TITLE

Las redes sociales a la luz de la propuesta de reglamento general de protección de datos personales.¹ Parte dos

AUTHOR(S)
Reigada, Antonio Troncoso
PUB. DATE
June 2013
SOURCE
IDP: Revista de Internet, Derecho y Politica;jun2013, Issue 16, p27
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
This paper examines how personal data is processed by companies offering social network services in the context of the new legal framework entailed in the EU's proposal for the General Data Protection Regulation presented by the European Commission in January 2012. The paper examines who is responsible for data processing and applying the exclusion of personal or domestic activities. An attempt is made to dissect the difficulties in applying Directive 95/46/CE to International Corporations based outside of the EU and how the proposal for the General Data Protection Regulation aims to regulate this matter. The data, the consent of interested parties for data processing and transfers, the principle of quality in social network services, data storage, security measures and the rights of individuals, in particular, the right to be forgotten on the Internet, are analysed in the context of the proposal for the General Data Protection Regulation.
ACCESSION #
97347337

 

Related Articles

  • Data Protection Law in Spain and Latin America: Survey of Legal Approaches. Leiva, Aldo M. // International Law News;Fall2012, Vol. 41 Issue 4, p16 

    The article offers information on laws related to data protection in Latin America and Spain. It states that data protection law in Spain is based on personal data protections and privacy rights afforded by its Data Protection Law. The Data Protection Law creates a Data Protection Authority...

  • Unlocking the secrets of GDPR effectiveness. Kemp, David // Lawyer;12/5/2016, Vol. 30 Issue 49, p21 

    The article focuses on the effectiveness of General Data Protection Regulation (GDPR) which ensure compliance within the corporation. Topics discussed include challenges for handling the Personally Identifiable Information (PII), GDPR policy and procedures to the accumulated information and...

  • 3 Questions To Ask. Vandam, Greg // Best's Review;Jul2010, Vol. 111 Issue 3, p48 

    The article presents questions and answers related to insurance industry and technology including a company's guideline for data sharing, security measures for data and the role of technology on managerial skills.

  • BLEEDING DATA IN A POOL OF SHARKS: THE ANATHEMA OF PRIVACY IN A WORLD OF DIGITAL SHARING AND ELECTRONIC DISCOVERY. Witte, Derek S. // South Carolina Law Review;Spring2013, Vol. 64 Issue 3, p717 

    The article explores how sharing of personal data by the individual consumers and businesses on social networking sites such as face book relinquish right of privacy to marketing companies and data miners. It informs that the U.S. Stored Communications Act is ineffective and should be reformed....

  • Mobile common friends discovery with friendship ownership and replay-attack resistance. Chiou, Shin-Yan; Huang, Yao-Hsien // Wireless Networks (10220038);Nov2013, Vol. 19 Issue 8, p1839 

    Online social networking applications are nearly ubiquitous, but are currently limited to trusted infrastructure. For example, two unfamiliar users can exploit their social proximity to discover common friends, but otherwise face considerable difficulty in discovering of things they may have in...

  • Data protection for the digital age: comprehensive effects of the evolving law of accountability. GUMZEJ, Nina // Juridical Tribune / Tribuna Juridica;Dec2012, Vol. 2 Issue 2, p82 

    The law of personal data protection has for years been lagging behind technology, which is evolving propulsively and with high speed. A number of new challenges arising from the post-modern digital age have been identified for rights and freedoms of individuals with respect to processing of...

  • Me, myself and i. LOWE, REBECCA // IBA Global Insight;Oct/Nov2013, Vol. 67 Issue 5, p14 

    The article examines the legal implications of few people having control of their digital identity. The European Commission leads the effort on data protection and plans to enforce the General Data Protection Regulation, a unified European Union (EU) law. The new law also aims to reinforce...

  • Privacy in ketens. van der Veen, M. // Journal of Chain-computerisation;2014, Vol. 5, p1 

    Many chains process personal data although it is not always crystal clear this is the case, for example when techniques such as pseudonyzing of number systems are used. Processing personal data is required to fulfill several requirements originating in the privacy law, such as purpose...

  • Data use: consent is the new battleground. Chahal, Mindi // Marketing Week;11/13/2014, p1 

    The article discusses the need for marketers to address consumers' security concerns regarding marketers' use of consumer personal data. Topics include details on the gap between consumers' attitudes and what marketers' think customers' views are, details on consumers' skepticism regarding...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics