Results for 'Personal data protection'

1000+ found
Order:
  1.  11
    Personal Data Protection as an Element of the Ethical Evaluation of Scientific Research Involving Humans.Mariusz Jagielski - 2023 - Diametros 19 (76):1-14.
    The aim of the article is to explain the relationship between the ethical evaluation of scientific research involving personal data and the assessment of compliance with data protection law. The article presents the mutual relationship between the protection of personal data and scientific activity from a dogmatic perspective, the legal regulation of the processing of personal data in scientific research, and the so-called research exceptions that apply when data are processed (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2.  10
    Reflections on Turkish Personal Data Protection Law and Genetic Data in Focus Group Discussions.Özlem Özkan, Melike Şahinol, Arsev Umur Aydinoglu & Yesim Aydin Son - 2022 - NanoEthics 16 (3):297-312.
    Since the 1970s and more rigorously since the 1990s, many countries have regulated data protection and privacy laws in order to ensure the safety and privacy of personal data. First, a comparison is made of different acts regarding genetic information that are in force in the EU, the USA, and China. In Turkey, changes were adopted only recently following intense debates. This study aims to explore the experts’ opinions on the regulations of the health information systems, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  3.  23
    Comparison of Heads of Research Ethics Committees with Data Protection Officers on Personal Data Protection in Research: A Mixed-Methods Study with Structured Interviews.Karlo Ložnjak, Anamaria Malešević, Marin Čargo, Anamarija Mladinić, Zvonimir Koporc & Livia Puljak - forthcoming - Journal of Academic Ethics:1-22.
    Personal data protection is an ethical issue. In this study we analyzed how research ethics committees (RECs) and data protection officers (DPOs) handle personal data protection issues in research protocols. We conducted a mixed-methods study. We included heads (or delegated representatives) of RECs and DPOs from universities and public research institutes in Croatia. The participants provided information about data protection issues in research and their mutual collaboration on those issues through (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  4.  2
    Personal Data Protection in Health and Social Services.John Street - 1991 - Journal of Medical Ethics 17 (1):53-54.
  5.  23
    COVID-19, Personal Data Protection and Privacy in India.Mohamad Ayub Dar & Shahnawaz Ahmad Wani - 2022 - Asian Bioethics Review 15 (2):125-140.
    The corona pandemic altered many traditional and historical norms of society and law. COVID-19 created a humanitarian crisis in some parts of globe, while pandemic privacy and civil liberties were under threat all over world. To combat the deadly virus, individual liberty and equality were compromised. This paper focuses on how India’s health problem has compromised people’s right to privacy. It will highlight how strict executive policies led to the creation of a massive surveillance system in the name of combating (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  9
    El reto de la ordenación del derecho fundamental a la protección de datos de carácter personal en un universo digital = A regulatory challenge to the fundamental right of the personal data protection in a digital universe.María del Pilar Zapatero Martín - 2018 - UNIVERSITAS Revista de Filosofía Derecho y Política 29:32-69.
    RESUMEN: En la era de las tecnologías digitales, el Derecho se enfrenta al objetivo de afrontar la protección de los datos personales en un universo global donde las fronteras se diluyen y el principio de territorialidad ha dejado de tener aplicación. Este trabajo pretende plantear el reto que supone, para el ordenamiento jurídico español, la adaptación a la nueva regulación europea en esta materia.ABSTRACT: At the digital´s technologies age, Law faces with the aim to address the personal data (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  7
    Computers, Personal Data, and Theories of Technology: Comparative Approaches to Privacy Protection in the 1990s.Colin J. Bennett - 1991 - Science, Technology and Human Values 16 (1):51-69.
    Public policies designed to regulate the use of information technology to protect personal data have been based on different theoretical assumptions in different states, depending on whether the problem is defined in technological, civil libertarian, or bureaucratic terms. However, the rapid development, dispersal, and decentralization of information technology have facilitated a range of new surveillance practices that have in turn rendered the approaches of the 1960s and 1970s obsolete. The networking of the postindustrial state will require a reconceptualization (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  8.  24
    Comparative legal study on privacy and personal data protection for robots equipped with artificial intelligence: looking at functional and technological aspects.Kaori Ishii - 2019 - AI and Society 34 (3):509-533.
