Data Security in UK Law
Protecting Consumer Privacy and Data Security: Regulatory Challenges and Potential Future Directions
This article considers the regulatory problems of online tracking behaviour, lack of consent to data collection, and the security of data collected with or without consent. Since the mid-1990s the ...
Social-media-based risk communication for data co-security on the cloud
Purpose: Cloud computing has disrupted the information technology (IT) industry. Associated benefits such as flexibility, payment on an on-demand basis and the lack of no need for IT staff are amon...
- Accessing Telecommunications Data for National Security and Law Enforcement Purposes
Data flows and national security: a conceptual framework to assess restrictions on data flows under GATS security exception
Purpose: The paper aims to explore the national security implications of a potential for a World Trade Organization (WTO) dispute on data flow restrictions. It proposes a basic conceptual framework...
Empirical assessment of mobile device users’ information security behavior towards data breach. Leveraging protection motivation theory
Purpose: The purpose of this paper is to investigate the information security behavior of mobile device users in the context of data breach. Much of the previous research done in user information s...
Fraud and corruption risk in business Mastercourse: Dr Stephen Hill is the managing director of snowdrop consulting, a company specialising in fraud risk management, prevention/awareness and data security. He is a trustee director of the ICAEW fraud advisory panel and chairs the cybercrime working group. Here, he explains what the course is about.
...This one-day course will offer attendees a full understanding of the threats posed by various types of fraud, how to recognise where the threats may be and how to respond to them. It is aimed at financial staff, from book-keepers to finance directors......
Spies as Informants: Triangulation and the Interpretation of Elite Interview Data in the Study of the Intelligence and Security Services
This article examines the application of ‘triangulation’ to the use of elite interviewing in political science, with specific reference to the study of the intelligence and security services. It is...
Data Mining and Profiling in the Area of Freedom, Security and Justice: State of Play and New Challenges in the Balance between Security and Fundamental Rights Protection
This article analyses the impact of the use of data processing mechanisms (i.e. data mining and profiling) as investigative tools on the fundamental rights of individuals. It highlights the pressin...
SST: secure, error‐free file transfer package
The SST (Super Simple Transfer) package simplifies PC file transfers by automating modern setup and using menus to conduct transfers. Error‐free transmission and data security are provided. SST run.........Error-free transmission and data security are provided. SST runs on IBM/PCs, ATs PSI2s and compatible ......
Investigations: understanding data privacy
Examines an often overlooked aspect of regulatory compliance in the transactional context, ie UK privacy laws. Looks at how they operate and reviews data privacy laws in the European Union: organis......... or processed; special care willneed to be taken where data rooms Ð both realand virtual Ð are in use (see `Issues in ComplianceÐ Security for data', below).Fifthly, the parties should consider whether anydisclosure or processing of personal data involvesthe transfer of personal data ......
See all results