TITLE

Privacy in ketens

AUTHOR(S)
van der Veen, M.
PUB. DATE
January 2014
SOURCE
Journal of Chain-computerisation;2014, Vol. 5, p1
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Many chains process personal data although it is not always crystal clear this is the case, for example when techniques such as pseudonyzing of number systems are used. Processing personal data is required to fulfill several requirements originating in the privacy law, such as purpose limitation, necessity, proportionality and data protection. An exchange of information which is developed under the theory of Chain Computerization largely fulfills these requirements. The chain analysis, the method of analyse of the theory, addresses multiple requirements. Despite this, it neglects two important elements of privacy, namely legality and self determination of the persons involved. In case these elements are neglected, the risk grows that an exchange of information develops conflicts with the law or is not considered to be acceptable by the organisations or persons involved. It may reduce the effectiveness of the cooperation. To apply to the privacy requirements, the chain analyses may be extended with several questions to determine risks in an early stage, providing the opportunity to mitigate these risks.
ACCESSION #
94903921

 

Related Articles

  • Data Protection Law in Spain and Latin America: Survey of Legal Approaches. Leiva, Aldo M. // International Law News;Fall2012, Vol. 41 Issue 4, p16 

    The article offers information on laws related to data protection in Latin America and Spain. It states that data protection law in Spain is based on personal data protections and privacy rights afforded by its Data Protection Law. The Data Protection Law creates a Data Protection Authority...

  • Smart metering systems and data sharing: why getting a smart meter should also mean getting strong information privacy controls to manage data sharing. King, Nancy J.; Jessen, Pernille W. // International Journal of Law & Information Technology;Autumn2014, Vol. 22 Issue 3, p215 

    Smart meters are being installed in consumers' homes as the world moves to the smart grid of intelligent energy networks. Smart meters are near real-time communication devices that can collect and communicate a vast amount of personal data about each customer's energy use. Questions about who...

  • EMERGENT PRIVACY. WOLFF, RAN // Journal of Philosophy;Mar2015, Vol. 112 Issue 3, p141 

    The article discusses the lack of a clear philosophy for legislation in defending the right to privacy. Topics include U.S. Court of Appeals judge and legal theorist Richard A. Posner's argument on the illegitimacy of shielding personal information, how this line of reasoning was extended by...

  • Aadhaar privacy test.  // Telegraph (Calcutta, India);8/7/2015, p1 

    This article discusses the reference of Aadhaar project to a Constitution bench of the Supreme Court for the examination of the validity of the scheme. It also mentions the violation of right to privacy by Aadhaar due to possible misuse by vested interests as it contains and stores the details...

  • The Economic Impact of the European Reform of Data Protection. CIRIANI, Stéphane // Communications & Strategies;2015 1st Quarter, Issue 97, p41 

    The economic value of personal data is mainly extracted through online intermediation services and big data analytics. The largest providers of these services are US OTTs. These are global market players with a leading position in the European market. As a result, the personal data of European...

  • Data protection for the digital age: comprehensive effects of the evolving law of accountability. GUMZEJ, Nina // Juridical Tribune / Tribuna Juridica;Dec2012, Vol. 2 Issue 2, p82 

    The law of personal data protection has for years been lagging behind technology, which is evolving propulsively and with high speed. A number of new challenges arising from the post-modern digital age have been identified for rights and freedoms of individuals with respect to processing of...

  • Me, myself and i. LOWE, REBECCA // IBA Global Insight;Oct/Nov2013, Vol. 67 Issue 5, p14 

    The article examines the legal implications of few people having control of their digital identity. The European Commission leads the effort on data protection and plans to enforce the General Data Protection Regulation, a unified European Union (EU) law. The new law also aims to reinforce...

  • Data use: consent is the new battleground. Chahal, Mindi // Marketing Week;11/13/2014, p1 

    The article discusses the need for marketers to address consumers' security concerns regarding marketers' use of consumer personal data. Topics include details on the gap between consumers' attitudes and what marketers' think customers' views are, details on consumers' skepticism regarding...

  • Protecting Guest Data is no PICNIC. Roger, Marion // Hospitality Upgrade;Summer2013, p144 

    The article presents the author's views on identity theft and its impact on both victims and the hospitality industry in the U.S. She examines the legislation governing identity theft and the trends toward potential regulatory moves that will affect the industry. She explores best practices as...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics