT In this case students are asked to assume the role of Alex Trifold, CPA, an audit partner for the public accounting firm, Cook and Thomas, LLC, who holds going concern information about an audit client that may impact other entities audited by Cook and Thomas. The case study illustrates how adherence to auditing standards may place auditors in a difficult situation when balancing the auditor's risk of litigation, the clients' rights to confidentiality, and the auditor's duty to the public. Additionally, the case provides exposure to prior litigation cases against auditors with unfavorable outcomes when auditors chose to protect their client's confidentiality, and, conversely, in cases where auditors chose to protect the greater public interest. The case requires students to engage in critical thinking by providing their viewpoints as to the optimal balance of limiting auditor liability, adhering to client confidentiality requirements, and simultaneously serving the public interest. The case study is appropriate for both undergraduate and graduate auditing courses.
2

P., Usha Rani S., Rashmi Kundapur, Anusha Rashmi, and Harsha Acharya. "Client Satisfaction among the clients attending tertiary care centers in Mangalore, South India." Journal of Health and Allied Sciences NU 07, no. 03 (September 2017): 003–6. http://dx.doi.org/10.1055/s-0040-1708716.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract Background: Provision of services in line with the wishes and needs of patients is central to a human health care system .The hospital market has today as changed from a seller's market to a buyer's market and there is a need to improve the quality in the health care delivery. Client satisfaction is a key determinant of quality of care provided in health care centers. Objectives: To determine the client satisfaction among the patients attending tertiary care centers in Mangalore. Materials and Methodology: The study was a cross sectional study which was conducted among the clients attending five teaching hospitals in Mangalore. With 60% of client satisfaction obtained in our pilot study, the sample size was 384 and adding 20% for dropouts the total sample size came up to 462.The clients were selected randomly from each hospital. A pretested Proforma was used outside the hospital with strict confidentiality. Results: In our study we found that,87.6% of the clients felt that the clinic hours at health facility were adequate,79.3% felt health care was easily accessible,89.2% were happy with hygiene and comfort of waiting area. Average waiting time was 116mins.Only 45.4% could meet the same service provider in follow up visit and only 51.5% availed similar services as in the first visit in the follow up. Satisfaction with provider's skill and ability was seen in 82.5% of the clients. Only 69.2% of the clients were satisfied with the cost of services available. Conclusion: Our study revealed that waiting time was a major concern for the client's satisfaction.
3

Ezhova, E. V. "SOME PROBLEMS OF ENSURING THE PROTECTION OF ATTORNEY-CLIENT PRIVILEGE IN THE CRIMINAL PROCESS OF RUSSIA AND BELARUS." Juvenis scientia, no. 9 (September 30, 2018): 41–43. http://dx.doi.org/10.32415/jscientia.2018.09.08.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The article deals with the basic guarantees of protection of attorney-client confidentiality in criminal proceedings. A comparative analysis of the legislative norms of the Russian Federation and the Republic of Belarus regulating the legal regime of attorney-client confidentiality is carried out. The article presents the legal positions of the constitutional Court of the Russian Federation on the issue under consideration, which contributed to the amendments to the criminal procedure law of Russia aimed at providing additional guarantees for the protection of attorney-client confidentiality. The author concludes that the practice of application of the rules containing guarantees of protection of attorney-client confidentiality testifies, on the one hand, to the need to strengthen the protection of citizens' rights to ensure the confidentiality of information provided to the lawyer, and, on the other hand, to the importance of preventing abuse of the right to protection by lawyers and their clients
4

Uys, Leana R. "Confidentiality and HIV/AIDS in South Africa." Nursing Ethics 7, no. 2 (March 2000): 158–66. http://dx.doi.org/10.1177/096973300000700209.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Keeping the diagnosis of a client confidential is one of the cornerstones of professional practice. In the case of a diagnosis such as HIV/AIDS, however, the ethics of this action may be challenged. Such a decision has a range of negative effects, for example, the blaming of others, supporting the denial of the client, and complicating the health education and care of the patient. It is suggested that the four ethical principles should be used to explore the ethics of such decisions, and that professional regulatory bodies and organizations should support professionals in situations where the client’s sexual partner is informed against the wishes of the client.
5

Bingulac, Nenad, and Dragan Miljenović. "Lawyer confidentiality." Pravo - teorija i praksa 38, no. 3 (2021): 42–52. http://dx.doi.org/10.5937/ptp2103042b.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The role of the lawyer is characterized by a focus on counseling, advocacy and conciliation. A lawyer advises a client on legal issues, considers the possibilities of resolving the dispute amicably and certainly advocates in a legal proceedings if this occurs. In order the previously mentioned activities between the client and lawyer to be achieved, it is necessary to establish a mutual connection. Talking about a lawyer`s capability of fulfilling the role of a counsel and client's representative, he/she must be independent in his/her work, especially having professional independence in relation to courts, state bodies, but also in relation to his/her own interests. It is this independence that represents a significant foundation in gaining trust in the client-lawyer relationship. Achieving trust is not easy, although it is a priori expected. In order to gain trust and to be able to access an adequate representation in a legal proceedings, the lawyer's obligation is to keep the lawyer's secret and not to disclose confidential information. A lawyer's secret can be considered from several aspects, from the moral, contractual, ethical... In this research, certain important theoretical frameworks will be considered, with the focus on presenting and reviewing the international, primarily European legislative regulation of the issue of legal secrecy. This paper will certainly include the aspect of domestic legislation too. In addition to the above, some important positions of the European Court of Human Rights will be pointed out. Before presenting the conclusions emerged from this research, a special attention will be paid to the circumstances when a lawyer can reveal a secret.
6

