Sensitive Data in UK Law

  • Can you keep a secret? As a result of key decisions by the UK's information commissioners, firms competing for public contracts could routinely use the law to extract sensitive data on rival bidders. As "the public interest" increasingly outweighs the case for confidentiality, Neil Hodge considers how to shield your affairs from prying eyes.
    • No. 2007, December - September 2007
    • Financial Management (UK)
    • Hodge, Neil
    ...When the Freedom of Information Act 2000 came into force on January 1, 2005, public bodies such as NHS trusts and district councils braced themselves for a deluge of public requests for information. Yet private companies--totally exempt from the legi......
  • Ethnic Profiling: A Rising Challenge for European Human Rights Law
    • No. 71-3, May 2008
    • The Modern Law Review
    Ethnic profiling, defined as the use of racial, ethnic or religious background as a determining criterion for the adoption of law enforcement decisions, has been rising significantly in Europe, in ...
    ... ... Against the widely held assumption that personal data" protection legislation is insu⁄cie ntly protecti ve of ‘sensitive\xE2\x80" ... ...
  • Semantic Disclosure Control: semantics meets data privacy
    • No. 42-3, June 2018
    • Online Information Review
    • 290-303
    Purpose: To overcome the limitations of purely statistical approaches to data protection, the purpose of this paper is to propose Semantic Disclosure Control (SeDC): an inherently semantic privacy ...
    ... ... Then, SeDC ispresented by detailing how it can be enforced to detect and protect sensitive data.Findings –So far, data privacy has been tackled from a statistical perspective; that is, available solutionsfocus just on the distribution of ... ...
  • Ethics in the virtual world
    • No. 5-1, August 2007
    • Journal of Information, Communication and Ethics in Society
    • 4-6
    Purpose: The purpose of this viewpoint paper is to provide an overview of three papers included in a Special Issue of the Journal of Information Communication Ethics and Society, entitled Ethics in...
    ... ... : the explosion in the number of opportunities for accessingsensitive data in the health sector; the risks inherent in designing information systems ... in the number of opportunities foraccessing confidential and sensitive data that are afforded by the digital mediation ofdata, particularly in ... ...
  • Formjacking attack: Are we safe?
    • No. 28-2, May 2021
    • Journal of Financial Crime
    • 607-612
    Purpose: Today, online shopping and online business has become a new norm especially in the current pandemic scenario. With more businesses running online, cyber criminals are coming up with differ...
    ... ... are coming up with differenttacticsto steal identity and sensitive information such as credit card and banking credentials either for ... lies on the companies itself to ensure they protecttheir customer’s data from theft. Notmuch research is found regarding formjacking attack, as it ... ...
  • Artificial intelligence in the defense sector: an RBV and isomorphism perspectives to the case of the Lebanese Armed Forces
    • No. 16-2, March 2022
    • Journal of Asia Business Studies
    • 279-293
    Purpose: This paper aims to dynamically analyze the opportunities and challenges of AI in the defense sector in Lebanon or any security agency or any organization with sensitive data through a reso...
    ... ... in Lebanon or any security agency or any organization with sensitive data through a resource-based view perspective,the adoption of artificial ... ...
  • Artificial intelligence in the defense sector: an RBV and isomorphism perspectives to the case of the Lebanese Armed Forces
    • No. 16-2, March 2022
    • Journal of Asia Business Studies
    • 279-293
    Purpose: This paper aims to dynamically analyze the opportunities and challenges of AI in the defense sector in Lebanon or any security agency or any organization with sensitive data through a reso...
    ... ... in Lebanon or any security agency or any organization with sensitive data through a resource-based view perspective,the adoption of artificial ... ...
  • Future legislation affecting financial services
    • No. 8-1, January 2000
    • Journal of Financial Regulation and Compliance
    • 84-93
    The financial services industries is facing a number of important legal developments. The most publicised of these is the coming into force on 1st March, 2000 of the new Data Protection Act 1998. T...
    ... ... She is also a data protection specialist. One of her most recent tasks has been completing ... data flows and restrict the processing of a special category of sensitive personal data. Information is the lifeblood of any business. There is no ... ...
  • Exploring electronic lab notebooks (ELNs) at a R1 institution in the Southeast USA
    • No. 39-1, January 2023
    • Digital Library Perspectives
    • 0000
    Purpose: This study aims to build a better understanding of researcher needs regarding support for data that you create, store, and/or manage using an electronic lab notebook (ELN), also referred t...
    ... ... for risk assessment for ELN productsused byresearchersfor both open data and sensitive data thatrequire standards.Design/methodology/approach ... ...
  • Behaviour and Thoughts: For a Pluralistic Model of Empirically Informed Political Philosophy
    • 0000
    Is Political Philosophy Impossible? develops a distinctive and powerful vision of empirically informed political philosophy: one that gives a central role to data about what people do, rather than ...
    ... ... informed political philosophy: one that gives a central role to data about what people do, rather than what they think or say. Here, I offer ... by defending a more modest and pluralistic picture of data-sensitive political philosophy.Keywordsnormative behaviourism, methods, political ... ...
  • See all results

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT