This article reviews Canadian UAV policy, regulation, and usage trends. Through a quantitative content analysis conducted on all UAV Special Flight Operation Certificates (SFOC) issued by Transport Canada between 2007 and 2012, this article charts the expansion of UAV use and the nature of this usage through key statistics. We argue that in combination, the rise of UAV use and the opaque nature of UAV oversight constitute the formation of a social moment in Canada in which new challenges regarding safety and privacy need to be carefully considered in the process of producing informed and, thereby, thoughtful legislation and regulation.
Dear Reader, We are pleased to introduce the first issue of the third volume of the University of Brasilia Journal of Law and Regulation (JLR). During this year, the journal will publish a number of original articles on topics relevant to regulatory theory and practice. In this issue, we are delighted to include articles on deregulation, market and government failures, systems theory, responsive regulation, separation of powers, regulatory principles, public interest regulation, privacy, enforcement and metalinguistics of regulation. From those perspectives, several issues and phenomena have been tackled, such as the Uber app, drones employment, health insurance design, metadata retention, corruption in public owned companies and civil aviation regulation of electronic devices. For future issues, we will continue to publish articles on all regulated sectors from law and interdisciplinary perspectives, not least related to advances at the intersection of law and regulatory practice. We hope you have enjoyed reading the first two volumes of this journal, and we look forward to a sixth issue to be released on October 2017. Sincerely, Prof. Marcio Iorio Aranha Editor-in-Chief, Journal of Law and Regulation, University of Brasilia Law School On behalf of the Editorial Board ; Dear Reader, We are pleased to introduce the first issue of the third volume of the University of Brasilia Journal of Law and Regulation (JLR). During this year, the journal will publish a number of original articles on topics relevant to regulatory theory and practice. In this issue, we are delighted to include articles on deregulation, market and government failures, systems theory, responsive regulation, separation of powers, regulatory principles, public interest regulation, privacy, enforcement and metalinguistics of regulation. From those perspectives, several issues and phenomena have been tackled, such as the Uber app, drones employment, health insurance design, metadata retention, corruption in public owned companies and civil aviation regulation of electronic devices. For future issues, we will continue to publish articles on all regulated sectors from law and interdisciplinary perspectives, not least related to advances at the intersection of law and regulatory practice. We hope you have enjoyed reading the first two volumes of this journal, and we look forward to a sixth issue to be released on October 2017. Sincerely, Prof. Marcio Iorio Aranha Editor-in-Chief, Journal of Law and Regulation, University of Brasilia Law School On behalf of the Editorial Board ; Prezado(a) Leitor(a), Neste número da Revista de Direito Setorial e Regulatório (RDSR) da Universidade de Brasília, trazemos a público vários artigos originais. Ao longo deste ano, serão publicados artigos originais sobre diversos temas relevantes para a teoria e a prática regulatória. A cada novo número, procurar-se-á introduzir novos temas com o objetivo de agregar olhares inovadores ao fenômeno regulatório. Neste número, foram inseridos artigos sobre desregulação, falhas de mercado e de governo, teoria dos sistemas, regulação responsiva, separação de poderes, princípios regulatórios, regulação dirigida por interesse público, privacidade, aplicação da regulação e metalinguagem regulatória. A partir de tais pontos de partida, diversas questões e fenômenos da atualidade foram abordados, tais como a aplicação Uber, o emprego de drones, o desenho regulatório da saúde suplementar, a conservação de metadados, a corrupção em empresas públicas e a regulação do uso de dispositivos eletrônicos na aviação civil. Para os números que se seguirão, estaremos empenhados em dar continuidade à publicação de artigos sobre quaisquer setores regulados em perspectiva estritamente jurídica, como também interdisciplinar, em especial aqueles pertinentes a novas abordagens da relação entre direito e prática regulatória. Esperamos que tenha apreciado a leitura dos dois primeiros volumes, no aguardo do sexto número da RDSR a ser publicado em outubro de 2017. Atenciosamente, Prof. Marcio Iorio Aranha Editor, Revista de Direito Setorial e Regulatório, Faculdade de Direito da UnB Em nome do Conselho Editorial
Under the current data paradigm, third parties often capture, analyze, and make use of an individual's data without that individual's knowledge or consent. The uses of this data are often opaque, and even when an individual signs a "Terms of Service Agreement" it is questionable whether they truly provide informed consent. With the EU's General Data Protection Regulation (GDPR), we're seeing momentum to provide individuals with greater data privacy protection. As part of the Assembly on artificial intelligence and governance -- a joint project between the Berkman Klein Center at Harvard University and the MIT Media Lab -- we are creating technical and policy mechanisms that empower individuals to thwart third parties from successfully analyzing their data and to communicate that they do not want their data to be used in ways that they did not consent to. We are building a tool that directly embeds "Do Not Track"-like signature in images while simultaneously duping image classification systems.
Актуальность и цели. Законодательство о персональных данных в последние годы активно развивается и изменяется. При этом оно регулирует различные сферы общества, в том числе и образовательную сферу, устанавливая различные режимы информации и персональных данных. Одним из режимов персональных данных является режим врачебной тайны. Однако у обучающихся не всегда имеется правильное представление о защите персональных данных и о соблюдении врачебной тайны. Именно поэтому необходимы превентивные меры, которые позволили бы предотвратить нарушение права на неприкосновенность частной жизни. Цель работы выявить представление о режиме конфиденциальности персональных данных, подпадающих под режим врачебной тайны, среди студентов медицинских вузов, а также предложить ряд мер по предупреждению нарушения режима врачебной тайны в студенческой среде. Материалы и методы. Реализация целей и задач исследования была достигнута с помощью анализа действующего законодательства о персональных данных и о врачебной тайне. В качестве методов исследования были использованы: метод анализа нормативно-правового регулирования, статистический метод анкетирования, формально-юридический метод, логический метод. Результаты. Изучена нормативно-правовая база регулирования оборота персональных данных, подпадающих под правовой режим врачебной тайны, а также вопросы ответственности за незаконное разглашение сведений, составляющих врачебную тайну. Выявлены проблемы, связанные с реализацией некоторых законодательных положений, относящихся к врачебной тайне. Проведен опрос студентов медицинского вуза на предмет осведомленности о правовом режиме информации, составляющей врачебную тайну, и выявлено, что не все из опрошенных имеют правильное представление о нормативном регулировании данного вопроса. Выводы. Сделан вывод о том, что студенты медицинских вузов также являются носителями персональных данных, подпадающих под правовой режим врачебной тайны. К сожалению, не все из опрошенных студентов осведомлены об ограничениях и запретах, установленных в отношении врачебной тайны. В связи с этим для предупреждения неправомерных посягательств в отношении врачебной тайны предложен ряд профилактических мер для студентов медицинских вузов. ; Background. Legislation on personal data has been actively developing and changing. It regulates various spheres of society, including the educational sphere, setting different modes of information and personal data. One of the modes of personal data is the regime of medical confidentiality. However, students sometimes do not have the right idea about personal data protection and medical confidentiality keeping. It is therefore necessary to undertake preventive measures that would prevent violation of the right to privacy. The purpose of the article is to identify understanding of the mode of cofinedtiality of personal data falling under the regime of patient confidentiality among medical students, and to offer a number of measures to prevent violations of patient confidentiality among students. Materials and methods. The goals and objectives of the study were achieved by analysis of the current legislation on personal data and patient confidentiality. The following research methods were used: the method of legal regulation analysis, the statistical method of questioning, the legalistic method, the logical method. Results. The authors have studied the legal framework regulation of personal data falling under the legal regime of patient confidentiality, as well as the liability for illegal disclosure of information constituting a medical secret, as well as revealed problems with implementation of certain legal provisions relating to patient confidentiality. The researchers have conducted a survey of students of a medical school on the subject of awareness of the legal regime of information constituting a medical secret and revealed that not all of the respondents have the correct understanding of the normative regulation of this issue. Conclusions. It is concluded that medical students are also carriers of personal data falling under the legal regime of medical confidentiality. Unfortunately, not all of the students surveyed are aware of the restrictions and prohibitions in respect of medical confidentiality. In this regard, in order to prevent illegal infringements of medical confidentiality, the authors propose a number of preventive measures for medical students.
Abstract The prevalence of mobile devices and their capability to access high speed internet has transformed them into a portable pocket cloud interface. Being home to a wide range of users' personal data, mobile devices often use cloud servers for storage and processing. The sensitivity of a user's personal data demands adequate level of protection at the back-end servers. In this regard, the European Union Data Protection regulations (e.g., article 25.1) impose restriction on the locations of European users' personal data transfer. The matter of concern, however, is the enforcement of such regulations. The first step in this regard is to analyze mobile apps and identify the location of servers to which personal data is transferred. To this end, we design and implement an app analysis tool, PDTLoc (Personal Data Transfer Location Analyzer), to detect violation of the mentioned regulations. We analyze 1, 498 most popular apps in the EEA using PDTLoc to investigate the data recipient server locations. We found that 16.5% (242) of these apps transfer users' personal data to servers located at places outside Europe without being under the control of a data protection framework. Moreover, we inspect the privacy policies of the apps revealing that 51% of these apps do not provide any privacy policy while almost all of them contact the servers hosted outside Europe.