Grimley-Baker, Kathy. "Ethical Implications of Mandatory Reporting of Intimate Partner Violence." Creative Nursing 20, no. 4 (2014): 254–57. http://dx.doi.org/10.1891/1078-4535.20.4.254.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Nurses are expected to provide a safe haven for clients. When clients seek the services of nurses, they are vulnerable, and they expect privacy and confidentiality. Reporting acknowledged or suspected intimate partner violence (IPV) to authorities can impact nurse–client trust relationships. This article discusses the legal ramifications of reporting of IPV and their implications in a health care setting.
7

Hamon, Jessie K., Jenna Hoyt, Shari Krishnaratne, Ariko Angela Barbra, Job Morukileng, Nathaly Spilotros, Miriam Mbembe, Seth Marcus, and Jayne Webster. "Perceptions of quality and the integrated delivery of family planning with childhood immunisation services in Kenya and Uganda." PLOS ONE 17, no. 6 (June 6, 2022): e0269690. http://dx.doi.org/10.1371/journal.pone.0269690.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The integration of family planning (FP) with childhood immunisations is considered a promising approach to addressing postpartum women’s unmet need for FP in resource limited settings. This study set out to examine client and health provider perceptions of the quality of FP services that were integrated with childhood immunisations in Kenya and Uganda. Semi-structured interviews with clients (n = 30) and health providers (n = 27) were conducted in 16 rural health facilities. Interviews centred on the respondents’ experiences receiving/delivering FP services, their interactions with providers/clients, and their views on the quality of FP services. Client and provider perceptions of quality were compared through a thematic analysis of interview transcripts, and findings were synthesised using Jain and Hardee’s revised FP Quality of Care Framework. Using audit data, health facility characteristics and resources were also summarised through descriptive statistics to contextualise the qualitative findings. The dignity and respect experienced by clients was central to the respondents’ perceptions of quality. These two dimensions were not conceptualised as distinct facets of quality, but were instead perceived to be a product of the 1) access to needed services, 2) choice of contraceptives, 3) interpersonal communication, 4) information, and 5) confidentiality afforded to clients. Additionally, clients and providers alike believed that the integration of FP services with childhood immunisations had a positive effect on clients’ access to needed services and on the confidentiality they experienced in a context where modern contraceptive use was stigmatised and where a lack of support from some husbands impeded access to FP services. Understanding clients’ and providers’ conceptualisation of quality is critical to the design of high quality and client-centred integrated FP services.
8

Zaidi, Syeda Masooma. "Innovative Commercial and Private Genetic Testing Raises Privacy and Confidentiality Concerns." Sciential - McMaster Undergraduate Science Journal, no. 1 (November 25, 2018): 31–33. http://dx.doi.org/10.15173/sciential.v1i1.1902.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Obtaining information about your genes can be as easy as swabbing your cheek for DNA testing. Companies that offer direct-to-consumer genetic testing with saliva have the authority to collect and share personal data as well as test results from their clients. However, patients want their personal information to be protected and although these companies ask for consent before sharing information with third-party sources, companies have the right to use client data to initiate research or improve their business. Genetic testing companies need to respect their clients and understand that they are paying for a service which deals with sensitive information that individuals may not want collected and stored.
9

Ordway, Ann M., and Arielle F. Casasnovas. "A Subpoena: The Other Exception to Confidentiality." Family Journal 27, no. 4 (August 21, 2019): 352–58. http://dx.doi.org/10.1177/1066480719868701.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
A good deal of attention is paid in counselor education programs to the significance of confidentiality and the rare categories of exception that would compel the counselor to break that sacred vow. The exceptions identified are danger to self, danger to others, and child abuse. In some states, additional mention is made of situations involving elder abuse. Rarely, however, do counselor educators discuss the impact of litigation on the sanctity of the counselor–client relationship and the ability of a subpoena to pierce the cloak of confidentiality that otherwise protects a client’s innermost thoughts and raw vulnerability. This article is an examination of the long arm of the court system and, by extension, the role of a subpoena as the often overlooked, other, exception to confidentiality. The effect of court involvement initiated either by the counselor’s client or by an opposing party on the counselor–client relationship should be clearly addressed in informed consent discussions and written documents to avoid unforeseen complications when a counselor receives and responds to a subpoena.
10

Nishkala, H. M., S. H. Anu, D. A. Bindushree, and S. L. Manoj. "Data Partitioning and Reduplication for Providing Integrity to Data in the Cloud." Journal of Computational and Theoretical Nanoscience 17, no. 9 (July 1, 2020): 4070–74. http://dx.doi.org/10.1166/jctn.2020.9021.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Cloud Computing is a boon to the field of information and technology. The two major elements of client worries are Data security and Privacy Protection. Data may be revised and improved when client stores the information in the cloud so there might be danger of data loss. Therefore client information is moved to the data hub which cannot be controlled by the clients. Hence high safety efforts are required to secure data inside the cloud. Here data is divided into fragments and they are converted into encrypted file. This encrypted file is issued to arbitrarily chosen cloud service providers by the cloud data owners. Even after the successful attack, attackers do not get the meaning full information. If cloud data clients access to get any document that relating to encrypted file is regenerated from the fragments and clients must download it. When the applicant coordinates the strategy with the original details, then only file can be decoded. Therefore it demonstrates that prospective strategy improves the data integrity and confidentiality.

Дисертації з теми "Confidentialité des clients":

1

Sarkar, Mainak. "Three essays on artificial intelligence models for customer relationship management." Thesis, Cergy-Pontoise, Ecole supérieure des sciences économiques et commerciales, 2022. http://www.theses.fr/2022ESEC0002.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
La thèse se compose de trois essais sur "Modèles d'intelligence artificielle pour la gestion de la relation client". En particulier, les essais sont construits sur de nouveaux algorithmes d'apprentissage en profondeur connus sous le nom de réseaux de neurones à mémoire longue et courte durée (LSTM). Le premier essai montre que les réseaux de neurones LSTM, qui reposent exclusivement sur des données brutes en entrée, peuvent remplacer les modèles basés sur l'ingénierie des fonctionnalités pour prédire le comportement des clients dans le contexte du marketing direct. Dans le deuxième essai, je développe un modèle de réseaux de neurones à double LSTM pour les prédictions de la valeur à vie du client (CLV) qui intègre la politique adaptative de l'entreprise et capture l'attrition latente. Je montre que l'intégration de la politique marketing adaptative de l'entreprise dans les modèles d'évaluation des clients conduit à des trajectoires divergentes de rentabilité future, mettant en évidence des bimodalités et des modes à la queue de la distribution CLV. La présence de bimodalités et de modes à la queue capturée par mon modèle a des implications pour une compréhension plus approfondie du potentiel du client (c'est-à-dire le meilleur scénario par rapport à l'attente CLV traditionnelle) et pour affiner la hiérarchisation des clients. Dans le troisième essai, j'exploite la capacité des états de mémoire des réseaux de neurones LSTM à résumer les informations utiles des données de transaction passées pour développer une nouvelle approche qui répond aux préoccupations de confidentialité des clients dans la gestion de la relation client (CRM)
The dissertation consists of three essays on “Artificial Intelligence Models for Customer Relationship Management”. In particular, the essays are built on novel deep learning algorithms known as long-short term memory (LSTM) neural networks. The first essay shows that LSTM neural networks, which rely exclusively on raw data as input, can replace feature-engineering based models for predicting customer behavior in the direct marketing context. In the second essay, I develop a dual-LSTM neural networks model for customer lifetime value (CLV) predictions that incorporates the firm’s adaptive policy as well as captures latent attrition. I show that integrating the firm’s adaptive marketing policy into customer valuation models leads to diverging paths of future profitability, highlighting bimodalities and modes at the tail of the CLV distribution. The presence of bimodalities and modes at the tail captured by my model has implications for a deeper understanding of customer potential (i.e., best-case scenario vs. traditional CLV expectation) and for fine-tuning customer prioritization. In the third essay, I leverage the ability of LSTM neural networks’ memory states to summarize useful information from the past transaction data to develop a novel approach that addresses customer privacy concerns in customer relationship management (CRM)
2

Barquissau, Eric. "L’évaluation de la qualité de la relation client en ligne par les utilisateurs d’espaces clients de sites web : une application dans le secteur bancaire et dans le secteur de la téléphonie mobile." Thesis, Paris 10, 2013. http://www.theses.fr/2013PA100205.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Internet a profondément changé la manière dont les entreprises interagissent avec leurs clients. Le développement d’une relation client en ligne a mené les organisations à repenser l’idée qu’elles se faisaient de cette relation, ainsi que leurs pratiques en termes de marketing relationnel. Cette recherche vise à mieux comprendre la manière dont les utilisateurs d’espaces clients de sites web évaluent la qualité de la relation client en ligne, et inclut une dimension importante dans l’évaluation de la qualité de la relation en ligne, l’appropriation de l’espace client.Une étude qualitative a été menée auprès de 15 personnes, afin d’étudier les variables permettant de construire le modèle de recherche et de proposer une échelle de mesure de l’appropriation des espaces clients de sites web. Par la suite, un modèle de recherche a été créé et un questionnaire en ligne a été administré. Un échantillon final se composant de 534 personnes, utilisatrices d’espaces clients de sites web dans le secteur bancaire et dans le secteur de la téléphonie mobile, a permis de tester les hypothèses de recherche. Il en résulte que l’appropriation de l’espace client du site web joue un rôle médiateur entre deux variables - la facilité d’utilisation perçue et l’utilité perçue - et la qualité de la relation client en ligne, que ce soit pour les utilisateurs d’espaces clients de sites web dans le secteur bancaire ou dans le secteur de la téléphonie mobile. De même, la sécurité/confidentialité perçue de l’espace client du site web exerce une influence positive sur la qualité de la relation client en ligne. L’hypothèse postulant que l’interactivité perçue de l’espace client du site web exerce une influence positive sur la qualité de la relation client en ligne est partiellement validée. En revanche, la présence sociale de l’espace client du site web n’exerce pas une influence positive sur la qualité de la relation client en ligne
The Internet has dramatically changed the way companies interact with their customers. Because of the importance of e-customer relationship management, companies have to reconsider their strategies in terms of relationship marketing. The purpose of this research is to investigate the way users of personal websites’ accounts evaluate e-relationship quality within two sectors: the banking sector and the mobile phone sector. This research deals with an important concept: appropriation.A qualitative study has been conducted in order to build a research model and to create a measurement scale to study the appropriation of a personal websites’ account. Therefore, an online survey (N=534) was conducted to test the hypothesis. The findings suggest that the appropriation of a personal websites’ account is a mediating variable between perceived ease of use, perceived usability and relationship quality, both in the banking sector and in the mobile phone sector. In the same way, privacy has a positive influence on e-relationship quality. Moreover, perceived interactivity has a positive influence on e-relationship quality, but that particular hypothesis is partially validated. Finally, social presence does not have a positive influence on e-relationship quality
3