    This paper undertakes a comparative legal study to analyze the challenges of privacy and personal data protection posed by Artificial Intelligence embedded in Robots, and to offer policy suggestions. After identifying the benefits from various AI usages and the risks posed by AI-related technologies, I then analyze legal frameworks and relevant discussions in the EU, USA, Canada, and Japan, and further consider the efforts of Privacy by Design originating in Ontario, Canada. While various AI usages provide great (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  9.  11
    Controversies between regulations of research ethics and protection of personal data: informed consent at a cross-road.Eugenijus Gefenas, J. Lekstutiene, V. Lukaseviciene, M. Hartlev, M. Mourby & K. Ó Cathaoir - 2021 - Medicine, Health Care and Philosophy 25 (1):23-30.
    This paper explores some key discrepancies between two sets of normative requirements applicable to the research use of personal data and human biological materials: the data protection regime which follows the application of the European Union General Data Protection Regulation, and the Declaration of Helsinki, CIOMS guidelines and other research ethics regulations. One source of this controversy is that the GDPR requires consent to process personal data to be clear, concise, specific and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  10.  9
    Data privacy protection in scientific publications: process implementation at a pharmaceutical company.Friedrich Maritsch, Ingeborg Cil, Colin McKinnon, Jesse Potash, Nicole Baumgartner, Valérie Philippon & Borislava G. Pavlova - 2022 - BMC Medical Ethics 23 (1):1-10.
    Background Sharing anonymized/de-identified clinical trial data and publishing research outcomes in scientific journals, or presenting them at conferences, is key to data-driven scientific exchange. However, when data from scientific publications are linked to other publicly available personal information, the risk of reidentification of trial participants increases, raising privacy concerns. Therefore, we defined a set of criteria allowing us to determine and minimize the risk of data reidentification. We also implemented a review process at Takeda for (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  11.  8
    Free speech on social media: How to protect our freedoms from social media that are funded by trade in our personal data.Richard Sorabji - 2020 - Social Philosophy and Policy 37 (2):209-236.
    I have argued elsewhere that in past history, freedom of speech, whether granted to few or many, was granted as bestowing some important benefit. John Stuart Mill, for example, in On Liberty, saw it as enabling us to learn from each other through discussion. By the test of benefit, I here argue that social media that are funded through trade in our personal data with advertisers, including propagandists, cannot claim to be supporting free speech. We lose our freedoms, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  12.  2
    Data protection for networked and robotic toys - a legal perspective.Rocco Panetta & Federico Sartore - 2018 - International Review of Information Ethics 27.
    This paper is aimed to understand the state of the art and the resulting consequences of the legal framework in Europe, with regard to the protection of children's data. Especially when they interact with networked and robotic toys, like in 'My friend Cayla' case. In order to evaluate the practical implications of the use of IoT devices by children or teenager users, the first part of the paper presents an analysis of the international guiding principles of the (...) of minors, a category which enjoys a higher level of protection of their fundamental rights, due to their condition of lack of physical and psychological maturity. Secondly, the focus is moved upon the protection of personal data of children. Only after confronting previous data protection legal instruments and having compared them with the novelties set forth in General Data Protection Regulation, it is reasonable to assume that new provisions such as "privacy by design" principle, adequacy of security measures and codes of conduct, can support data controllers in ensuring compliance in the field of IoT toys. In conclusion, the paper supports a view of Data Protection Authorities as a relevant player in enhancing these renovated tools in order to achieve the protection of children's rights, as to ensure their substantial protection against the threats of the interconnected world. (shrink)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  15
    HIV-positive status and preservation of privacy: a recent decision from the Italian Data Protection Authority on the procedure of gathering personal patient data in the dental office.Adelaide Conti, Paola Delbon, Laura Laffranchi, Corrado Paganelli & Francesco De Ferrari - 2012 - Journal of Medical Ethics 38 (6):386-388.
    The processing of sensitive information in the health field is subject to rigorous standards that guarantee the protection of information confidentiality. Recently, the Italian Data Protection Authority (Garante per la Protezione dei Dati Personali) stated their formal opinion on a standard procedure in dental offices involving the submission of a questionnaire that includes the patient's health status. HIV infection status is included on the form. The Authority has stated that all health data collection must be in (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  14.  2
    Beware of the Virtual Doll: ISPs and the Protection of Personal Data of Minors. [REVIEW]Daniel Nagel - 2011 - Philosophy and Technology 24 (4):411-418.
