18,358 results on '"Personally identifiable information"'
Search Results
152. LOOKING BACK AT THE COMPETITION LAW CHALLENGES 2024 CONFERENCE.
- Author
-
Mňuk, Jiří, Kupčík, Jan, and Kopárek, Šimon
- Subjects
LANGUAGE models ,RENT (Economic theory) ,DATA protection laws ,COMMERCIAL law ,LOCAL delivery services ,PERSONALLY identifiable information - Abstract
This summary provides an overview of the Competition Law Challenges 2024 conference held at Charles University in Prague. The conference aimed to stimulate discussion on current topics in competition law and regulation. Keynote speakers discussed the importance of conferences for public debate and outlined planned legislative changes. Panel discussions covered topics such as anti-competitive agreements, sectoral regulation in technology sectors, and procedural issues. The conference aimed to contribute to the development and improvement of competition law in the Czech Republic. [Extracted from the article]
- Published
- 2024
- Full Text
- View/download PDF
153. Personenbezug von Large Language Models — Eine datenschutzrechtliche Grundsatzfrage bei der Nutzung generativer KI-Modelle.
- Author
-
Moos, Flemming
- Subjects
LANGUAGE models ,DATA protection laws ,DATA protection ,PERSONALLY identifiable information ,INFORMATION processing - Abstract
Copyright of Computer und Recht is the property of De Gruyter and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
154. Human Identification Using Near-Field Bi-Static Radar at Low Frequencies.
- Author
-
Tan Xin Hui, Nicole, Oon-Ee, Ng, Vetharatnam, Gobi, Teoh Chin Soon, and Ellis, Grant
- Subjects
MACHINE learning ,BIOMETRIC identification ,PERSONALLY identifiable information ,BISTATIC radar ,MACHINE performance ,RADIO frequency - Abstract
Near-field scattering of human targets in the view of a bi-static, radar-like sensor operating in the lower radiofrequencies is used as an alternative to traditional biometric identification systems. These radiofrequency-based human sensor systems have emerged as a promising solution to address privacy concerns, particularly those associated with audio and visual data that extract sensitive personally identifiable information. In this paper, we propose a novel method for privacy-preserving human identification using bi-static radar-like sensors. Unlike conventional radar systems that rely on echoes and reflections in the far field, our approach is based on the transmission of signals through and around users as they pass through a transmitter and receiver. Instead of the more commonly used linear or segmented swept frequencies, this work utilizes discrete swept frequencies to transmit and receive radiofrequency signals. We have examined the performance of seven machine learning models in terms of accuracy and processing time and found that the Extra Trees ensemble model produced the best results, with an accuracy rate of 94.25% for a sample size of 31 individuals using an Intel(R) Core(TM) i5-10300H CPU @ 2.50 GHz processor. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
155. دور روبوتات الدردشة في تطوير مهارات البحث العلمي.
- Author
-
لولوه عمر العبد and فتون باسم قطيني
- Subjects
CHATBOTS ,EMPLOYABILITY ,GRADUATE students ,RESEARCH personnel ,PERSONALLY identifiable information - Abstract
Copyright of Scientific Journal of King Faisal University, Humanities & Management Sciences is the property of Association of Arab Universities and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
156. Determining Intrusion Attacks Against Online Applications Using Cloud-Based Data Security.
- Author
-
M., Rekha and P., Shoba Rani
- Subjects
DATA security ,CLOUD computing ,ONLINE social networks ,PERSONALLY identifiable information ,DATA privacy ,TECHNOLOGICAL innovations - Abstract
Cloud technology makes it possible for users to access information from anywhere, all the time, on any device, and that is the major cause of the many different types of assaults. In principle, multiple dangers, including data leakage, information leakage, and unauthorized information accessibility, are active in cloud environment layering. Modern technological advancements are made accessible on a daily basis through cloud technology. In the cloud, access control and encryption solutions are more complicated. Because of this greater level, security flaws in online applications and systems are more likely to occur. Somewhere at the ends of the end nodes, a malignant insider can carry out protection assaults. Nevertheless, problems with user privacy and data protection on cloud-based social networking sites continue to exist. Such problems are not known to users. On that social networking site, they post a variety of images, videos, and private information that endures even after eradication. However, some of the data that has been made public was intended to be kept private; as a result, online social information has significantly increased the risk of personally identifiable information leaking. The context of cloud technology depends on the customer capabilities such as quick storing and retrieving offered through cloud computing environments. Dependable cloud providers use a number of methodologies to deliver various digital services, creating a variety of security risks. In this paper, the study of determining intrusive cyber-attacks over the online applications using the cloud data security. Restricting access to shared resources is essential to prevent hackers from stealing vulnerabilities in cloud computing to get unauthorised access to a user's activities as well as information. Gaining access to customer information and obstructing the use of cloud computing are the primary objectives of intrusions on cloud services. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
157. Rethinking copyright exceptions in the era of generative AI: Balancing innovation and intellectual property protection.
- Author
-
Thongmeensuk, Saliltorn
- Subjects
INTELLECTUAL property ,GENERATIVE artificial intelligence ,FAIR use (Copyright) ,DIGITAL music ,EXCEPTIONS (Law) ,PERSONALLY identifiable information ,TRADE secrets - Abstract
Generative artificial intelligence (AI) systems, together with text and data mining (TDM), introduce complex challenges at the junction of data utilization and copyright laws. The inherent reliance of AI on large quantities of data, often encompassing copyrighted materials, results in multifaceted legal quandaries. Issues surface from the unfeasible task of securing permission from each copyright holder for AI training, further muddled by ambiguities in interpreting copyright laws and fair use provisions. Adding to the conundrum, the clandestine practices of data collection in proprietary AI systems obstruct copyright owners from detecting unauthorized use of their materials. The paper explores the exceptions to copyright laws for TDM in the European Union, the United Kingdom, and Japan, recognizing their crucial role in fostering AI development. The EU has a two‐pronged approach under the Directive on Copyright in the Digital Single Market, with one exception catering specifically to research organizations, and another, more generalized one, that can be restricted by rightsholders. The UK allows noncommercial TDM research without infringement but rejected a broader copyright exception due to concerns from the creative sector. Japan has the broadest TDM exception globally, permitting the nonenjoyment use of works without permission, though this can potentially overlook the rights of copyright owners. Notably, the applicability of TDM exceptions to AI‐produced copies remains unclear, creating potential legal challenges. Furthermore, an exploration of the fair use doctrine in the United States provides insight into its potential application in AI development. It focuses on the transformative aspect of usage and its impact on the original work's potential market. This exploration underscores the necessity for clear, practical guidelines. In response to these identified challenges, this paper proposes a hybrid model for TDM exceptions emerges, along with recommended specific mechanisms. The model divides exceptions into noncommercial and commercial uses, providing a nuanced solution to complex copyright issues in AI training. Recommendations incorporate mandatory exceptions for noncommercial uses, an opt‐out clause for commercial uses, enhanced transparency measures, and a searchable portal for copyright owners. In conclusion, striking a delicate equilibrium between technological progress and the incentive for creative expression is of paramount importance. These suggested solutions aim to establish a harmonious foundation that nurtures innovation and creativity while honoring creators' rights, facilitating AI development, promoting transparency, and ensuring fair compensation for creators. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
158. Estampa-me: desenvolvimento e avaliação de uma visualização de dados pessoais aplicada à estamparia.
- Author
-
Pinheiro, Gabriella, Rabetti Giannella, Júlia, and Kosminsky, Doris
- Subjects
DATA modeling ,TEXTILE patterns ,DATA visualization ,TEXTILE design ,PERSONALLY identifiable information ,EVALUATION methodology - Abstract
Copyright of Arcos: Design, Cultura e Visualidade is the property of Editora da Universidade do Estado do Rio de Janeiro (EdUERJ) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
159. Light in the Black Box?: On the Data Protection Obligation to Disclose Credit Scoring Algorithms.
- Author
-
Brüggemann, Erik and Möller, Carl Christoph
- Subjects
DATA protection ,GENERAL Data Protection Regulation, 2016 ,TRADE secrets ,EUROPEAN law ,PERSONALLY identifiable information - Abstract
Most consumers are scored by credit agencies. They do not know how, although they have a right to know. The right of access under GDPR requires disclosure of how personal data is processed. This includes revealing information about algorithms used to calculate score values for the creditworthiness of individuals, although there are frequent counter arguments. Contrary to further widespread claims, this does not conflict with the protection of trade secrets under European law. Nor can European regulations on intellectual property or freedom to conduct a business be invoked against making this information available. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
160. THE IMPACT OF DIGITIZATIONON PUBLIC ADMINISTRATION MANAGEMENT IN ROMANIA.
- Author
-
COJOCARU, LAVINIA, PICA, AUREL ŞTEFAN, and STOICA, ANDREI-ALEXANDRU
- Subjects
PUBLIC administration ,PERSONALLY identifiable information ,DATA protection ,DIGITAL literacy ,MUNICIPAL services ,COVID-19 pandemic - Abstract
Considering that crisis situations highlight the weak parts of a system, in our research we chose to analyse public administration management in Romania in what concerns digitization with regards to the Covid-19 pandemic period and to suggest several efficient models to improve it. At the same time we took into consideration the barriers of the digitization process and we analyzed the implementation priorities so that we aimed at recommending also other digital instruments that follow personal data protection of both Romanian and foreign citizens and also promote the accessibility to these electronic means of interaction between state and citizen. The paper will take into consideration how current technology was implemented by Romanian authorities in regards to helping citizens access public services and also what future technology can achieve. Furthermore, we conclude that Romania has achieved a certain level of digitization, yet it is not accessible yet to its citizens and it has not provided an easy to access governmental cloud system. We also consider that the public administration can offer more training to both public servants and citizens on how digital public services can be accessed and if the connection is secured. Digital literacy has to be implemented from an early stage in the life of a citizen and as such we consider that investments in education have to be reached beforehand. [ABSTRACT FROM AUTHOR]
- Published
- 2024
161. Differential Private Federated Learning in Geographically Distributed Public Administration Processes.
- Author
-
Ahmadzai, Mirwais and Nguyen, Giang
- Subjects
MACHINE learning ,DATA privacy ,PUBLIC administration ,PUBLIC opinion ,PERSONALLY identifiable information ,DIGITAL technology - Abstract
Public administration frequently deals with geographically scattered personal data between multiple government locations and organizations. As digital technologies advance, public administration is increasingly relying on collaborative intelligence while protecting individual privacy. In this context, federated learning has become known as a potential technique to train machine learning models on private and distributed data while maintaining data privacy. This work looks at the trade-off between privacy assurances and vulnerability to membership inference attacks in differential private federated learning in the context of public administration applications. Real-world data from collaborating organizations, concretely, the payroll data from the Ministry of Education and the public opinion survey data from Asia Foundation in Afghanistan, were used to evaluate the effectiveness of noise injection, a typical defense strategy against membership inference attacks, at different noise levels. The investigation focused on the impact of noise on model performance and selected privacy metrics applicable to public administration data. The findings highlight the importance of a balanced compromise between data privacy and model utility because excessive noise can reduce the accuracy of the model. They also highlight the need for careful consideration of noise levels in differential private federated learning for public administration tasks to provide a well-calibrated balance between data privacy and model utility, contributing toward transparent government practices. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
162. AI-Driven Contextual Advertising: Toward Relevant Messaging Without Personal Data.
- Author
-
Häglund, E. and Björklund, J.
- Subjects
COMMERCIAL art ,ADVERTISING media planning ,REINFORCEMENT learning ,PERSONALLY identifiable information ,ARTIFICIAL intelligence - Abstract
In programmatic advertising, bids are increasingly based on knowledge of the surrounding media context. This shift toward contextual advertising is in part a counter-reaction to the current dependency on personal data, which is problematic from legal and ethical standpoints. The transition is accelerated by developments in artificial intelligence (AI), which allow for a deeper semantic analysis of the context and, by extension, more effective ad placement. We survey existing literature on the influence of context on the reception of an advertisement, focusing on three context factors: the applicability of the content and the ad, the affective tone of the content, and the involvement of the consumer. We then discuss how AI can leverage these priming effects to optimize ad placement through techniques such as reinforcement learning, data clustering, and sentiment analysis. This helps close the gap between the state of the art in advertising technology and the AI-driven targeting methodologies described in prior academic research. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
163. Strength and conditioning habits of Polish amateur endurance runners.
- Author
-
JOST, Zbigniew and CHROBOCZEK, Maciej
- Subjects
RESISTANCE training ,RUNNERS (Sports) ,ATHLETE training ,PERSONALLY identifiable information ,HABIT - Abstract
Introduction: Correctly performed Strength & Conditioning (S&C) training is important in terms of improving sports performance. This survey was to check S&C habits among amateur runners in Poland. Materials and Methods: The questionnaire dealt with 1) personal and anthropometric data, 2) advancement / fitness level and 3) training habits, which was correctly filled in by 923 people. The participants were matched to five fitness levels (LG1–LG5) depending on sex (W/M) and the selected distance (5K/10K/Half-Marathon). Results: More than half of the respondents (n = 467, 50.6%) considered S&C as very important. The most frequently used S&C activities were uphill runs (n = 608, 65.9%) and bodyweight exercises (n = 596, 64.6%). Some of respondents (n = 418, 45.3% and n = 152, 16.5%) performed resistance training (RT) and plyometric training (PT), respectively. Runners with a higher level of advancement (LG5) performed S&C twice a week (p ≤ 0.05), while athletes from less advanced groups (LG1, LG2) showed a tendency to perform once a week (p = 0.192, p = 0.317), respectively. The respondents also more often chose a low range of repetitions when performing S&C. Conclusions: It is known that the performed S&C should be based on existing scientific evidence. Thus, coaches and practitioners should consider the usefulness of certain activities in the context of implementing them in their athletes' training plans. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
164. Automated Decision-Making and Effective Remedies. The New Dynamics in the Protection of EU Fundamental Rights in the Area of Freedom, Security and Justice.
- Author
-
Ferfecký, Jan
- Subjects
CIVIL rights ,JUSTICE ,DECISION making ,LIBERTY ,PERSONALLY identifiable information - Published
- 2024
165. RECENT AMENDMENTS AND JUDICIAL REVIEW OF DECISIONS BY THE TURKISH DATA PROTECTION AUTHORITY.
- Author
-
DOĞAN, Fatma Sümeyra
- Subjects
LAW reform ,DATA protection laws ,DATA protection ,CRIMINAL law ,LEGAL judgments ,PERSONALLY identifiable information - Abstract
Copyright of Law & Justice Review is the property of Justice Academy of Turkey and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
166. OS DESAFIOS JURIDICOS E A EFETIVIDADE DAS ESTRATEGIAS PENAIS CONTRA O TRÁFICO DE DADOS PESSOAIS NA INTERNET: UMA ABORDAGEM INTERDISCIPLINAR.
- Author
-
Dourado Gomes de Souza, Júlia Eugênia
- Subjects
DATA protection ,GENERAL Data Protection Regulation, 2016 ,DATA protection laws ,DIGITAL technology ,PERSONALLY identifiable information - Abstract
Copyright of Revista Foco (Interdisciplinary Studies Journal) is the property of Revista Foco and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
167. O IMPACTO DA LGPD NAS POLÍTICAS PÚBLICAS DE INFRAESTRUTURA NO BRASIL.
- Author
-
Meira dos Santos, Lucas, Soares Faddoul, Angélia Amélia, Freire da Silva, Otávio Alexandre, Batista da Silva, Caroliny Santos, and Viena Miguel, Juliana
- Subjects
DATA protection ,DATA protection laws ,GOVERNMENT policy ,CITIZENS ,PERSONALLY identifiable information - Abstract
Copyright of Revista Foco (Interdisciplinary Studies Journal) is the property of Revista Foco and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
168. Digital Access, Digital Literacy, and Afterlife Preparedness: Societal Contexts of Digital Afterlife Traces.
- Author
-
Park, Lance Yong Jin, Oh, Yu Won, and Sang, Yoonmo
- Subjects
DIGITAL literacy ,SUBJECTIVE well-being (Psychology) ,PERSONALLY identifiable information ,WELL-being ,AFTERLIFE - Abstract
This study aims to evaluate how individuals are prepared to cope with or plan for their afterlife digital footprints, by examining how (1) access, (2) literacy, and (3) preparedness for digital afterlife work in concert to influence one's wellbeing. We found the indirect relationship between access and wellbeing and the influence of digital literacy on wellbeing was indirect, illustrating that the key to the puzzle is in the sequential step in which digital literacy incubates the readiness to cope with digital remains, which influences one's subjective wellbeing. One of the most unrecognized challenges facing digital traces is the exploitation of post-life remain of data, as the question of who accesses, owns, or controls personal data after death remains largely unanswered. We argue that the preparedness for digital afterlife represents a new form of social concern with real-life consequences, or even a newer space for inequality debates. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
169. Crónica de la Jurisprudencia del Tribunal de Justicia de la Unión Europea Primer semestre de 2024.
- Author
-
Ordóñez Solís, David
- Subjects
DATA privacy ,VICTIMS of domestic violence ,EUROPEAN Union law ,EMPLOYEE rights ,TEMPORARY employees ,PERSONALLY identifiable information - Abstract
Copyright of Cuadernos Europeos de Deusto is the property of Universidad de Deusto and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
170. IMPLICACIONES LEGALES DEL WEB SCRAPING EN EL ENTRENAMIENTO DE MODELOS DE INTELIGENCIA ARTIFICIAL GENERATIVA.
- Author
-
PACHECO CHAPARRO, JUAN MANUEL and BARRERO RAMÍREZ, LAURA
- Subjects
GENERATIVE artificial intelligence ,DATA protection ,DATABASES ,PUBLIC domain (Copyright law) ,WEBSITES ,PERSONALLY identifiable information - Abstract
Copyright of Propiedad Inmaterial is the property of Universidad Externado de Colombia, Centro de Estudios de la Propriedad Intelectual and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
171. Right to Privacy and Data Protection Concerns Raised by the Development and Usage of Face Recognition Technologies in the European Union.
- Author
-
Kavoliūnaitė-Ragauskienė, Eglė
- Subjects
PERSONALLY identifiable information ,HUMAN facial recognition software ,DATA privacy ,RIGHT of privacy ,DATA protection ,PRIVACY ,ARTIFICIAL intelligence ,INTERNET privacy - Abstract
The fast and fragmentedly regulated development of facial recognition technologies and related artificial intelligence poses various challenges to personal privacy, which leads to potential infringements of a wide range of related human rights. This article analyses the threats that the development and use of facial recognition technologies pose to privacy and personal data protection. It discusses the concept of privacy and the protection of personal data, including biometric data, at European Union level, and assesses the proposed new legal framework. It questions whether this is sufficient to protect privacy and ensure personal data protection in the context of the rapid development and increasing usage of facial recognition technologies in public and private sectors. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
172. Mitigating microtargeting: Political microtargeting law in Australia and New Zealand.
- Author
-
Dowling, Melissa‐Ellen
- Subjects
DIGITAL technology ,COMPARATIVE method ,PREPAREDNESS ,COMPARATIVE law ,BLENDED learning ,ADVERTISING laws ,PERSONALLY identifiable information - Abstract
To the detriment of liberal democracy, governments have struggled to prevent the exploitation of personal data for voter manipulation in the digital era. Laws pertaining to political microtargeting are often piecemeal and tend to derive from a combination of laws on electoral advertising and privacy. Evidence indicates that this approach is insufficient to curtail microtargeting. However, little is known about the regulation of microtargeting outside of the European and US contexts within which the bulk of anti‐microtargeting research has been undertaken. Accordingly, this paper aims to shed light on the preparedness of the law in Australia and New Zealand to mitigate the potential harms of political microtargeting. A comparative analysis of legislation pertaining to microtargeting is therefore undertaken using a blended approach of comparative law and content analysis. This paper: (1) identifies current legislation relevant to microtargeting in Australia and New Zealand; (2) assesses patterns of similarity and difference between each country's laws in relation to microtargeting; and (3) evaluates the preparedness of current legislation to curtail microtargeting in an evolving social media landscape. It finds that in both countries, legislation is sufficiently robust to mitigate microtargeting in some limited circumstances, but a cohesive regulatory approach is needed to constrain the most insidious microtargeting operations. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
173. Seeing the forest through the palms: developments in environmentally sustainable palm oil production and zero-deforestation efforts.
- Author
-
Ostfeld, Rosemary and Reiner, David M.
- Subjects
PALM oil industry ,SUSTAINABLE development ,TROPICAL ecosystems ,PERSONALLY identifiable information ,FOREST products ,VEGETABLE oils - Abstract
Palm oil is produced on plantations primarily in Indonesia and Malaysia, which, historically, have been responsible for significant tropical deforestation and ecosystem loss. Driven by a shift away from hydrogenated vegetable oils and its high productivity, palm oil is now part of more than half of all packaged consumer products. Given its centrality across many supply chains, certification schemes have sought to improve environmental sustainability in the palm oil industry. Increasingly, there is an intersection between certification schemes and regulatory drivers. The recent 2023 European Union regulation on deforestation-free products has implications for palm oil and many other forest products. Environmental certification schemes, such as the one developed by the Roundtable on Sustainable Palm Oil, have the potential to play a critical role in the implementation of this recent policy for palm oil and can serve as model for many other commodities subject to the new Directive. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
174. Whole genome sequencing in (recurrent) glioblastoma: challenges related to informed consent procedures and data sharing.
- Author
-
Hasner, Mira C., van Opijnen, Mark P., de Vos, Filip Y. F., Cuppen, Edwin, and Broekman, Marike L. D.
- Subjects
- *
WHOLE genome sequencing , *INFORMATION sharing , *GLIOBLASTOMA multiforme , *PERSONALLY identifiable information - Abstract
Increased use of whole genome sequencing (WGS) in neuro-oncology for diagnostics and research purposes necessitates a renewed conversation about informed consent procedures and governance structures for sharing personal health data. There is currently no consensus on how to obtain informed consent for WGS in this population. In this narrative review, we analyze the formats and contents of frameworks suggested in literature for WGS in oncology and assess their benefits and limitations. We discuss applicability, specific challenges, and legal context for patients with (recurrent) glioblastoma. This population is characterized by the rarity of the disease, extremely limited prognosis, and the correlation of the stage of the disease with cognitive abilities. Since this has implications for the informed consent procedure for WGS, we suggest that the content of informed consent should be tailor-made for (recurrent) glioblastoma patients. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
175. FISCAL RISK ANALYSIS TOOLS AT THE LEVEL OF THE EUROPEAN UNION.
- Author
-
PORUMBOIU, Adriana Elena and BREZEANU, Petre
- Subjects
- *
FINANCING of public health , *BUDGET surpluses , *BUDGET , *FISCAL policy , *BUDGET deficits , *HUMAN security , *PERSONALLY identifiable information - Abstract
The fiscal balance is an indicator of the health of public finances and a result of the fiscal policy that differs from one state to another, even in similar macroeconomic conditions. Especially after the Covid-19 crisis which showed that governments need a more permissive fiscal space for adjustments and a good knowledge of the fiscal vulnerabilities to which they are exposed, budget deficit or surplus can be used as a tool to measure fiscal risk or fiscal security, respectively. Based on data from Eurostat and World Bank databases, our analysis concerns the current 27 European Union member states between 2000 and 2021. Our study demonstrates that general government debt, foreign direct investments, military and unemployment expenditures negatively impact the budget balance, while economic growth and pension expenditures are revealed as positive determinants of the budget balance. Considering the calculated coefficients, economic growth stands out as the most important source of competing fiscal risks and improving budget balance, proved by all the statistical methodologies employed in the study. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
176. LEGAL REGULATIONS FOR ANTICIPATING ARTIFICIAL INTELLIGENCE-BASED WORKERS THROUGH INSTITUTIONAL TRANSFORMATION OF JOB TRAINING AND THE HUMAN RESOURCES REVOLUTION.
- Author
-
Santoso, Imam Budi, Triyunarti, Wiwin, Farhani, Athari, Azizah, Faiqah Nur, and Suherman, Ade Maman
- Subjects
- *
ARTIFICIAL intelligence , *OCCUPATIONAL training , *DATA privacy , *HUMAN resources departments , *EMPLOYEE rights , *PERSONALLY identifiable information , *RIGHT to be forgotten - Abstract
The rapid development of artificial intelligence (AI) technology has brought great changes to the lives of mankind. The emergence of AI as part of the rapid evolution of digital technology has led to major changes in the world's lives. This research examines the impact of AI digitalization on Indonesia's workforce and the role of regulation in mitigating negative impacts. It emphasizes the need for holistic evaluation of labor law and modernization of professional job training programs. The research results show that the use of AI in Indonesia is increasing in various sectors, including the employment sector. Moreover, data privacy protection is still inadequate to ensure data protection and privacy of AI technology users. Therefore, it is necessary to update and add regulations that regulate comprehensively, covering data protection, algorithm transparency, occupational safety and health, elimination and specific retraining related to AI, and labor rights relevant to technological developments. It is also necessary to implement new regulations that provide legal protection for the application of AI can minimize the occurrence of cybercrimes on customer data. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
177. IUS CONSTITUENDUM OF CROSS-BORDER INSOLVENCY REGULATION IN ASEAN (ANALYSIS OF THE UNCITRAL MODEL LAW ON CROSSBORDER INSOLVENCY AND THE EUROPEAN UNION REGULATION ON INSOLVENCY PROCEEDINGS).
- Author
-
Andrian and Lie, Gunardi
- Subjects
- *
BANKRUPTCY , *COMPARATIVE method , *REGIONALISM (International organization) , *LEGAL instruments , *PERSONALLY identifiable information , *REFERENDUM - Abstract
Currently, ASEAN has an economic integration program that is stated in the ASEAN Economic Community Blueprint. As is well known, the European Union is the only regional organization that has succeeded in creating economic integration in its region supported by a unified law. One of the legal unification that needs to be initiated by ASEAN in supporting its economic integration is cross-border insolvency regulation. Some international legal instruments that can be a reference for the establishment of the ASEAN Cross-border Insolvency Regulation include the UNCITRAL Model Law on Cross-Border Insolvency and EU Regulation 848/2015 on Insolvency Proceedings. However, the comparison between ASEAN and the EU is not equivalent. ASEAN is a regional organization that is intergovernmental in nature, while the EU is a regional organization that is supranational in nature. Therefore, the comparative approach and statute approach are the right approaches in this article's writing. As for the research method used in this article writing is normative research. The objectives of this article are to describe the legal personality of ASEAN and the European Union in relation to the establishment of cross-border insolvency regulation and provide an overview of the substance of the UNCITRAL Model Law on Cross-Border Insolvency and EU Regulation 848/2015 to provide a reference for ASEAN to from cross-border insolvency regulation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
178. Pattern Masking for Dictionary Matching: Theory and Practice.
- Author
-
Charalampopoulos, Panagiotis, Chen, Huiping, Christen, Peter, Loukides, Grigorios, Pisanti, Nadia, Pissis, Solon P., and Radoszewski, Jakub
- Subjects
- *
MATCHING theory , *NP-complete problems , *ENCYCLOPEDIAS & dictionaries , *DATABASES , *PERSONALLY identifiable information - Abstract
Data masking is a common technique for sanitizing sensitive data maintained in database systems which is becoming increasingly important in various application areas, such as in record linkage of personal data. This work formalizes the Pattern Masking for Dictionary Matching (PMDM) problem: given a dictionary D of d strings, each of length ℓ , a query string q of length ℓ , and a positive integer z, we are asked to compute a smallest set K ⊆ { 1 , ... , ℓ } , so that if q[i] is replaced by a wildcard for all i ∈ K , then q matches at least z strings from D . Solving PMDM allows providing data utility guarantees as opposed to existing approaches. We first show, through a reduction from the well-known k-Clique problem, that a decision version of the PMDM problem is NP-complete, even for binary strings. We thus approach the problem from a more practical perspective. We show a combinatorial O ((d ℓ) | K | / 3 + d ℓ) -time and O (d ℓ) -space algorithm for PMDM for | K | = O (1) . In fact, we show that we cannot hope for a faster combinatorial algorithm, unless the combinatorial k-Clique hypothesis fails (Abboud et al. in SIAM J Comput 47:2527–2555, 2018; Lincoln et al., in: 29th ACM-SIAM Symposium on Discrete Algorithms (SODA), 2018). Our combinatorial algorithm, executed with small |K|, is the backbone of a greedy heuristic that we propose. Our experiments on real-world and synthetic datasets show that our heuristic finds nearly-optimal solutions in practice and is also very efficient. We also generalize this algorithm for the problem of masking multiple query strings simultaneously so that every string has at least z matches in D . PMDM can be viewed as a generalization of the decision version of the dictionary matching with mismatches problem: by querying a PMDM data structure with string q and z = 1 , one obtains the minimal number of mismatches of q with any string from D . The query time or space of all known data structures for the more restricted problem of dictionary matching with at most k mismatches incurs some exponential factor with respect to k. A simple exact algorithm for PMDM runs in time O (2 ℓ d) . We present a data structure for PMDM that answers queries over D in time O (2 ℓ / 2 (2 ℓ / 2 + τ) ℓ) and requires space O (2 ℓ d 2 / τ 2 + 2 ℓ / 2 d) , for any parameter τ ∈ [ 1 , d ] . We complement our results by showing a two-way polynomial-time reduction between PMDM and the Minimum Union problem [Chlamtáč et al., ACM-SIAM Symposium on Discrete Algorithms (SODA) 2017]. This gives a polynomial-time O (d 1 / 4 + ϵ) -approximation algorithm for PMDM, which is tight under a plausible complexity conjecture. This is an extended version of a paper that was presented at International Symposium on Algorithms and Computation (ISAAC) 2021. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
179. From Banknotes to Central Banks. The Formation and Models of Central Banks in a Comparative Legal Perspective.
- Author
-
Pfeffer, Zsolt
- Subjects
- *
BANKING laws , *LEGAL tender , *WAR finance , *DEVELOPMENT banks , *PUBLIC debts , *PERSONALLY identifiable information - Abstract
In the 17-18th century, during the process of civil transformations, starting from the economic policy based on the era of absolutism, the first central bank regulations appeared in Europe. Mainly the disorganization and crisis of public finances and the need to finance various wars led governments to establish central banks and to provide central banking functions to privately owned banks. The most important issues included the regulation of banknote issuance and legal tender, the management of state funds, the financing of the state debt, as well as the relationship with the state, in other words, the content of central bank independence. Each country followed different paths, and accordingly, the classic and the Prussian models of central bank development can be described based on the different legislative steps. The study presents the main characteristics through the English, German, French, American and Hungarian examples, primarily by characterizing the legislative peculiarities and illuminating the political historical background by applying the methods of comparative law. [ABSTRACT FROM AUTHOR]
- Published
- 2024
180. AUTOMATED DECISION-MAKING AND ACCESS TO DATA.
- Author
-
DACAR, Rok
- Subjects
- *
DECISION making , *LEGAL instruments , *ANTITRUST law , *INTERNET marketing , *EUROPEAN Union law , *PERSONALLY identifiable information - Abstract
This paper explores the mechanisms by which companies can gain access to data necessary for automated decision-making in scenarios without direct contractual agreements, focusing on market-driven approaches. It introduces the concept of the essential facilities doctrine under EU competition law and examines its applicability to sets of data, alongside an examination of current ex-ante regulatory instruments which grant data access rights, such as the Type Approval Regulation, the Open Data Directive, the Electricity Directive, the Digital Markets Act, and the Data Act. These legal instruments are analysed in terms of their ability to facilitate access to data necessary for the automation of decision-making processes. In addition, the study looks at the challenges and opportunities presented by these legal instruments, including the nuances of applying the essential facilities doctrine to data. The article concludes that the most efficient way for a company to gain access to sets of data required for automated decision-making (in the absence of a contractual agreement) is to base its data access claim on an act of ex-ante regulation. If, however, such legal basis does not exist, a company could still base its data access claim on the essential facilities doctrine. The practical applicability of the doctrine to sets of data, however, remains unclear. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
181. DRAPE: optimizing private data release under adjustable privacy-utility equilibrium.
- Author
-
Xiong, Qingyue, Lan, Qiujun, Ma, Jiaqi, Zhou, Huiling, Li, Gang, and Yang, Zheng
- Subjects
- *
DATA privacy , *PERSONALLY identifiable information , *KNOWLEDGE management , *DATA analysis , *DESCRIPTIVE statistics - Abstract
Data releasing and sharing between several fields has became inevitable tendency in the context of big data. Unfortunately, this situation has clearly caused enormous exposure of sensitive and private information. Along with massive privacy breaches, privacy-preservation issues were brought into sharp focus and privacy concerns may prevent people from providing their personal data. To meet the requirements of privacy protection, such a problem has been extensively studied. However, privacy protection of sensitive information should not prevent data users from conducting valid analyses of the released data. We propose a novel algorithm in this paper, named Data Release under Adjustable Privacy-utility Equilibrium (DRAPE), to address this problem. We handle the privacy versus utility tradeoff in the data release problem by breaking sensitive associations among variables while maintaining the correlations of nonsensitive variables. Furthermore, we quantify the impact of the proposed privacy-preserving method in terms of correlation preservation and privacy level, and thereby develop an optimization model to fulfil data privacy and data utility constraints. The proposed approach is not only able to provide a better privacy levels control scheme for data publishers, but also provides personalized service for data requesters with different utility requirements. We conduct experiments on one simulated dataset and two real datasets, and the simulation results show that DRAPE efficiently achieves a guaranteed privacy level while simultaneously effectively preserving data utility. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