Gonzalez, Laura. "The effects of confidentiality on the working alliance /." Thesis, McGill University, 2002. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=79771.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The present study investigated how the issues of perceived and desired confidentiality are related to the working alliance between adolescent clients and their counselors. Fifty-one students between the ages of 14 and 18 years were recruited through two school boards in Canadian cities. Results indicated that adolescents preferred greater levels of confidentiality than they thought they would actually get in hypothetical situations, but preferred significantly less in actual situations. In addition, the level of confidentiality adolescents preferred in both hypothetical and actual situations did not impact the working alliance. The level of confidentiality adolescents thought they would get in hypothetical situations was a significant predictor of the working alliance. In actual situations, however, the level of confidentiality did not impact the working alliance. Theoretical and practical implications for counselors and other researchers, limitations of this study, and future research directions are discussed.
4

Henziger, Eric. "The Cost of Confidentiality in Cloud Storage." Thesis, Linköpings universitet, Databas och informationsteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148907.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Cloud storage services allow users to store and access data in a secure and flexible manner. In recent years, cloud storage services have seen rapid growth in popularity as well as in technological progress and hundreds of millions of users use these services to store thousands of petabytes of data. Additionally, the synchronization of data that is essential for these types of services stands for a significant amount of the total internet traffic. In this thesis, seven cloud storage applications were tested under controlled experiments during the synchronization process to determine feature support and measure performance metrics. Special focus was put on comparing applications that perform client side encryption of user data to applicationsthat do not. The results show a great variation in feature support and performance between the different applications and that client side encryption introduces some limitations to other features but that it does not necessarily impact performance negatively. The results provide insights and enhances the understanding of the advantages and disadvantages that come with certain design choices of cloud storage applications. These insights will help future technological development of cloud storage services.
5

Canillas, Rémi. "Privacy and Security in a B2B environment : Focus on Supplier Impersonation Fraud Detection using Data Analysis." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEI118.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
La fraude au fournisseur (Supplier Impersonation Fraud, SIF) est un type de fraude se produisant dans un contexte Business-to-Business (B2B), où des entreprises et des commerces interagissent entre eux, plutôt qu'avec le consommateur. Une fraude au fournisseur est effectuée lorsqu'une entreprise (fournisseur) proposant des biens ou des services à une autre entreprise (client) a son identité usurpée par un fraudeur. Dans cette thèse, nous proposons, d'utiliser les techniques et outils récents en matière d'apprentissage machine (Machine Learning) afin de résoudre à ces différents points, en élaborant des systèmes de détection de fraudes se basant sur l'analyse de données. Deux systèmes de détection de fraude basés sur l'analyse de données sont proposés: ProbaSIF et GraphSIF. Ces deux systèmes se composent d'abord d'une phase d'entraînement où les transactions historiques sont utilisées pour calculer un modèle de données, puis d'une phase de test où la légitimité de chaque transaction considérée est déterminée. ProbaSIF est un système de détection de fraudes au fournisseur qui se base sur un modèle bayésien (Dirichlet-Multinomial). ProbaSIF utilise la probabilité d'un compte en banque à être utilisé dans une transaction future d'une entreprise pour déterminer sa fiabilité. GraphSIF, le second système de détection de fraude au fournisseur que nous proposons, a pour but d'analyser les propriétés relationnelles créées par l'échange de transactions entre une entreprise et ses fournisseurs. À cette fin, une séquence de différents graphes compilant tous les liens créés entre l'entreprise, ses fournisseurs, et les comptes en banque utilisés pour payer ces fournisseurs, appelés séquence de comportement, est générée. Une transaction est catégorisée en l'ajoutant au graphe le plus récent de la séquence et en analysant les motifs formés, et en les comparant à ceux précédemment trouvés dans la séquence de comportement.Ces deux systèmes sont comparés avec un jeu de données réelles afin d’examiner leurs performances
Supplier Impersonation Fraud (SIF) is a kind of fraud occuring in a Business-To-Business context (B2B), where a fraudster impersonates a supplier in order to trigger an illegitimate payment from a company. Most of the exisiting systems focus solely on a single, "intra-company" approach in order to detect such kind of fraud. However, the companies are part of an ecosystem where multiple agents interacts, and such interaction hav yet to be integrated as a part of the existing detection techniques. In this thesis we propose to use state-of-the-art techniques in Machine Learning in order to build a detection system for such frauds, based on the elaboration of a model using historical transactions from both the targeted companies and the relevant other companies in the ecosystem (contextual data). We perform detection of anomalous transactions when significant change in the payment behavior of a company is detected. Two ML-based systems are proposed in this work: ProbaSIF and GraphSIF. ProbaSIF uses a probabilistic approach (urn model) in order to asert the probability of occurrence of the account used in the transaction in order to assert its legitimacy. We use this approach to assert the differences yielded by the integration of contextual data to the analysis. GraphSIF uses a graph-based approach to model the interaction between client and supplier companies as graphs, and then uses these graph as training data in a Self-Organizing Map-Clustering model. The distance between a new transaction and the center of the cluster is used to detect changes in the behavior of a client company. These two systems are compared with a real-life fraud detection system in order to assert their performance
6

Berry-Harris, Traci Aaron. "Examining therapists' perceptions of confidentiality across various therapeutic environments, professional organizations, and client development (an exploratory study) /." Morgantown, W. Va. : [West Virginia University Libraries], 2007. https://eidr.wvu.edu/etd/documentdata.eTD?documentid=4982.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Thesis (Ph. D.)--West Virginia University, 2007.
Title from document title page. Document formatted into pages; contains vi, 149 p. Includes abstract. Includes bibliographical references (p. 117-125).
7

Veeder, Stacy B. "Confidentiality expectations and willingness to disclose personal information to a health-care provider." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available full text, 2006. http://proquest.umi.com/login?COPT=REJTPTU0NWQmSU5UPTAmVkVSPTI=&clientId=3739.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Dowman, Nadia. "Reporting obligations: A challenge for South African lawyers." University of Western Cape, 2019. http://hdl.handle.net/11394/7574.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Magister Legum - LLM
“Threats to the independence of the legal profession have become a preoccupation for bar leaders, regulators and academics, driven by the dual pressures of globalization and the changing business structure of the profession.”1 Money laundering is a transnational economic crime that has plagued the world economy for many decades. It is a crime that eluded the attention of most world leaders. Hence, it is this elusiveness and this non-interest in money-laundering as a serious economic crime, that afforded many individuals such as former dictators and military leaders in developing countries the chance to avoid prosecution for depleting the economic resources of their particular state.2
9

Holmberg, Daniel, and Victor Nyberg. "Functional and Security Testing of a Mobile Client-Server Application." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-148710.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Today’s massive usage of smartphones has put a high demand on all application developers in the matter of security. For us to be able to keep using all existing and new applications, a process that removes significant security vulnerabilities is essential. To remove these vulnerabilities, the applications have to be tested. In this thesis, we identify six methods for functional and security testing of client-server applications running Android and Python Flask. Regarding functional testing, we implement Espresso testing and RESTful API testing. In regards to the security testing of the system, we do not only implement fuzz testing, sniffing, reverse engineering and SQL injection testing on a system developed by a student group in a parallel project, but also discover a significant security vulnerability that directly affects the integrity and reliability of this system. Out of the six identified testing techniques, reverse engineering exposed the vulnerability. In conjunction with this, we verified that the system’s functionality works as it is supposed to.
10

Andersson, Frida. "Lojalitetsplikt i uthyrningsbranschen : - En uppsats om lojalitetsförhållandet mellan kundföretag och inhyrd arbetskraft." Thesis, Linnéuniversitetet, Institutionen för ekonomistyrning och logistik (ELO), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-33654.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
During the last part of the 20th century many companies has started to build their organizations on knowledge and information instead of manufacturing of products.  Today it is easier to communicate and spread information. At the same time the numbers of untraditional employments like temporary employments and workers from staffing agencies are increasing. Many organizations have higher employee turnover now than before. This allows more people to have access to confidential information, whose spreading might cause great damage for the employer. This essay aims to look into the protection of confidential information for the client against offenses from staffing agency workers that are working within the clients’ organization. Protection of confidential information is included in the duty of loyalty in terms of confidentiality, protection of trade secrets and competition clauses. Duty of loyalty lies within the employment contract between the agency employer and the staffing agency. Therefore the agency employer has no duty to be loyal against the client. For the agency worker to be able to perform the required work duties he or she might be provided with confidential information. Spreading of this information could cause damage for the client. Can the rules of justice that regulates duty of loyalty be applied on the relationship between the client and the agency worker?  What are the consequences of the rules that exist today? This essay is written with a juridical method and with sociology of law perspective. Other parts of the duty of loyalty is not included as well as the duty of loyalty for the employer. The conclusion is that the staffing agency is responsible for indemnity towards the client if an agency employer reviles confidential information about the clients’ organization.  Some rules of justice can be interpreted as an expression that duty of loyalty lays between the client and the agency worker. For example, the agency worker is bound by confidentiality in terms of the conditions at the clients’ organization.  Suggestions of changes in the regulations about protection of confidential information will force the agency worker to pay indemnity to the client if he or she reviles confidential information.   In staffing agencies there are twice as many immigrants than in the regular labor market. The rules of duty of loyalty can contribute to a holdback for immigrants that are working in staffing agencies. Immigrants will be at bigger risk of standing outside the general labor market than people born in Sweden because of static discrimination.
Företag har under senare delen av 1900-talet gått från traditionell varuproduktion till att allt mer bygga sin verksamhet på information och kunskap. Den tekniska utvecklingen har gjort det lättare att överföra och sprida kunskap i samhället vilket ökar sårbarheten hos företagen. Icke- traditionella anställningar såsom tidsbegränsade anställningar och inhyrd arbetskraft ökar och företag har en högre personalomsättning nu än tidigare. Fler personer får tillgång till företagsspecifik information och spridning av den skulle kunna skada arbetsgivaren. I min uppsats undersöker jag skyddet av hemlig information för arbetsgivare som hyr in arbetskraft från ett personaluthyrningsföretag. Skydd för hemlig information ingår i den så kallade lojalitetsplikten i form av tystnadsplikt, skydd för företagshemlighet och konkurrensklausuler. Lojalitetplikt föreligger i anställningsavtalet mellan uthyrd arbetstagare och uthyrningsföretaget men arbetstagarens arbetsprestation utförs hos kunden. Kan regleringar kring lojalitetsplikt tillämpas på förhållandet mellan kund och inhyrd arbetstagare? Vad blir konsekvenserna av de regler som finns idag? Uppsatsen är skriven med juridisk metod som har sin utgångspunkt i rättskälleläran samt med rättssociologisk angreppssätt. Andra delar av lojalitetsplikt såsom upplysningsskyldighet, bisysslor eller kritikrätt behandlas inte i uppsatsen, ej heller lojalitetsplikt för arbetsgivaren. Slutsatsen är att uthyrningsföretaget står för den uthyrde arbetstagarens handlingar mot kundföretaget eftersom det föreligger lojalitetsförpliktelser i uthyrningsavtalet mellan kund och uthyrare. Uthyraren står för exempelvis skadestånd om en arbetstagare röjer eller utnyttjar en företagshemlighet hos kunden. Vissa regleringar ger uttryck för att det föreligger lojalitetsplikt mellan kund och inhyrd arbetstagare. Exempelvis är den uthyrda arbetstagaren bunden av tystnadsplikt vad det gäller förhållanden hos kunden. I ett förslag från regeringen på kommande ändringar i lagstiftningen kommer den inhyrde arbetstagaren bli direkt skadeståndsansvarig vid röjande eller utnyttjande av företagshemlighet hos kunden. I uthyrningsbranschen finns dubbelt så stor andel utlandsfödda arbetstagare som på arbetsmarknaden generellt. På grund av hur regleringen kring lojalitetsplikt ser ut idag kan den bidra till inlåsningseffekter för utlandsfödda arbetstagare som arbetar i uthyrningsbranschen. Skilda villkor för svensk- och utlandsfödda såsom statisk diskriminering på arbetsmarknaden gör att utlandsfödda arbetstagare löper större risk än svenskfödda arbetstagare att få stå utanför den traditionella arbetsmarknaden.

