Search results for "Data Protection Act 1998"
showing 10 items of 30 documents
Self-validating bundles for flexible data access control
2016
Modern cloud-based services offer free or low-cost content sharing with significant advantages for the users but also new issues in privacy and security. To protect sensitive contents (i.e., copyrighted, top secret, and personal data) from the unauthorized access, sophisticated access management systems or/and decryption schemes have been proposed, generally based on trusted applications at client side. These applications work also as access controllers, verifying specific permissions and restrictions accessing user’s resources. We propose secure bundles (S-bundles), which encapsulate a behavioral model (provided as bytecode) to define versatile stand-alone access controllers and encoding/d…
COVID-19 Contact Tracing and Data Protection Can Go Together
2020
We discuss the implementation of app-based contact tracing to control the coronavirus disease (COVID-19) pandemic and discuss its data protection and user acceptability aspects.
Telemedicine and COVID-19 pandemic: The perfect storm to mark a change in diabetes care. Results from a world-wide cross-sectional web-based survey
2021
Abstract Background Telemedicine for routine care of people with diabetes (PwD) during the COVID‐19 pandemic rapidly increased in many countries, helping to address the several barriers usually seen. Objective This study aimed to describe healthcare professionals' (HCPs) experience on telemedicine use in diabetes care and investigate the changes and challenges associated with its implementation. Methods A cross‐sectional electronic survey was distributed through the global network of JENIOUS members of ISPAD. Respondents' professional and practice profiles, clinic sizes, their country of practice, and data regarding local telemedicine practices during COVID‐19 pandemic were investigated. Re…
The security of mobile business applications based on mCRM
2020
A development of mobile technologies, and their common use in business, creates new challenges for people dealing with data security in the organization. This paper explores the types and nature of threats to the enterprise that result from the widespread use of business applications on smartphones (e.g. mobile CRM). The analysis has been focused on smartphones and tablets running on the Android operating system. We used STRIDE - a threat modeling technique commonly used to detect vulnerabilities in software security. We propose its modification to better design and implement solutions for the security of mobile devices. We also used the Data Flow Diagram and the Attack Tree concept to anal…
The Integration and Sharing of Resources for a New Quality of Living
2014
In questo capitolo, il tema della condivisione è trattato anche dal punto di vista giuridico attraverso una discussione caratterizzante il dibattito rilevante. Sono quindi approfondite le questioni inerenti le funzioni e la forma urbana. L’IT infatti può interagire con problemi operativi della città e con l’uso delle risorse ambientali (energia, suolo, acqua…), parametro indicativo su cui devono essere sviluppate le trasformazioni urbane. Come condividere gli spazi e le funzioni urbane costituisce la nuova frontiera nel campo dell’innovazione urbana. In this chapter, the issues of sharing of information and of information technologies use are dealt with from the juridical point of view, thr…
Algorithms, Artificial Intelligence and Automated Decisions about Workers and the Risks of Discrimination: The Necessary Collective Governance of Dat…
2018
Big data, algorithms and artificial intelligence currently allow entrepreneurs to process information about their employees in a far more efficient manner and at a much lower cost than has been the case until now. This makes it possible to profile workers automatically and even allows technology itself to replace human resources supervisors and managers and to make decisions that have legal effects on the employees (recruitment, promotion, dismissals, etc.). This entails great risks of discrimination by the technology in command, as well as the defencelessness of the worker, who is unaware of the reasons underlying such a decision. This study analyses the guarantees established in the exist…
PLC security and critical infrastructure protection
2013
Programmable Logic Controllers (PLCs) are the most important components embedded in Industrial Control Systems (ICSs). ICSs have achieved highest standards in terms of efficiency and performance. As a result of that, higher portion of infrastructure in industries has been automated for the comfort of human beings. Therefore, protection of such systems is crucial. It is important to investigate the vulnerabilities of ICSs in order to solve the threats and attacks against critical infrastructure to protect human lives and assets. PLC is the basic building block of an ICS. If PLCs are exploited, overall system will be exposed to the threat. Many believed that PLCs are secured devices due to it…
Artificial Intelligence for Hospital Health Care:Application Cases and Answers to Challenges in European Hospitals
2021
The development and implementation of artificial intelligence (AI) applications in health care contexts is a concurrent research and management question. Especially for hospitals, the expectations regarding improved efficiency and effectiveness by the introduction of novel AI applications are huge. However, experiences with real-life AI use cases are still scarce. As a first step towards structuring and comparing such experiences, this paper is presenting a comparative approach from nine European hospitals and eleven different use cases with possible application areas and benefits of hospital AI technologies. This is structured as a current review and opinion article from a diverse range of…
Credit-Based Insurance Scores: some Observations in the Light of the European General Data Protection Regulation
2020
Despite the differences between credit risk and insurance risk, in many countries large insurance companies include credit history amongst the information to be taken into account when assigning consumers to risk pools and deciding whether or not to offer them an auto or homeowner insurance policy, or to determine the premium that they should pay. In this study, I will try to establish some conclusions concerning the requirements and limits that the use of credit history data by insurers in the European Union should be subject to. In order to do this, I shall focus my attention primarily on Regulation (EU) 2016/679. This regulation, that came into force on 24 May 2018, not only forms the ba…
USEDAT: USA-Europe Data Analysis Training Worldwide Program, 2019 ed.
2019
USA-Europe Data Analysis Training School (USEDAT) is a Multi-center Trans-Atlantic initiative offering hands-on training focused in both Introduction to Experimental Data Recording (NMR, MS, IR, 2DGE, EEG, etc.) and/or posterior Computational Data Analysis (Machine Learning, Complex Networks, etc.). We made emphasis on applications in for Cheminformatics, Bioinformatics, Medicinal Chemistry, Nanotechnology, Systems Biology, Biomedical Engineering, etc. The school also promotes training and knowledge of ethical and legal regulatory issues (GDPR, REACH, OECD, FDA, etc.) about data use and data protection in chemistry and biomedical research. The school is directed to researchers and students …