182. Social benefits for European Union immigrants? A survey experiment on misperceptions.
- Author
-
Jäger, Julian
- Subjects
- *
INCOME distribution , *PANEL analysis , *EQUAL rights , *IMMIGRANTS , *PERSONALLY identifiable information , *SOCIAL & economic rights , *SUPINE position - Abstract
Using new experimental panel data for Germany, I investigate the role of income misperceptions for welfare restrictive preferences toward European Union immigrants. A majority of respondents misperceive their relative income position in Germany and the European Union and demand that European Union immigrants work and pay taxes before obtaining equal rights to social benefits. Randomized treatments inform subjects about their position in the national and European Union income distribution. My results provide evidence that welfare restrictive preferences are formed in the context of misperceived own income positions: Respondents become more welfare restrictive when they learn about a higher national or lower European Union income position. Information about European Union misperceptions has a persistent treatment effect after 3 months, driven by respondents with larger initial misperceptions, but becomes insignificant after one year. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
183. Euroscepticism as a syndrome of stagnation? Regional inequality and trust in the EU.
- Author
-
Vasilopoulou, Sofia and Talving, Liisa
- Subjects
- *
REGIONAL disparities , *EUROSCEPTICISM , *REGIONAL differences , *OVERTIME , *PERSONALLY identifiable information , *SYNDROMES - Abstract
This article advances the literature on the spatial patterns of EU support by arguing that the relationship between regional inequality and EU trust is not linear. We posit that, to fully understand this relationship, we should systematically investigate three dimensions of regional inequality, i.e., regional wealth status, regional wealth growth, and regional wealth growth at different levels of wealth status. Using individual-level survey data for EU27 countries and the UK from 11 Eurobarometer waves (2015–2019), we show that a non-linear association exists whereby poor and rich European regions tend to trust the EU more compared to middle-income regions, and that within-region over-time growth is associated with higher levels of EU trust. We demonstrate that the association between growth and EU trust is more pronounced among poor and middle-income regions compared to rich regions. Our findings have implications about the nature of public Euroscepticism and the ways in which to address it. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
184. Using deceased people's personal data.
- Author
-
Nakagawa, Hiroshi and Orita, Akiko
- Subjects
- *
PERSONALLY identifiable information , *DEAD , *JAPANESE people , *AFTERLIFE , *SOCIAL networks , *SOCIAL media - Abstract
It is important to manage individuals' personal data after their death to maintain their dignity or follow their wishes as much as possible. From this perspective, this report describes the real-world commercialization of immortal digital personalities, which gives eternal life to the deceased in a digital form. We identify the problems with the commercialization of deceased users' images and personal data, which becomes postmortem entertainment. Considering these problems, we seek out the ideal form of deceased users' personal data for commercialization. We conduct a social survey to understand how ordinary Japanese people feel about the various types of publicly available services that use personal data after death, such as social network service logs. By analyzing our survey results approximately 20% of respondents would allow the commercial use of their personal data, such as browsing their social network service logs, if they could receive compensation during their lifetime. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
185. LOS DERECHOS ANTE LOS SISTEMAS BIOMÉTRICOS QUE INCORPORAN INTELIGENCIA ARTIFICIAL.
- Author
-
GARRIGA DOMÍNGUEZ, ANA
- Subjects
- *
DATA protection , *PERSONALLY identifiable information , *DATA protection laws , *BIOMETRIC identification , *ARTIFICIAL intelligence , *HUMAN rights - Abstract
Starting from an approach based on the risks that the processing of biometric data and biometric AI systems imply for human rights, the protection of human rights is analysed in the legislation on the protection of personal data and in the Proposal for a Regulation on Artificial Intelligence of the European Union. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
186. NOTA DEL DIRECTOR.
- Author
-
ANSUÁTEGUI ROIG, FRANCISCO JAVIER
- Subjects
- *
DATA protection , *DIGNITY , *JUSTICE , *ARTIFICIAL intelligence , *TRUST , *HUMAN rights , *CIVIL rights of people with disabilities , *PERSONALLY identifiable information - Abstract
This article from the Journal of Rights and Freedoms presents a monographic section on Artificial Intelligence (AI) and its impact on Law and rights. The implications of AI on human rights are discussed, as well as its integration in the care of dependent and disabled individuals, the digitization of Justice, and the protection of personal data in European legislation. The ethics of AI and the guiding principles are also addressed. The importance of considering ethical issues related to the development and responsible use of AI is emphasized, as well as protecting the rights and dignity of individuals, ensuring equity in access and data treatment, minimizing biases and risks associated with algorithms, promoting transparency in automated decisions, and fostering trust in technology. Additionally, other topics addressed in the article are mentioned, such as access to law and basic legal services, filiation in Moroccan legislation, and the right to euthanasia. [Extracted from the article]
- Published
- 2024
- Full Text
- View/download PDF
187. Generation of Face Privacy-Protected Images Based on the Diffusion Model.
- Author
-
You, Xingyi, Zhao, Xiaohu, Wang, Yue, and Sun, Weiqing
- Subjects
- *
FACE perception , *LATENT variables , *ARTIFICIAL intelligence , *PERSONALLY identifiable information , *PRIVACY , *FACE - Abstract
In light of growing concerns about the misuse of personal data resulting from the widespread use of artificial intelligence technology, it is necessary to implement robust privacy-protection methods. However, existing methods for protecting facial privacy suffer from issues such as poor visual quality, distortion and limited reusability. To tackle this challenge, we propose a novel approach called Diffusion Models for Face Privacy Protection (DIFP). Our method utilizes a face generator that is conditionally controlled and reality-guided to produce high-resolution encrypted faces that are photorealistic while preserving the naturalness and recoverability of the original facial information. We employ a two-stage training strategy to generate protected faces with guidance on identity and style, followed by an iterative technique for improving latent variables to enhance realism. Additionally, we introduce diffusion model denoising for identity recovery, which facilitates the removal of encryption and restoration of the original face when required. Experimental results demonstrate the effectiveness of our method in qualitative privacy protection, achieving high success rates in evading face-recognition tools and enabling near-perfect restoration of occluded faces. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
188. PROTEÇÃO DE DADOS: EXPERIÊNCIA INTERNACIONAL E O CASO BRASILEIRO - RELAÇÃO COM A SEGURANÇA DA INFORMAÇÃO E A GOVERNANÇA CIBERNÉTICA.