    Once upon a time, they managed to bring Neverland into the bedrooms; they were seen as the heroes of a new era. However, as heroes always tend to walk a fine line between good and evil, it does not come as a surprise that a decade later the perception has dramatically changed; the fairy tale turned into a nightmare. Are Internet Service Providers (ISPs) no more than data-guzzling monsters that need to be tamed? In November, the European Commission published (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  15.  15
    Confidentiality: The Protection of Personal Data in Epidemiological and Clinical Research Trials.Charles R. McCarthy & Joan P. Porter - 1991 - Journal of Law, Medicine and Ethics 19 (3-4):238-241.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  16.  13
    Open consent, biobanking and data protection law: can open consent be ‘informed’ under the forthcoming data protection regulation?Michael Friedewald & Dara Hallinan - 2015 - Life Sciences, Society and Policy 11 (1):1-36.
    This article focuses on whether a certain form of consent used by biobanks – open consent – is compatible with the Proposed Data Protection Regulation. In an open consent procedure, the biobank requests consent once from the data subject for all future research uses of genetic material and data. However, as biobanks process personal data, they must comply with data protection law. Data protection law is currently undergoing reform. The Proposed (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  17.  14
    Confidentiality: The Protection of Personal Data in Epidemiological and Clinical Research Trials.Charles R. McCarthy & Joan P. Porter - 1991 - Journal of Law, Medicine and Ethics 19 (3-4):238-241.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  18.  12
    Assessing data protection and governance in health information systems: a novel methodology of Privacy and Ethics Impact and Performance Assessment.Concetta Tania Di Iorio, Fabrizio Carinci, Jillian Oderkirk, David Smith, Manuela Siano, Dorotea Alessandra de Marco, Simon de Lusignan, Paivi Hamalainen & Massimo Massi Benedetti - 2021 - Journal of Medical Ethics 47 (12):e23-e23.
    BackgroundData processing of health research databases often requires a Data Protection Impact Assessment to evaluate the severity of the risk and the appropriateness of measures taken to comply with the European Union General Data Protection Regulation. We aimed to define and apply a comprehensive method for the evaluation of privacy, data governance and ethics among research networks involved in the EU Project Bridge Health.MethodsComputerised survey among associated partners of main EU Consortia, using a targeted instrument (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  19.  9
    Personal data are political. A feminist view on privacy and big data.Sara Suárez-Gonzalo - 2019 - Recerca.Revista de Pensament I Anàlisi 24 (2):173-192.
    The second-wave feminist critique of privacy defies the liberal opposition between the public-political and the private-personal. Feminist thinkers such as Hanisch, Young or Fraser note that, according to this liberal conception, public institutions often keep asymmetric power relations between private agents away from political discussion and action. The resulting subordination of some agents to others tends, therefore, to be naturalised and redefined as a «personal problem». Drawing on these contributions, this article reviews the social and political implications of (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  20.  8
    Whose Commons? Data Protection as a Legal Limit of Open Science.Mark Phillips & Bartha M. Knoppers - 2019 - Journal of Law, Medicine and Ethics 47 (1):106-111.
    Open science has recently gained traction as establishment institutions have come on-side and thrown their weight behind the movement and initiatives aimed at creation of information commons. At the same time, the movement's traditional insistence on unrestricted dissemination and reuse of all information of scientific value has been challenged by the movement to strengthen protection of personal data. This article assesses tensions between open science and data protection, with a focus on the GDPR.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  21.  21
    The regulatory intersections between artificial intelligence, data protection and cyber security: challenges and opportunities for the EU legal framework.Jozef Andraško, Matúš Mesarčík & Ondrej Hamuľák - forthcoming - AI and Society:1-14.
    The presented paper focuses on the analysis of strategic documents at the level of the European Union concerning the regulation of artificial intelligence as one of the so-called disruptive technologies. In the first part of the article, we outline the basic terminology. Subsequently, we focus on the summarizing and systemizing of the key documents adopted at the EU level in terms of artificial intelligence regulation. The focus of the paper is devoted to issues of personal data protection (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  22.  80
    Challenging algorithmic profiling: The limits of data protection and anti-discrimination in responding to emergent discrimination.Tobias Matzner & Monique Mann - 2019 - Big Data and Society 6 (2).
    The potential for biases being built into algorithms has been known for some time, yet literature has only recently demonstrated the ways algorithmic profiling can result in social sorting and harm marginalised groups. We contend that with increased algorithmic complexity, biases will become more sophisticated and difficult to identify, control for, or contest. Our argument has four steps: first, we show how harnessing algorithms means that data gathered at a particular place and time relating to specific persons, can be (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   10 citations  
  23.  11
    Ethical Responsibilities for Companies That Process Personal Data.Matthew S. McCoy, Anita L. Allen, Katharina Kopp, Michelle M. Mello, D. J. Patil, Pilar Ossorio, Steven Joffe & Ezekiel J. Emanuel - 2023 - American Journal of Bioethics 23 (11):11-23.
    It has become increasingly difficult for individuals to exercise meaningful control over the personal data they disclose to companies or to understand and track the ways in which that data is exchanged and used. These developments have led to an emerging consensus that existing privacy and data protection laws offer individuals insufficient protections against harms stemming from current data practices. However, an effective and ethically justified way forward remains elusive. To inform policy in this (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   19 citations  
  24.  21
    Information technology, privacy, and the protection of personal data.Jeroen Van Den Hoven - 2008 - In M. J. van den Joven & J. Weckert (eds.), Information Technology and Moral Philosophy. Cambridge University Press.
    Direct download  
     
    Export citation  
     
    Bookmark   15 citations  
  25.  15
    The structure of rights in directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data[REVIEW]Dag Elgesem - 1999 - Ethics and Information Technology 1 (4):283-293.
    The paper has three parts. First, a survey and analysis is given ofthe structure of individual rights in the recent EU Directive ondata protection. It is argued that at the core of this structure isan unexplicated notion of what the data subject can `reasonablyexpect' concerning the further processing of information about himor herself. In the second part of the paper it is argued thattheories of privacy popular among philosophers are not able to shed much light on the issues (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  26.  12
    Allegations of misuse of African DNA in the UK: Will data protection legislation in South Africa be sufficient to prevent a recurrence?Keymanthri Moodley & Anita Kleinsmidt - 2021 - Developing World Bioethics 21 (3):125-130.
    Concerns have been raised around the alleged commercialisation of South African genetic material by various research institutes nationally and abroad. We consider whether the Protection of Personal Information Act in South Africa will conflict with or complement existing protections in health law and research ethics. The Act is not applicable to de‐identified samples that cannot be re‐identified but we question whether genetic samples can ever be truly de‐identified. The research participants in this matter provided consent for use of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  27.  6
    Virtuality and Capabilities in a World of Ambient Intelligence: New Challenges to Privacy and Data Protection.Luiz Costa - 2016 - Cham: Imprint: Springer.
    This book is about power and freedoms in our technological world and has two main objectives. The first is to demonstrate that a theoretical exploration of the algorithmic governmentality hypothesis combined with the capability approach is useful for a better understanding of power and freedoms in Ambient Intelligence, a world where information and communication technologies are invisible, interconnected, context aware, personalized, adaptive to humans and act autonomously. The second is to argue that these theories are useful for a better comprehension (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  3
    Health research and systems’ governance are at risk: should the right to data protection override health?C. T. Di Iorio, F. Carinci & J. Oderkirk - 2014 - Journal of Medical Ethics 40 (7):488-492.
    The European Union Data Protection Regulation will have profound implications for public health, health services research and statistics in Europe. The EU Commission's Proposal was a breakthrough in balancing privacy rights and rights to health and healthcare. The European Parliament, however, has proposed extensive amendments. This paper reviews the amendments proposed by the European Parliament Committee on Civil Liberties, Justice and Home Affairs and their implications for health research and statistics. The amendments eliminate most innovations brought by the (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  29.  2
    Legislative and Ethical Peculiarities of Human Genetic Data Protection.Danielius Serapinas - 2013 - Jurisprudencija: Mokslo darbu žurnalas 20 (1):165-179.
    Genetics is a biomedical science that investigates heredity, variability, occurrence of genetic diseases and their prevention. Genetic science has many fields of science, which deal with different genetic processes, methods, aspects and fields of application. The genetic research in Europe related to the individual as the main subject of the research is exposed to a wide range of ethical and legal issues. From the developments in genetic science other sciences have evolved, thanks to which the modern world is able to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  30.  3
    Digital identity: Contemporary challenges for data protection, privacy and non-discrimination rights.Ana Beduschi - 2019 - Big Data and Society 6 (2).
    The World Bank estimates that over one billion people currently lack official identity documents. To tackle this crucial issue, the United Nations included the aim to provide legal identity for all by 2030 among the Sustainable Development Goals. Technology can be a powerful tool to reach this target. In the digital age, new technologies increasingly mediate identity verification and identification of individuals. Currently, State-led and public–private initiatives use technology to provide official identification, to control and secure external borders, and to (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  31.  2
    Recent Case-law of the Court of Justice of the European Union Regarding the Fundamental Rights to Respect for Private and Family Life and to Protection of Personal Data.Dalia Misiūnaitė-Kamarauskienė - 2015 - Jurisprudencija: Mokslo darbu žurnalas 21 (4):1233.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  4
    Social networks and web 2.0: are users also bound by data protection regulations? [REVIEW]Brendan Van Alsenoy, Joris Ballet, Aleksandra Kuczerawy & Jos Dumortier - 2009 - Identity in the Information Society 2 (1):65-79.
    Directive 95/46/EC and implementing legislation define the respective obligations and liabilities of the different actors that may be involved in a personal data processing operation. There are certain exceptions to the scope of these regulations, among which processing which is carried out by natural persons in the course of activities that may be considered ‘purely personal’. The purpose of this article is to investigate the liability of users of social network sites under data protection and (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  33.  5
    The Design of GDPR-Abiding Drones Through Flight Operation Maps: A Win–Win Approach to Data Protection, Aerospace Engineering, and Risk Management.Eleonora Bassi, Nicoletta Bloise, Jacopo Dirutigliano, Gian Piero Fici, Ugo Pagallo, Stefano Primatesta & Fulvia Quagliotti - 2019 - Minds and Machines 29 (4):579-601.
    Risk management is a well-known method to face technological challenges through a win–win combination of protective and proactive approaches, fostering the collaboration of operators, researchers, regulators, and industries for the exploitation of new markets. In the field of autonomous and unmanned aerial systems, or UAS, a considerable amount of work has been devoted to risk analysis, the generation of ground risk maps, and ground risk assessment by estimating the fatality rate. The paper aims to expand this approach with a tool (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  34.  11
    The Design of GDPR-Abiding Drones Through Flight Operation Maps: A Win–Win Approach to Data Protection, Aerospace Engineering, and Risk Management.Eleonora Bassi, Nicoletta Bloise, Jacopo Dirutigliano, Gian Piero Fici, Ugo Pagallo, Stefano Primatesta & Fulvia Quagliotti - 2019 - Minds and Machines 29 (4):579-601.
    Risk management is a well-known method to face technological challenges through a win–win combination of protective and proactive approaches, fostering the collaboration of operators, researchers, regulators, and industries for the exploitation of new markets. In the field of autonomous and unmanned aerial systems, or UAS, a considerable amount of work has been devoted to risk analysis, the generation of ground risk maps, and ground risk assessment by estimating the fatality rate. The paper aims to expand this approach with a tool (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  35.  7
    The Design of GDPR-Abiding Drones Through Flight Operation Maps: A Win–Win Approach to Data Protection, Aerospace Engineering, and Risk Management.Eleonora Bassi, Nicoletta Bloise, Jacopo Dirutigliano, Gian Piero Fici, Ugo Pagallo, Stefano Primatesta & Fulvia Quagliotti - 2019 - Minds and Machines 29 (4):579-601.
    Risk management is a well-known method to face technological challenges through a win–win combination of protective and proactive approaches, fostering the collaboration of operators, researchers, regulators, and industries for the exploitation of new markets. In the field of autonomous and unmanned aerial systems, or UAS, a considerable amount of work has been devoted to risk analysis, the generation of ground risk maps, and ground risk assessment by estimating the fatality rate. The paper aims to expand this approach with a tool (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  36.  10
    Grappling with “Data Power”: Normative Nudges from Data Protection and Privacy.Orla Lynskey - 2019 - Theoretical Inquiries in Law 20 (1):189-220.
    The power exercised by technology companies is attracting the attention of policymakers, regulatory bodies and the general public. This power can be categorized in several ways, ranging from the “soft power” of technology companies to influence public policy agendas to the “market power” they may wield to exclude equally efficient competitors from the marketplace. This Article is concerned with the “data power” exercised by technology companies occupying strategic positions in the digital ecosystem. This data power is a multifaceted (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  37.  16
    International Health Research after Schrems v. Data Protection Commissioner.Mark A. Rothstein - 2015 - Hastings Center Report 46 (2):5-6.
    On October 6, 2015, in Schrems v. Data Protection Commissioner, the European Court of Justice, the European Union's highest court, held that the fifteen-year-old Safe Harbor Framework Agreement with the United States was invalid. Under the agreement, about forty-five hundred American companies each year self-certified to the U.S. Department of Commerce that they were in compliance with the essential privacy protections of the European Union, and therefore it was permissible for entities in the European Union to send (...) data to these American companies. According to the court, because some American companies were making the personal data of E.U. citizens available to U.S. government agencies, such as the National Security Agency, the fundamental privacy interests of E.U. citizens were not being protected. As a result of this court decision there has been considerable speculation about what, if any, effect the case has on international collaboration in health research, in particular, the sharing of personal data by E.U. researchers with their U.S. colleagues. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  38.  5
    Ochrona danych osobowych klientów jako element działania etycznego przedsiębiorcy.Ewa Kulesza - 2010 - Annales. Ethics in Economic Life 13 (1):97-105.
    The Personal Data Protection Act was enacted in 1997; it imposed some obligations on all the administrators of personal data regardless if acting as private or public establishments. The Act was intended to guarantee the safety of personal data and to ensure the right to controlling the data processing. However, since the enacting of the Act, there have been reported instances of its infringement, especially by private entrepreneurs. The numerous appealed complaints show (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  30
    Rationales and Approaches to Protecting Brain Data: a Scoping Review.Anita S. Jwa & Nicole Martinez-Martin - 2023 - Neuroethics 17 (1):1-15.
    Advances in neurotechnologies, artificial intelligence (AI) and Big Data analytics are allowing interpretation of patterns from brain data to identify and even predict and manipulate mental states. Furthermore, there are avenues through which brain data can move into the consumer sphere, be reidentified and brokered. In response to these developments, there have been a number of approaches proposed to strengthen protections of brain data. To better understand the landscape of brain data protection discussions, we (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  40.  8
    Can dynamic consent facilitate the protection of biomedical big data in biobanking in Malaysia?Mohammad Firdaus Abdul Aziz & Aimi Nadia Mohd Yusof - 2019 - Asian Bioethics Review 11 (2):209-222.
    As with many other countries, Malaysia is also developing and promoting biomedical research to increase the understanding of human diseases and possible interventions. To facilitate this development, there is a significant growth of biobanks in the country to ensure continuous collection of biological samples for future research, which contain extremely important personal information and health data of the participants involved. Given the vast amount of samples and data accumulated by biobanks, they can be considered as reservoirs of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  41. ICTs, data and vulnerable people: a guide for citizens.Alexandra Castańeda, Andreas Matheus, Andrzej Klimczuk, Anna BertiSuman, Annelies Duerinckx, Christoforos Pavlakis, Corelia Baibarac-Duignan, Elisabetta Broglio, Federico Caruso, Gefion Thuermer, Helen Feord, Janice Asine, Jaume Piera, Karen Soacha, Katerina Zourou, Katherin Wagenknecht, Katrin Vohland, Linda Freyburg, Marcel Leppée, Marta CamaraOliveira, Mieke Sterken & Tim Woods - 2021 - Bilbao: Upv-Ehu.
    ICTs, personal data, digital rights, the GDPR, data privacy, online security… these terms, and the concepts behind them, are increasingly common in our lives. Some of us may be familiar with them, but others are less aware of the growing role of ICTs and data in our lives - and the potential risks this creates. These risks are even more pronounced for vulnerable groups in society. People can be vulnerable in different, often overlapping, ways, which place (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  42. Data subject rights as a research methodology: A systematic literature review.Adamu Adamu Habu & Tristan Henderson - 2023 - Journal of Responsible Technology 16 (C):100070.
    Data subject rights provide data controllers with obligations that can help with transparency, giving data subjects some control over their personal data. To date, a growing number of researchers have used these data subject rights as a methodology for data collection in research studies. No one, however, has gathered and analysed different academic research studies that use data subject rights as a methodology for data collection. To this end, we conducted a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  43.  3
    Etyczne problemy ochrony danych osobowych pracownika w stosunkach pracy.Arleta Nerka - 2010 - Annales. Ethics in Economic Life 13 (1):107-121.
