Sensitive Data in UK Law

  • Can you keep a secret? As a result of key decisions by the UK's information commissioners, firms competing for public contracts could routinely use the law to extract sensitive data on rival bidders. As "the public interest" increasingly outweighs the case for confidentiality, Neil Hodge considers how to shield your affairs from prying eyes.
    • Núm. 2007, Septiembre - Diciembre 2007
    • Financial Management (UK)
    • Hodge, Neil
    ...[ILLUSTRATION OMITTED] When the Freedom of Information Act 2000 came into force on January 1, 2005, public bodies such as NHS trusts and district councils braced themselves for a deluge of public requests for information. Yet private companies--tot......
  • Ethics in the virtual world
    • Núm. 5-1, Agosto 2007
    • Journal of Information, Communication and Ethics in Society
    • 4-6
    Purpose: The purpose of this viewpoint paper is to provide an overview of three papers included in a Special Issue of the Journal of Information Communication Ethics and Society, entitled Ethics in...
    ......: the explosion in the number of opportunities for accessingsensitive data in the health sector; the risks inherent in designing information systems ... in the number of opportunities foraccessing confidential and sensitive data that are afforded by the digital mediation ofdata, particularly in ......
  • Semantic Disclosure Control: semantics meets data privacy
    • Núm. 42-3, Junio 2018
    • Online Information Review
    • 290-303
    Purpose: To overcome the limitations of purely statistical approaches to data protection, the purpose of this paper is to propose Semantic Disclosure Control (SeDC): an inherently semantic privacy ...
    ......Then, SeDC ispresented by detailing how it can be enforced to detect and protect sensitive data.Findings –So far, data privacy has been tackled from a statistical perspective; that is, available solutionsfocus just on the distribution of ......
  • Ethnic Profiling: A Rising Challenge for European Human Rights Law
    • Núm. 71-3, Mayo 2008
    • The Modern Law Review
    Ethnic profiling, defined as the use of racial, ethnic or religious background as a determining criterion for the adoption of law enforcement decisions, has been rising significantly in Europe, in ...
    ......Against the widely held assumption that personal data" protection legislation is insu⁄cie ntly protecti ve of ‘sensitive\xE2\x80"......
  • Future legislation affecting financial services
    • Núm. 8-1, Enero 2000
    • Journal of Financial Regulation and Compliance
    • 84-93
    The financial services industries is facing a number of important legal developments. The most publicised of these is the coming into force on 1st March, 2000 of the new Data Protection Act 1998. T...
    ......She is also a data protection specialist. One of her most recent tasks has been completing ... data flows and restrict the processing of a special category of sensitive personal data. Information is the lifeblood of any business. There is no ......
  • Media discourses surrounding ‘non-ideal’ victims: The case of the Ashley Madison data breach
    • Núm. 25-1, Enero 2019
    • International Review of Victimology
    Data breaches are an increasingly common event across businesses globally. Many companies have been subject to large-scale breaches. Consequently, the exposure of 37 million customers of the Ashley...
    ...... their actions in subscribing, rather than focusing on the data breach itself, and the blatant criminality of the offenders who exposed the sensitive information. Corresponding author: Cassandra Cross, School of Justice, Faculty of Law, Queensland University of Technology, GPO Box 2434, Brisbane, ......
  • “Warning! You’re entering a sick zone”. The construction of risk and privacy implications of disease tracking apps
    • Núm. 43-6, Octubre 2019
    • Online Information Review
    • 1046-1062
    Purpose: Traditional public health methods for tracking contagious diseases are increasingly complemented with digital tools, which use data mining, analytics and crowdsourcing to predict disease o...
    ...... diseases are increasinglycomplemented with digital tools, which use data mining, analytics and crowdsourcing to predict diseaseoutbreaks. In recent ..., compelling users to submit personalinformation –including sensitive health data –with little oversight or regulation.Originality/value ......
  • Ethnic Conflicts in The Former USSR: The Use and Misuse of Typologies and Data
    • Núm. 36-5, Septiembre 1999
    • Journal of Peace Research
    This article summarizes research on ethnic conflict in the Former Soviet Union (FSU). Various appealing but unsatisfactory typologies have been proposed, focusing on the subjects of the conflict (a...
    ......In conclusion , a plea is made for writing ‘between’ theory and data, without sacrificing sensitive and self-reflective nar- ration in order to produce new insights and new knowledge. The Politics of Meta-Projects It is difficult to accept as ......
  • Relationship between gender-sensitive practices and family support and its impact on psychological well-being of women employees in call centers in India
    • Núm. 40-1, Enero 2018
    • Employee Relations
    • 155-172
    Purpose: The purpose of this paper is to examine the relationship of gender-sensitive practices and family support in predicting psychological well-being of women assessed as stress, job satisfacti...
    ......, which in turn leads to reduced stress leading to high satisfaction and commitment and reducedintention to leave.Design/methodology/approach –Data were obtained from a sample of 302 women employees working incall centers in NCR, India on psychometrically sound scales.Findings –Analysis ......
  • Library data labs: using an agile approach to develop library analytics in UK higher education
    • Núm. 119-1/2, Enero 2018
    • Information and Learning Science
    • 5-15
    Purpose: The purpose of this paper is to give an overview of the Jisc and Higher Education Statistics Agency (HESA) Library Data Labs project and its outputs. This collaboration involved bringing t...
    ...... used by the projects were available on a secure server as part of the Heidi Labs project.Some of the HESA data were potentially sensitive, because of this each team member wasrequired to sign a data protection agreement to ensure data that contained personal detailswas not shared ......
  • See all results

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT