Data Protection Issues for European Data Transfer

Cowan, Stephen
April 2007
Credit Control;2007, Vol. 28 Issue 4/5, p14
Trade Publication
The article focuses on the issue of data protection for European data transfer. It examines the circumstances in which an individual's personal data may be transferred beyond the European Economic Area. The author reviews the terms of the Data Protection Directive and whether a recipient country offers a sufficient level of protection. He also examined the type of contractual rules to be observed in the absence of a directive to ensure the data transfer conforms to the directive.


Related Articles

  • Align data protection with business importance. Boles, Jeff // Storage Magazine;Aug2010, Vol. 9 Issue 8, p8 

    The article discusses issues of data protection and protecting use of information. It highlights the challenges posed by two separate markets servicing both aspects whereby solutions providing protection of data are often different from products offering to protect use of such data. It notes the...

  • Program Policy.  // Network Dictionary;2007, p388 

    A definition of the term "Program Policy" is presented. It refers to a high-level policy that sets the overall tone of an organization's security approach.

  • The Education and Study of Electronic Data. Tang Ling // Applied Mechanics & Materials;2014, Issue 644-650, p5655 

    In this era, computer Science and Internet has been the basis of our live. But it carried out information crime and it is worsening.Thus, instead of traditional evidence, electronic data has been an effective means to deal with information crime. So it is very improtant for the university to...

  • Interpreting Deep Structures of Information Systems Security. Thomas, Manoj; Dhillon, Gurpreet // Computer Journal;Oct2012, Vol. 55 Issue 10, p1148 

    Confidentiality, integrity and availability, while being key requirements for ensuring security, have had limitations in providing an integral security model that incorporates the benefits of all predominant designs. Heeding to the call that security models cater to unique operational...

  • IS CRITICAL DATA PROTECTED? Vosburgh, Craig // Communications News;Jun2007, Vol. 44 Issue 6, p20 

    The article looks at the protection of critical data. According to the article, hosted storage, such as Hosted PC data backup, offers small businesses with limited information technology budgets and scarce resources an easy-to-use, cost-efficient means to back up and restore critical data....

  • Practical Second-Order Correlation Power Analysis on the Message Blinding Method and Its Novel Countermeasure for RSA. HeeSeok Kim; Tae Hyun Kim; Joong Chul Yoon; Seokhie Hong // ETRI Journal;2010, Vol. 32 Issue 1, p102 

    Recently power attacks on RSA cryptosystems have been widely investigated, and various countermeasures have been proposed. One of the most efficient and secure countermeasures is the message blinding method, which includes the RSA derivative of the binary-with-randominitial- point algorithm on...

  • SONICWALL HELPS MERCHANT MEET BROADBAND SECUITY REQUIREMENTS.  // Computer Security Update;Feb2008, Vol. 9 Issue 2, p4 

    The article reports on the launch of the Card Acceptance Processing Network (CAPN) from American Express Co. Accordingly, the CAPN has been designed as an upgrade to the company's global infrastructure which is intended to enhance the point-of-sale security, to support the expanded transaction...

  • Every day's a data protection day.  // Credit Management;Mar2008, p8 

    The article offers information on the European Data Protection Day introduced by the Council of Europe in 2007. It aims to raise awareness of the protection of privacy in the European Union, to encourage the public to be certain of personal data protection and their rights and responsibilities....

  • Privacy by Design. Farmer, Liz // Governing;May2014, Vol. 27 Issue 8, p38 

    The article discusses the initiative taken by Ann Cavoukian, information and privacy Commissioner in Ontario, to protect country's personal privacy and data security. It mentions the role of Cavoukian for the development of Privacy by Design, an organization which develops approaches to promote...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics