Search results for "Data Protection"

showing 10 items of 73 documents

New Modes of Regulation for Health and Safety: Post-Enlargement Policy Perspectives for the European Union

2006

The recent joining of ten new member states to the European Union, eight of which are former communist countries, has reopened inherent tensions in current European Union (EU) policy-making on safety and health in the workplace. These spring from seemingly incompatible objectives; the need to ensure broad EU member state compliance with regulation, around agreed minimum standards through active regulatory enforcement, and the promotion of “softer” voluntary initiatives in the management of workplace risks and hazards in order to create “a culture of prevention.” The present EU strategy which ends in 2006, seeks to secure a balance between both sets of objectives. However, with respect to t…

AdultBaltic StatesEmploymentMaleRisk AssessmentEuropean studiesData Protection DirectiveRisk FactorsPolitical scienceEuropean integration050602 political science & public administrationAccidents OccupationalHumansSingle Euro Payments Areamedia_common.cataloged_instance0501 psychology and cognitive sciencesEuropean UnionEuropean unionOccupational Health050107 human factorsmedia_commonMarketingEuropean Union lawData CollectionHealth Policy05 social sciencesCommunity ParticipationGeneral MedicineFiscal union0506 political scienceEuropeOccupational DiseasesPolitical economyFemaleForecastingSoft lawNEW SOLUTIONS: A Journal of Environmental and Occupational Health Policy
researchProduct

Telemedicine and COVID-19 pandemic: The perfect storm to mark a change in diabetes care. Results from a world-wide cross-sectional web-based survey

2021

Abstract Background Telemedicine for routine care of people with diabetes (PwD) during the COVID‐19 pandemic rapidly increased in many countries, helping to address the several barriers usually seen. Objective This study aimed to describe healthcare professionals' (HCPs) experience on telemedicine use in diabetes care and investigate the changes and challenges associated with its implementation. Methods A cross‐sectional electronic survey was distributed through the global network of JENIOUS members of ISPAD. Respondents' professional and practice profiles, clinic sizes, their country of practice, and data regarding local telemedicine practices during COVID‐19 pandemic were investigated. Re…

AdultMaleTelemedicineClinical Care and TechnologyInternationalityCoronavirus disease 2019 (COVID-19)pediatricstelehealthtype 1 diabetesHealth PersonnelEndocrinology Diabetes and MetabolismTelehealthCOVID‐19Surveys and QuestionnairesGlobal networkPandemicDiabetes MellitusInternal MedicinemedicineHumansData Protection Act 1998PandemicsReimbursementAgedAged 80 and overInternetbusiness.industryCOVID-19Middle Agedmedicine.diseaseWorld wideCross-Sectional StudiesPrivacyPediatrics Perinatology and Child HealthFemalevirtualMedical emergencytelemedicinebusinessPediatric Diabetes
researchProduct

PASSENGER NAME RECORD (PNR)

2018

Lo scritto prende in esame la questione relativa al trattamento e al trasferimento dei dati personali dei passeggeri (PNR) nel trasporto aereo, con lo scopo di combattere il terrorismo internazionale e la criminalità transnazionale. La questione è stata molto dibattuta a livello europeo, a partire dal primo accordo tra USA-Ue nel 2004, poi abrogato dalla Corte di giustizia Ue, sino ai tempi più recenti, con l’approvazione della direttiva 681/2016 e il parere 1/15 del 2017 della Corte di giustizia sulla compatibilità tra l’accordo Ue-Canada e il vigente quadro normativo dell’Ue, successivo all’entrata in vigore del trattato di Lisbona e della Carta dei diritti fondamentali dell’Unione europe…

Air TransportSettore IUS/06 - Diritto Della NavigazionePassenger Name RecordProtezione dei datiPNRData protectionTrasporto aereo
researchProduct

The security of mobile business applications based on mCRM

2020

A development of mobile technologies, and their common use in business, creates new challenges for people dealing with data security in the organization. This paper explores the types and nature of threats to the enterprise that result from the widespread use of business applications on smartphones (e.g. mobile CRM). The analysis has been focused on smartphones and tablets running on the Android operating system. We used STRIDE - a threat modeling technique commonly used to detect vulnerabilities in software security. We propose its modification to better design and implement solutions for the security of mobile devices. We also used the Data Flow Diagram and the Attack Tree concept to anal…

Attack treesInformation securityComputer science05 social sciencesAttack treeData securityMobile application02 engineering and technologyInformation securityComputer securitycomputer.software_genreSoftware security assurance020204 information systems0502 economics and businessThreat model0202 electrical engineering electronic engineering information engineeringSecurityData Protection Act 1998050211 marketingMobile technologyThreat modelingMobile devicecomputermCRM
researchProduct

“Right to erasure” and private blockchain in the European Union: legal requirements and technical possibilites

2020

Blockchain, serving as one of the most complex networks used within an organization may be regarded as challenging for the applicability and realization of the General Data Protection Regulation Article 17, which gives the data subject right to erasure or a “right to be forgotten” to ones’ personal data. The immutability and decentralized character of the system does not prescribe the erasure of personal data on the chain, as well as poses problems in determining the competent authority responsible for data protection compliance, when the data subject needs to exercise its rights under the GDPR. The thesis examines whether the compliance with the General Data Protection Regulation’s Article…

Blockchain:LAW/JURISPRUDENCE::Other law::European law [Research Subject Categories]Data protection
researchProduct

Ethics in Legal Research

2023

The essay grapples with one of the most controversial issues about legal research, namely its complex ethical and methodological dimension—here argued to be comparative—assessing the high scientific value of studying law. After clarifying what differentiates such a field of research from other natural and social studies, the authors address the presence of secondary interests and the need to use personal data for scientific purposes, as relevant situations which could undermine the reliability of any legal research or allow its thoroughness at the risk of interfering with human rights. The adherence to a rigorous and effective method in investigating national and foreign law, and the compli…

Comparative MethodConflict of Interests in Legal ResearchSettore IUS/02 - Diritto Privato ComparatoComparative lawData Protection
researchProduct

Interrelation Between European Union Protection and National Protection

2014

In addition to registration requirements, registration procedure, and the protection of registered IGOs, namely PDOs and PGIs, as well as protected indications of origin (within the Aromatised Wines Regulation), the EU law on IGOs also includes the regulation of other aspects. Competence of state institutions of EU Member States to ensure the observance of the regulation of IGOs as it is provided in the EU law or interrelation with other EU legal acts relating to IGOs already discussed in Part II of this book should be mentioned among such aspects.

Competence (law)State (polity)Member statesmedia_common.quotation_subjectPolitical scienceEuropean integrationmedia_common.cataloged_instanceNational data protection authorityEuropean unionPublic administrationCommon Agricultural PolicyData Protection Directivemedia_common
researchProduct

The Integration and Sharing of Resources for a New Quality of Living

2014

In questo capitolo, il tema della condivisione è trattato anche dal punto di vista giuridico attraverso una discussione caratterizzante il dibattito rilevante. Sono quindi approfondite le questioni inerenti le funzioni e la forma urbana. L’IT infatti può interagire con problemi operativi della città e con l’uso delle risorse ambientali (energia, suolo, acqua…), parametro indicativo su cui devono essere sviluppate le trasformazioni urbane. Come condividere gli spazi e le funzioni urbane costituisce la nuova frontiera nel campo dell’innovazione urbana. In this chapter, the issues of sharing of information and of information technologies use are dealt with from the juridical point of view, thr…

Computer sciencebusiness.industryEnergy (esotericism)Information technologyData securityEnergy consumptionEnvironmental economicsSettore ICAR/21 - Urbanisticacondivisione servizi e risorse aspetto giuridicoSmart gridSmart cityData Protection Act 1998sharing services and resources juridical aspectsSmart environmentbusiness
researchProduct

Impact of European Data Protection Reform on direct marketing

2019

This study explored the influence of the legislation adopted under the EU Data Protection Reform on the direct marketing. Since the introduction of the previous data protection legislation, the amount of data collected, processed and stored has grown exponentially, resulting in the increased risk to the data security of an individual. Thereby, introduction of new rules is a necessity in order to achieve proper execution of data subject’s rights in the digital age and create efficient and simplified rules for the companies to apply. Direct marketing is based on the actions connected to personal information – data is gathered via cookies, stored for the purposes of communication and analyzed …

ComputingMilieux_LEGALASPECTSOFCOMPUTINGDirect marketing:LAW/JURISPRUDENCE::Other law::European law [Research Subject Categories]Data protection
researchProduct

Algorithms, Artificial Intelligence and Automated Decisions about Workers and the Risks of Discrimination: The Necessary Collective Governance of Dat…

2018

Big data, algorithms and artificial intelligence currently allow entrepreneurs to process information about their employees in a far more efficient manner and at a much lower cost than has been the case until now. This makes it possible to profile workers automatically and even allows technology itself to replace human resources supervisors and managers and to make decisions that have legal effects on the employees (recruitment, promotion, dismissals, etc.). This entails great risks of discrimination by the technology in command, as well as the defencelessness of the worker, who is unaware of the reasons underlying such a decision. This study analyses the guarantees established in the exist…

ComputingMilieux_THECOMPUTINGPROFESSIONbusiness.industryCorporate governancemedia_common.quotation_subjectBig dataSafeguardingPromotion (rank)Data Protection Act 1998Profiling (information science)Lower costBusinessArtificial intelligenceHuman resourcesAlgorithmmedia_commonSSRN Electronic Journal
researchProduct