- Author
-
Maia Arruda, Constança Maria and Linhares Lima, Pedro Arthur
- Subjects
DATA protection ,INFORMATION technology security ,DIGITAL technology ,PERSONALLY identifiable information ,DATA protection laws ,DATA privacy - Abstract
Copyright of Relações Internacionais is the property of Relacoes Internacionais and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
189. Die datenschutzrechtliche Rechtmäßigkeit des KI-Einsatzes am Arbeitsplatz.
- Subjects
GENERAL Data Protection Regulation, 2016 ,DATA protection ,ARTIFICIAL intelligence ,PERSONALLY identifiable information ,ELECTRONIC data processing - Abstract
Copyright of Kurswechsel is the property of Beirat fur gesellschafts-wirtschafts-und umweltpolitische Alternativen (BEIGEWUM) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
190. Protection of (Personal) Data in Armed Conflicts.
- Author
-
Kelemen, Bence Kis
- Subjects
PERSONALLY identifiable information ,WAR ,DATA protection ,GENERAL Data Protection Regulation, 2016 ,HUMANITARIAN law ,DATA protection laws - Abstract
Despite the increased attention that was given to data protection laws in national jurisdictions – especially after the adoption of the General Data Protection Regulation by the European Union – international law still does not offer a higher standard of protection to the personal data of civilians in times of armed conflict, where the deletion or manipulation of personal data of the civilian population can have significant harmful effects. This article explains that at the time of the adoption of the relevant international treaties and the development of customary international law, international humanitarian law (IHL) did not protect personal data stored electronically, and even though commentators in contemporary times tend to accept the object status of electronic data, State practice still remains inconclusive, largely excluding computerized personal data from the protective regime of IHL. The article argues further that a stricter protection of personal data regulation could potentially lead to harmful effects for protected persons, such as civilians, therefore it is undesirable. The protective nature of IHL must prevail over the data protection interests. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
191. Personalized Law and the Problem of Misinformation.
- Author
-
Ben-Shahar, Omri and Porat, Ariel
- Subjects
PERSONALLY identifiable information ,MINDFULNESS ,SEX discrimination ,POOR people ,LAW reform - Abstract
The article explores the concept of personalized law, which challenges the idea that everyone should be subject to the same rules. While personalized law could have benefits, such as in personalized medicine, there are concerns about misinformation, error, and the accuracy of data used in personalized law algorithms. The article also discusses the challenges of implementing personalized law, including biases, non-measurable inputs, and the complexity of communicating personalized commands. It suggests that personalized law algorithms may be better suited as advisors rather than decision-makers, allowing human judges to incorporate empathy and compassion. The article also discusses the issue of explainability in AI and its implications for personalized law, as well as the challenges of recognizing social patterns and detecting problematic policies. The authors acknowledge the critiques and consider the future of personalized law. [Extracted from the article]
- Published
- 2024
- Full Text
- View/download PDF
192. Unstable Personalized Law.
- Author
-
Gillis, Talia B
- Subjects
FINANCIAL literacy ,CONSUMER preferences ,MACHINE learning ,FREEDOM of speech ,PERSONALLY identifiable information ,ECONOMIC forecasting ,CREDIT card fees - Abstract
The article titled "Unstable Personalized Law" explores the concept of personalized law and its implications. The author discusses the benefits of personalized law, such as increased clarity and effectiveness, but also raises concerns about the instability of predictions and classifications in personalized law. The article provides a demonstration of prediction instability and discusses the implications of this instability for personalized law. It concludes by introducing a framework for considering the costs of instability in designing a legal system with more or less personalization. The text emphasizes the need to consider the tradeoff between accuracy and stability in predictive models for personalized law. [Extracted from the article]
- Published
- 2024
- Full Text
- View/download PDF
193. The Legal Situation of Operators of Essential Services and Digital Service Providers in the Provisions of the Act of 5 July 2018 on the National Cybersecurity System.
- Author
-
Etel, Maciej
- Subjects
INFORMATION networks ,INTERNET security ,SECURITY systems ,COMPUTER network security ,COMPETENT authority ,PERSONALLY identifiable information ,DATA security - Abstract
The Act of 5 July 2018 on the National Cybersecurity System and its accompanying executive regulations have introduced into Polish law the provisions of the Directive of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union (UE) 2016/1148. The fundamental reason for these regulations was to establish a coherent system to ensure the cyber security of the Republic of Poland with accordance to standards adopted for European Union Member States. This paper presents the legal situation of operators of essential services and digital service providers that was created by the provisions of the ANCS. The ANCS not only identifies operators of essential services, digital service providers, and their assigned obligations, but also addresses the competent authorities' tasks of supervising, inspecting and imposing penalties within the cyber security system. The findings, assessments and conclusions presented here are based on the interpretation of the provisions of the ANCS and are supported by prominent claims of academic representatives. The analyses contained within this paper aim to show that despite the comprehensible and contemporary ratio legis -- which falls within the framework of pursuing the state of digital safety -- the provisions of the ANCS require adjustments that acknowledge the legal situation of operators of essential services and digital service providers. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
194. Remote Work Regulations in the EU, Poland and Kosovo with Some Considerations from the Perspective of the GDPR.
- Author
-
Berisha, Qerkin and Klich, Aleksandra
- Subjects
TELECOMMUTING ,PERSONALLY identifiable information ,DATA protection ,GENERAL Data Protection Regulation, 2016 ,EQUALITY in the workplace - Abstract
The purpose of this article is to conduct a comparative analysis of remote work regulation in the EU, Poland and Kosovo, also with consideration of issues related to the processing of personal data during remote work. The authors aim to assess the specificities, strengths and weaknesses of both regulatory models, from the point of view of actual and future legal developments. Additionally, given the early stage of regulation, they seek to explore the applicability of EU experiences to Kosovo and to identify potential vulnerabilities that may arise under EU regulation. In this context, they aim to determine whether EU solutions should be considered as models for implementation in both Poland and Kosovo, as well as to analyse the risk of overregulation, which could impede certain employees from exercising their rights to remote work and potentially lead to inequalities in employment. The objective of the regulation should be to strike a balance between protecting personal data and ensuring equality in the workplace. Therefore, the authors try to answer the question of whether the protection of personal data could be subject to an abuse of rights by employers, who might use it as a pretext to deny certain groups of employees the opportunity to work remotely, which is particularly pertinent for individuals with special needs. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