This document, the first Deliverable D1.1 in the CUTLER project, identifies the relevant EU legal frameworks applicable to the various environmental, economic and societal data that will be used by city pilots to extract actionable knowledge supporting efficient data-driven decision-making processes. More specifically, it provides a legal taxonomy supporting the adequate qualification of the relevant datasets on a granular level which, in turn, enables appropriate and effective application of legal rights and obligations. It also provides an overview of the relevant regulatory frameworks aiming at facilitating the identification of the applicable legislation by technical partners. Given the project's focus on a broad range of datasets, the legal analysis includes an assessment of inter alia privacy and data protection (General Data Protection Regulation 2016/679/EU and the ePrivacy Directive 2002/58/EC, as well as the Turkish Data Protection Law no. 6698), public sector information re-use (PSI Re-use Directive 2013/37/EU), the relevant EU laws relating to Geo-Spatial Data (Access Directive 2003/4/EC and INSPIRE Directive 2007/2/EC) and Intellectual Property law issues (InfoSoc 2001/29 Directive, Database Directive 96/9/EC and Trade Secrets Directive 2016/943/EU). Deliverable D1.1 also examines the interplay between the notions of data protection and privacy as well as intellectual property law domains in terms of the restrictions on access to data. More specifically, this deliverable examines the legal frameworks applicable to the following categories of data: Personal data (Regulation 2016/679 and Turkish Data Protection Law no. 6698); Non-personal data (Proposal for a Regulation on the free flow of non-personal data); Electronic communications data (Proposal for an ePrivacy Regulation); Copyrighted data (Directive 2001/29); Data protected by the sui generis right on databases (Directive 96/9); Data protected by trade secrets (Directive 2016/943); Publicly held documents (Directive 2003/98); Environmental ...
This paper offers a detailed analysis of the epidemiological and legal paradigm for HIV risk in China, paying a particular attention to China's public security involvement in addressing HIV/AIDS epidemic. In the past two decades, instead of developing a supportive environment of HIV/AIDS prevention and care, China has developed a punitive approach in its responses to the HIV/AIDS epidemic, including cracking down on prostitution, drug use and drug trafficking, illegal blood collection, and intentional HIV transmission. The paper reviews how the Chinese government painted HIV/AIDS as a foreigner's disease and moral problem in 1987-2006, and China's discrimination and isolation policy against people with HIV/AIDS. In 2006, the Chinese government began to implement China's Regulations on HIV/AIDS Prevention and Treatment which commits to guarantee equal rights of people with HIV/AIDS in medical care, marriage, employment and education, but in reality people with HIV/AIDS are facing severe discrimination on medical care, marriage, employment and education. Finally, the paper introduces China's public security surveillance against people with HIV/AIDS or people at risk of HIV infection nationally, which causes stigmatization, privacy disclosure, and rights violations against people with HIV/AIDS. ; Non UBC ; Unreviewed ; Faculty
CONTENTS; PREFACE TO 2ND EDITION; PREFACE TO THE FIRST EDITION; ONE: Code is Law; TWO: Four Puzzles from Cyberspace; [ PART ONE ] ""Regulability""; THREE: Is-ism: Is the Way it is the Way it Must Be?; FOUR: Architectures of Control; FIVE: Regulating Code; [ PART TWO ] Regulation by Code; SIX: Cyberspaces; SEVEN: What Things Regulate; EIGHT: The Limits in Open Code; [ PART THREE ] Latent Ambiguities; NINE: Translation; TEN: Intellectual Property; ELEVEN: Privacy; TWELVE: Free Speech; THIRTEEN: Interlude; [ PART FOUR ] Competing Sovereigns; FOURTEEN: Sovereignty
Internet governance evolved in an ad hoc manner and produced a decentralized, regulatory environment that has been shaped by a myriad of public and private organizations. The decentralized nature of this form of Internet governance is now being challenged. New technical, security, and privacy issues have raised political questions concerning whether such loose regulatory coordination can adapt quickly enough to twenty‐first‐century challenges. Such doubts go well beyond the technical; they reflect profound questions about who should control the Internet. This article examines the issue of Internet governance in light of recent challenges. Discussion is centered on assessing efforts to replace the current decentralized, multistakeholder governance model with a centralized, multilateral model. Trends are examined with reference to efforts by some member states of the International Telecommunication Union to strengthen the role of governments in Internet regulation, especially during negotiations at the 2012 World Conference on International Telecommunications.Related ArticlesWalsh, James I. 2008. "." Politics & Policy 33 (): 642‐670. http://onlinelibrary.wiley.com/doi/10.1111/j.1747‐1346.2005.tb00217.x/abstract Turner, Scott. 1997. "." Southeastern Political Review 25 (): 303‐324. http://onlinelibrary.wiley.com/doi/10.1111/j.1747‐1346.1997.tb00841.x/abstract Fisher, Bonnie, Michael Margolis, and David Resnick. 1996. "." Southeastern Political Review 24 (): 399‐429. http://onlinelibrary.wiley.com/doi/10.1111/j.1747‐1346.1996.tb00088.x/abstractRelated MediaFilm Clips: . 2010. http://www.youtube.com/watch?v=veqNnfknxbI . 2008. . http://www.youtube.com/watch?v=EawWtV32ZLA . 2014. . http://www.youtube.com/watch?v=NdzM0KCIJpY
Part 3: Selected Papers (Part I) - Legal Aspects and User Rights ; International audience ; This paper examines the role of the supervisory authorities for the enforcement of the EU data protection regulation. It therefore examines the case law of the Court of Justice of the European Union and the upcoming legislative changes under the General Data Protection Regulation, which includes detailed provisions for the cooperation of all European supervisory authorities.