Книги з теми "Confidentialité des clients":

1

Polowy, Carolyn. Client confidentiality and privileged communications. 2nd ed. Washington, D.C: NASW Press, 2011.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Thurman, Ruth Fleet. Client incest and the lawyer's duty of confidentiality. [Chicago]: American Bar Association, 1985.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Horwitz, Kenneth M. The new cpa-client confidentiality privilege: Opportunity or risk? New York: Research Institute of America, 1999.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Horwitz, Kenneth M. The new cpa-client confidentiality privilege: Opportunity or risk? New York: Research Institute of America, 1999.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Evertsz, Jari. Therapist and client attitudes towards discrete areas of threat to therapeutic confidentiality. [Guildford]: [University of Surrey], 1990.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Pattenden, Rosemary. The law of professional-client confidentiality: Regulating the disclosure of confidential personal information. Oxford: Oxford University Press, 2003.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Lucas, Michael. PGP & GPG: Assurer la confidentialite de son courrier e lectronique. Paris: E ditions Eyrolles, 2006.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Virginia. General Assembly. Secretary of Health and Human Resources. Report of the Secretary of Health and Human Resources on the impact of laws protecting client confidentiality on cooperative relationships of agencies working to address problems of children and families : to the Governor and the General Assembly of Virginia. Richmond: Commonwealth of Virginia, 1991.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Guidance, Institute of Careers, ed. Client confidentiality. Stourbridge: ICG, 2002.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Pattenden, Rosemary, and Duncan Sheehan. Law of Professional-Client Confidentiality. Oxford University Press, 2016.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Confidentialité des clients":

1

Jenkins, Peter. "Client confidentiality and data protection." In The Handbook of Professional, Ethical and Research Practice for Psychologists, Counsellors, Psychotherapists and Psychiatrists, 53–64. 3rd edition. | Abingdon, Oxon ; New York, NY : Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9780429428838-5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Rosenthal, Howard. "Beyond Confidentiality: Professional Counselors and Therapists Have a Duty to Warn." In Before You See Your First Client, 77–78. New York: Routledge, 2021. http://dx.doi.org/10.4324/9781003169048-32.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Ciriani, Valentina, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, and Pierangela Samarati. "Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients." In Data and Applications Security XXIII, 225–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03007-9_15.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Thaman, Stephen C. "Confidentiality of Attorney-Client Communications in the United States." In Ius Comparatum - Global Studies in Comparative Law, 395–440. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43123-5_14.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Thaman, Stephen C., and Lorena Bachmaier. "Attorney-Client Confidentiality as a Fair Trial Right in Criminal Proceedings." In Ius Comparatum - Global Studies in Comparative Law, 589–610. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-48675-4_21.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Barret, Bob, Karen Strohm Kitchener, and Scott Burris. "Suicide and confidentiality: With the client with advanced AIDS: The case of Phil." In Ethics in HIV-related psychotherapy: Clinical decision making in complex cases., 299–314. Washington: American Psychological Association, 2001. http://dx.doi.org/10.1037/10399-016.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Sasakura, Hiroki. "The Continuing Evolution of Right to Counsel and Confidentiality of Attorney-Client Communications in Japan." In Ius Comparatum - Global Studies in Comparative Law, 177–204. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43123-5_7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Barnett, Jeffrey E., and Jeffrey Zimmerman. "It Is Best to Provide Minimal Information When a Referral Source Requests Information About a Client." In If You Build It They Will Come, edited by Jeffrey E. Barnett and Jeffrey Zimmerman, 123–27. Oxford University Press, 2019. http://dx.doi.org/10.1093/med-psych/9780190900762.003.0022.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
It is a common occurrence for mental health practitioners to receive requests for information about clients from their referral sources. Concerns about safeguarding each client’s confidentiality may result in a misunderstanding about how to respond to these requests. This chapter addresses mental health professionals’ ethical, legal, and clinical obligations to both their clients and referral sources. How to address these obligations so that clients’ best interests are served is explained. This includes discussing the role of the informed consent process with clients, educating referral sources on confidentiality obligations, and explaining how to work collaboratively with other treatment providers, so that client treatment is coordinated. Client expectations, diversity issues, striking a balance between competing needs, and applying a thoughtful decision-making process to determine which information to share and how to best share it are all addressed.
9

Abadi, Aydin. "Smarter Data Availability Checks in the Cloud." In Handbook of Research on Digital Transformation, Industry Use Cases, and the Impact of Disruptive Technologies, 320–39. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-7712-7.ch017.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Cloud computing offers clients flexible and cost-effective resources. Nevertheless, past incidents indicate that the cloud may misbehave by exposing or tampering with clients' data. Therefore, it is vital for clients to protect the confidentiality and integrity of their outsourced data. To address these issues, researchers proposed cryptographic protocols called “proof of storage” that let a client efficiently verify the integrity or availability of its data stored in a remote cloud server. However, in these schemes, the client either has to be online to perform the verification itself or has to delegate the verification to a fully trusted auditor. In this chapter, a new scheme is proposed that lets the client distribute its data replicas among multiple cloud servers to achieve high availability without the need for the client to be online for the verification and without a trusted auditor's involvement. The new scheme is mainly based on blockchain smart contracts. It illustrates how a combination of cloud computing and blockchain technology can resolve real-world problems.
10

"Confidentiality and Disclosure." In Financial Abuse of Older Clients: Law, Practice and Prevention. Bloomsbury Professional, 2017. http://dx.doi.org/10.5040/9781784515522.chapter-08d.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Confidentialité des clients":

1

Nikeshin, Alexei Viacheslavovich, and Victor Zinovievich Shnitman. "TLS 1.3 Clients Testing." In 24th Scientific Conference “Scientific Services & Internet – 2022”. Keldysh Institute of Applied Mathematics, 2022. http://dx.doi.org/10.20948/abrau-2022-9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This paper presents the experience of verifying client implementations of the TLS cryptographic protocol version 1.3. TLS is a widely used cryptographic protocol today, designed to create secure data transmission channels. The protocol provides the necessary functionality for its tasks: confidentiality of transmitted data, data integrity, and authentication of the parties. In the new version 1.3 of the TLS architecture was significantly redesigned, eliminating a number of shortcomings of previous versions that were identified both during the development of implementations and during their operation. We used a new test suite for verifying client implementations of the TLS 1.3 for compliance with Internet specifications, developed on the basis of the RFC8446, using UniTESK technology and mutation testing methods. To test implementations for compliance with formal specifications, UniTESK technology is used, which provides testing automation tools based on the use of finite state machines. The presented approach has proven effective in several of our projects when testing network protocols, providing detection of various deviations from the specification and other errors. The current work is part of the TLS 1.3 protocol verification project and covers TLS client implementations.
2

Henziger, Eric, and Niklas Carlsson. "The Overhead of Confidentiality and Client-side Encryption in Cloud Storage Systems." In UCC '19: IEEE/ACM 12th International Conference on Utility and Cloud Computing. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3344341.3368808.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Arslan, Çetin, and Didar Özdemir. "The Protection of Confidential Business Information by Criminal Law." In International Conference on Eurasian Economies. Eurasian Economists Association, 2017. http://dx.doi.org/10.36880/c08.01824.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The Turkish Penal Code (TPC) no.5237 embodies “the reveal of confidential business information and documents” as a crime. However, neither article 6 of the TPC titled “definitions” nor the legal justification of the article contains the definition of the confidential business information or commercial secret. The abrogated Turkish Commercial Code no.6762 disposes the reveal of this kind of information as an act of unfair competition. In a similar vein, the current Turkish Commercial Code no.6102 assumes the illegal acquisition and the reveal of business secrets as acts of unfair competition and subjects them to criminal sanction. Also the article 562 of the TCC no.6102 disposes that if the auditors reveal the confidential business information of the auditee company, they are punished according to the article 239 of the TPC. The Proposal of Code on Business, Bank and Client Secrets refers to the article 239 of the TPC in case of the violation of the confidentiality obligation. Finally, the Act of the Protection of Competition no.4054 brings a confidentiality obligation for the Council and staff members. In this study, we will try to explain first the notion of confidential business information or commercial secret, then the penal norms about the confidential business information and the confidentiality obligation and last, the elements of the crime disposed in the article 239 of the TPC which is referred by most of the other penal norms in this respect.
4

Murtala, M. M., and Olumide Babatope Longe. "Data Security in Decentralized Cloud Systems: A Case for the Deployment of Blockchain Technology." In 27th iSTEAMS-ACity-IEEE International Conference. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v27p13.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The technological advancement and growth of the cloud computing technologies is changing network service provisioning and operation. Cloud based services represented as XaaS where X refers to service offering such as Platform, Software and Infrastructure as a service, provides flexible on-demand provisioning along with its security concerns that goes with the adoption of the cloud computing. Despite all the advantages of adopting the cloud computing option, the security and privacy of the clients’ data cannot be overlooked. Understanding these security concerns is a fundamental requirement to choosing the cloud solution. This paper focuses on the use of Blockchain technology to mitigate the security challenges of the cloud computing. Literature reviews have discussed other security options for the cloud, but little discussions have centered on the adoption of the Block Chain technology to secure the cloud and open doors for future research of cloud computing using smart contract. Keywords: Blockchain, Distributed Database Systems, Data Integrity, cryptography, Cloud Infrastructure Security, Confidentiality, Distributed Ledger
5