195. Collective agreements on working conditions of solo self-employed persons: perspective of EU competition law.
- Author
-
Jurkowska-Gomułka, Agata, Piszcz, Anna, and Oliveira Pais, Sofia
- Subjects
COLLECTIVE labor agreements ,ANTITRUST law ,EUROPEAN Union law ,FREELANCERS ,INDUSTRIAL relations ,PERSONALLY identifiable information - Abstract
The 2022 Guidelines of the European Commission on the application of EU competition law to collective agreements regarding the working conditions of solo self-employed persons apparently introduced a fresh approach towards collective agreements in a gig economy era. The main aim of this paper is to discuss whether the 2022 Guidelines are an appropriate tool to address the problems of solo self-employed persons (i.e. persons who are not in a formal employment relationship and who rely primarily on their own personal labour to provide services) from the perspective of EU competition law. To this end, we first present key competition problems related to collective agreements (section 1). Second, we analyse the regulatory framework for exemptions from competition law, with a view for a potential exemption relevant for collective agreements, as well as an approach to collective agreements in EU case law (sections 2 and 3). Third, the background for adopting the Guidelines, and their goals, is analysed (sections 4 and 5). Fourth, the Guidelines are discussed in more detail in sections 6 and 7 from the perspective of exemptions from Art. 101(1) TFEU. Finally, we examine the relationship between the Guidelines and a proposal for a platform work directive. The article attempts to verify the hypothesis that the Guidelines may be considered a pseudo-development. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
196. Implementing Sustainable Urban Drainage Systems: Themes of Cultural Conflicts and Public Resistance—A Case Study.
- Author
-
Thodesen, Bridget O'Brien, Andenæs, Erlend, and Kvande, Tore
- Subjects
CULTURE conflict ,CLIMATE change adaptation ,URBANIZATION ,MUNICIPAL government ,WATER management ,PERSONALLY identifiable information - Abstract
A six-year study investigates the challenges of balancing stakeholders' interests when implementing climate adaptation regulations and makes a case for analytical tools that can improve the acceptance and adoption of local planning initiatives. In this study, the challenges of adopting European Union and Norwegian national climate adaptation regulations at a local level are examined through the analysis of the 'Fredlybekken Water Management Proposal' case study. This study includes an overview of the proposed climate adaptation project 'Fredlybekken', a site analysis, quantitative surveys, and qualitative interviews with the project's stakeholders. Reflexive thematic analysis is employed to establish themes of the project and categorically describe the feedback and objections of residents. The findings of the study set forth recommendations to improve the implementation processes of stormwater management infrastructure and other urban climatic adaptation initiatives. These findings are aimed at public policy makers and municipal administrations. The general conclusions within this paper are also relevant for egalitarian countries with similar societal challenges attempting to implement climate policy at the local level. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
197. E-Government Implementation on the Example of Georgia.
- Author
-
Tskhadadze, Ketevan
- Subjects
INTERNET in public administration ,DATA protection ,PUBLIC administration ,PERSONALLY identifiable information ,SOCIAL indicators ,ELECTRONIC services ,ELECTRONIC voting ,CONTRACTS - Abstract
The term 'digitalization' of public administration, used as a synonym for 'e-government,' fi rst implies the implementation of fast, secure procedures by an administrative body. E-governance, or as it is more recently termed, digital governance, involves the introduction of innovations and technologies in public governance/administration. It can be argued that the digitalization of public administration against the background of contemporary social challenges may be the key of opportunities for both the state and members of the society. Despite its certain conditionality, the electronic governance index (since 2003, the United Nations has issued a comparative index of countries' e-governance every two years, based on three main indicators) profi ciently reflects the dynamics of countries' efforts in introducing innovations in public administration and involving citizens in the process of e-services, which ultimately contributes to bringing citizens closer to modern digital administration. The article refers to the legal aspects of using digital means in e-government on the example of Georgia. The reform of public administration in Georgia started in 2015, after the Association Agreement was signed between Georgia and the European Union. Georgia has already fulfi lled several commitments in the framework of this program in terms of striving for more transparent governance, but despite this, the mentioned reform faces challenges on this path. The article examines aspects of e-government such as e-services, e-participation, personal data protection, and the impact of e-government implementation on the efficiency of public administration. Since the mentioned issue is complex in nature and extends in several directions, the article discusses the regulation of electronic administrative proceedings and the effectiveness of its use in the process of implementing public administration, stages of modernization of state governance, types of electronic proceedings, possibilities of legitimate governance from the administrative body, and prospects for its implementation on the example of Georgia. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
198. The Europeanization of Georgian Consumer Law: A Pathway to Harmonization.
- Author
-
Lakerbaia, Tamar
- Subjects
CONSUMER law ,EUROPEANIZATION ,CONSUMER protection ,COLLECTIVE labor agreements ,PERSONALLY identifiable information ,DATA harmonization ,LEGAL precedent - Abstract
On March 29, 2022, the Parliament of Georgia passed the Law on Protection of Consumer Rights, with its primary provisions taking effect on June 1, 2022. By enacting the Law, Georgia has largely fulfilled its commitment under the Association Agreement with the European Union (EU) to implement EU directives governing consumer protection into its national legislation. However, it is essential to recognize that this reform marks just the initial phase of approximation. Challenges persist, especially in relation to European directives concerning the regulation of the digital marketplace. This article aims to provide a concise overview of the reform facilitated by the adoption of the new Law. Moreover, given that only one year has passed since the implementation of the Law, there remains a lack of practical experience or judicial precedent to assess its positive or negative impacts. Academic studies in this direction are also lacking. Consequently, the discussion in this article primarily centers on the novelty and challenges presented by the Law in the light of EU directives. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
199. LEGAL PROTECTION FOR PERSONAL DATA IN THE WORLD OF WORK IN THE ERA OF DIGITALIZATION OF TECHNOLOGY AND INFORMATION.
- Author
-
Priyanjani, Ambar Rani, Fadillah, Farah, Ghalib, Alfazrryan, Sutrisno, Endang, and Permana, Deni Yusup
- Subjects
DATA protection ,PERSONALLY identifiable information ,DIGITAL technology ,LEGAL norms ,LEGAL research - Abstract
Legal certainty is one of the objectives of law according to Gustav Radburch, with the development of the times, and the rise of digitalization, it is necessary to have a legal umbrella as a form of preventive effort so that there are no legal problems such as misuse of personal data in the labor scope. This legal research method uses normative juridical legal methods using qualitative data based on consideration of the purpose of this research itself to determine the importance of legal certainty and protection of personal data in the context of labor in the era of technology, and information that has developed rapidly. The clarity of legal norms guides community behavior, including the protection of personal data. The impact of technological advances is especially evident in changes in community behavior and information seeking through the internet. This change creates new challenges, especially related to the misuse of personal data in the world of work. Legal protection for personal data in the world of work in the era of digitalization of technology and information is very important. It has positive implications for companies, employees, and society as a whole. By implementing good personal data protection, all parties can benefit from the opportunities offered by digital technology while maintaining the privacy and security of personal data. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
200. Notwendige Synchronisierung von Data Act und DSGVO – Auf die Einwilligung kommt es an.
- Author
-
Sattler, Andreas
- Subjects
GENERAL Data Protection Regulation, 2016 ,PERSONALLY identifiable information ,CYBER physical systems ,MATHEMATICAL optimization ,ELECTRONIC data processing - Abstract
Copyright of Computer und Recht is the property of De Gruyter and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.