Intro -- Preface -- Organization -- Contents -- Privacy and Data Protection -- Big Data Analytics: From Threatening Privacy to Challenging Democracy -- Abstract -- 1 Introduction -- 2 Background: The Professionalization of Political Communication in European Democracies -- 3 The Political Value of Big Data and the Democratic Value of Privacy -- 4 Privacy Harms Stemming from the Use of Big Data -- 5 Long - Term Implications for Democracy and Society -- 6 Discussion and Conclusions -- References -- What Do We Know About Our Rights to Data Protection? A Greek Case Study -- Abstract -- 1 Introduction -- 2 Data Subjects' Rights in GDPR -- 3 Research Framework -- 4 Methodology -- 5 Results and Discussion -- 5.1 Section A: General Data Protection Regulation -- 5.2 Section B: The Rights of Data Subjects -- 5.3 Section C-Subsection 1: Personal Data Control and Risks -- 5.4 Section C-Subsection 2: Data Protection -- 5.5 Discussion on Main Findings -- 6 Conclusions -- References -- A Case Study of Intra-library Privacy Issues on Android GPS Navigation Apps -- 1 Introduction -- 2 Preliminaries -- 3 Permissions of Applications -- 4 Dynamic Analysis of GPS Applications -- 4.1 The Testing Environment -- 4.2 Permission Analysis of GPS Applications -- 4.3 Data Traffic to Third-Party Domains -- 4.4 Transparency of the Processing -- 5 Conclusions -- References -- A Constraint-Based Model for the Frequent Itemset Hiding Problem -- 1 Introduction -- 2 Related Work -- 3 Background and Problem Formulation -- 4 A Constraint-Based Hiding Model -- 4.1 A Boolean Formula for Representing Sensitive Itemsets -- 4.2 A Constraint-Based Theory for Mining of Borders -- 4.3 A Constraint-Based Mining Algorithm -- 5 Experimental Evaluation of the Constraint-Based Mining Algorithm -- 6 Conclusions -- References -- E-Government.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Abstract Twenty years ago, law enforcement organizations lobbied to require data and communication services to engineer their products to guarantee law enforcement access to all data. After lengthy debate and vigorous predictions of enforcement channels "going dark," these attempts to regulate the emerging Internet were abandoned. In the intervening years, innovation on the Internet flourished, and law enforcement agencies found new and more effective means of accessing vastly larger quantities of data. Today we are again hearing calls for regulation to mandate the provision of exceptional access mechanisms. In this report, a group of computer scientists and security experts, many of whom participated in a 1997 study of these same topics, has convened to explore the likely effects of imposing extraordinary access mandates. We have found that the damage that could be caused by law enforcement exceptional access requirements would be even greater today than it would have been 20 years ago. In the wake of the growing economic and social cost of the fundamental insecurity of today's Internet environment, any proposals that alter the security dynamics online should be approached with caution. Exceptional access would force Internet system developers to reverse "forward secrecy" design practices that seek to minimize the impact on user privacy when systems are breached. The complexity of today's Internet environment, with millions of apps and globally connected services, means that new law enforcement requirements are likely to introduce unanticipated, hard to detect security flaws. Beyond these and other technical vulnerabilities, the prospect of globally deployed exceptional access systems raises difficult problems about how such an environment would be governed and how to ensure that such systems would respect human rights and the rule of law.