Deakin, Barry. "Model Tests in Support of the Design of a 50 Meter Barque." In SNAME 13th Chesapeake Sailing Yacht Symposium. SNAME, 1997. http://dx.doi.org/10.5957/csys-1997-005.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This paper describes a programme of model tests and computer predictions which was designed to assist in the selection of a hull design for a new ship, and ensure that it would meet the owner's requirements. Whilst that is a common requirement of model tests, this case was unusual because the subject was a 50 metre wooden sailing ship for disabled crews, and a choice had to be made with regard to a wide range of operational requirements. The paper describes the background to the project, the scope of the testing, the presentation of the results, and their implications for the design. A general outline of the whole project is given, rather than details of specific tests or results, because of the dual limitations of space and confidentiality to the client, Tony Castro Ltd. It is hoped that the paper will provide an illustration of the range of investigations which are now available to assist in the design stages of any sailing vessel.
6

Pytlar, Theodore S. "Status of Existing Biomass Gasification and Pyrolysis Facilities in North America." In 18th Annual North American Waste-to-Energy Conference. ASMEDC, 2010. http://dx.doi.org/10.1115/nawtec18-3521.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
A search of websites for firms in the United States and Canada identifying themselves as gasification or pyrolysis system suppliers indicates that there are a number of existing facilities where their technologies are installed. According to the websites, the companies’ existing installations focus on processing biomass and industrial residuals, rather than mixed refuse. The biomass processed, according to the websites includes yard waste, wood, and wastewater treatment sludge. The existence of these facilities provides a potential opportunity for communities in areas with a high density of development, who experience difficulties in siting “traditional” facilities for processing these biomass wastes. Such traditional facilities include yard waste and sludge composting, wood mulching, sludge drying, chemical treatment or pelletization, and combustion-based waste-to-energy. As a result of these facility siting difficulties, these communities often resort to long-haul trucking of the biomass wastes to processing facilities or landfills. Certain potential advantages associated with gasification and pyrolysis technologies could ease the siting difficulties associated with the traditional technologies, due to smaller facility footprints, reduced odors, and the potential for energy production through combustion of syngas/synfuel to power internal combustion engines or produce steam using boilers. Lower stack emissions may result as compared to direct combustion of biomass wastes. Locally sited biomass gasification facilities could reduce the environmental impacts associated with long-haul trucking and generate an energy product to meet nearby demand. Research has been conducted by the Author on behalf of client communities to identify gasification and pyrolysis facilities in the United States and Canada that are in actual operation in order to assess their potential for processing biomass wastes and for providing the advantages listed above. Website reviews, interviews with company representatives, and facility visits were conducted in order to assess their potential for development to meet the biomass management objectives of the communities. The information sought regarding design and operating parameters included the following: • Year of start-up. • Availability. • Process description. • Design throughput. • Actual throughput. • Energy product. • Energy generation capability and technology. • Residuals production and characteristics. • Emissions. • Construction and operating costs. In addition, the system suppliers’ business status was addressed in terms of their readiness and capabilities to participate in the development of new facilities. Confidentiality requirements imposed by the system suppliers may prevent the identification of the company name or facility location and certain details regarding the system designs.

Звіти організацій з теми "Confidentialité des clients":

1

Studsrød, Ingunn, Ragnhild Gjerstad Sørensen, Brita Gjerstad, Patrycja Sosnowska-Buxton, and Kathrine Skoland. “It’s very complex”: Professionals’ work with domestic violence (DV): Report – FGI and interviews 2022. University of Stavanger, November 2022. http://dx.doi.org/10.31265/usps.249.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This study explores Norwegian professionals' experiences of working within partner violence (PV) prevention area, including, cross-sectoral and interdisciplinary cooperation as well as possible successful strategies and measures in this area. This report is one of the deliverables of the “Integrated System of Domestic Violence Prevention” (ISDVP) project and of the agreement with The State Treasury, the Institute of Justice in Warsaw, Poland. This study contributes to research on professionals’ experiences of interprofessional collaboration in the domestic violence prevention area – a similar study was conducted in Poland. To facilitate an interdisciplinary and interagency group discussion, five focus groups (with 19 participants) were conducted. The analysis reveals that there is inter- and intra-sectoral collaboration in the domestic violence prevention area. There are marked challenges but also notable success stories. The participants talked about several barriers to cross-sectoral collaborations, such as i) professional requirements of confidentiality, mandate, and/or duty to report, especially in the domestic violence prevention stages; ii) the complexity and plethora of practical and organizational measures and initiatives as well as who does what and when, particularly when helping a client navigate through the system; and iii) the difficulty in defining as well as uncovering domestic violence because it can be understood differently by various parties, especially from a cross-cultural perspective and gender stereotypes. In terms of effective management of multisectoral collaboration, the participants mentioned i) several tools and models, e.g., SARA and Flexid, and ii) organization of emergency shelters; and iii) networking. Besides, the participants reported a need for a nuanced and multifocal approach to domestic violence prevention, including addressing the specificities of different vulnerable groups such as the elderly and the LGBQT+ community. They also talked about the importance of initiatives aimed at removing the stigma and taboo around domestic violence, also through targeting higher education establishments.

До бібліографії