    This study concerns the ethical problems of personal data protection at work. The aim of this project is the analysis of the law structures, which determine the range of protection personal data of the employee and the candidate to work and the rights of data collecting and processing by the employer. The employee privacy protection at work is the principle of labour law expressed in Article 11 of the Labour Code. However (...) data protection problem is directly regulated by Article 22 of the Labour Code, which entitle employers to demand certain personal data from the employees and the candidates to work. The regulation determine the list of data, which may be the subject of legal actions by employer in the field of collecting and processing of personal data. The most important issue is connected with the treatment of sensitive information, such as health data, drug testing and genetic testing, sex life, racial or ethnic origin, political opinions, religious or philosophical beliefs, trade-union membership. Personal data protection means the necessity of cooperation between the employee and the employer not only in the field determined by the law but on the basis of ethical values as well. Hence the employer’s obligation to keep from actions which directly interfere in employee’s protected personal effects. But the employee is obliged to give true information about himself in order to protect his health and life at work. (shrink)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44. Data, Privacy, and the Individual.Carissa Véliz - 2020 - Center for the Governance of Change.
    The first few years of the 21st century were characterised by a progressive loss of privacy. Two phenomena converged to give rise to the data economy: the realisation that data trails from users interacting with technology could be used to develop personalised advertising, and a concern for security that led authorities to use such personal data for the purposes of intelligence and policing. In contrast to the early days of the data economy and internet surveillance, (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  45.  12
    Genomic research and data-mining technology: Implications for personal privacy and informed consent.Herman T. Tavani - 2004 - Ethics and Information Technology 6 (1):15-28.
    This essay examines issues involving personal privacy and informed consent that arise at the intersection of information and communication technology and population genomics research. I begin by briefly examining the ethical, legal, and social implications program requirements that were established to guide researchers working on the Human Genome Project. Next I consider a case illustration involving deCODE Genetics, a privately owned genetics company in Iceland, which raises some ethical concerns that are not clearly addressed in the current ELSI guidelines. (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  46.  17
    Delegating and distributing morality: Can we inscribe privacy protection in a machine? [REVIEW]Alison Adam - 2005 - Ethics and Information Technology 7 (4):233-242.
    This paper addresses the question of delegation of morality to a machine, through a consideration of whether or not non-humans can be considered to be moral. The aspect of morality under consideration here is protection of privacy. The topic is introduced through two cases where there was a failure in sharing and retaining personal data protected by UK data protection law, with tragic consequences. In some sense this can be regarded as a failure in the (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  47.  41
    Data-owning democracy: Citizen empowerment through data ownership.Roberta Fischli - 2024 - European Journal of Political Theory 23 (2):204-223.
    This article extends property-owning democracy to the digital realm and introduces “data-owning democracy,” a new political economic regime characterized by the wide distribution of data as capital among citizens. Drawing on republican theory and acknowledging data's unique role in the digital economy, it proposes a two-tier model that combines different modes of data ownership and corresponding rights. The first layer of “data-owning democracy” is characterized by a digital public infrastructure that enables citizens to collectively generate (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  48.  6
    European perspectives on big data applied to health: The case of biobanks and human databases.Itziar de Lecuona & María Villalobos-Quesada - 2018 - Developing World Bioethics 18 (3):291-298.
    Introduction The paradigm shift to a knowledge‐based economy has incremented the use of personal information applied to health‐related activities, such as biomedical research, innovation, and commercial initiatives. The convergence of science, technology, communication and data technologies has given rise to the application of big data to health; for example through eHealth, human databases and biobanks. Methods In light of these changes, we enquire about the value of personal data and its appropriate use. In order to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  7
    Reflections on the lived experience of working with limited personal protective equipment during the COVID‐19 crisis.Kechi Iheduru-Anderson - 2021 - Nursing Inquiry 28 (1):e12382.
    Coronavirus disease 2019 (COVID‐19) has placed significant strain on United States’ health care and health care providers. While most Americans were sheltering in place, nurses headed to work. Many lacked adequate personal protective equipment (PPE), increasing the risk of becoming infected or infecting others. Some health care organizations were not transparent with their nurses; many nurses were gagged from speaking up about the conditions in their workplaces. This study used a descriptive phenomenological design to describe the lived experience of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  50.  12
    Protecting Human Health and Security in Digital Europe: How to Deal with the “Privacy Paradox”?Isabell Büschel, Rostane Mehdi, Anne Cammilleri, Yousri Marzouki & Bernice Elger - 2014 - Science and Engineering Ethics 20 (3):639-658.
    This article is the result of an international research between law and ethics scholars from Universities in France and Switzerland, who have been closely collaborating with technical experts on the design and use of information and communication technologies in the fields of human health and security. The interdisciplinary approach is a unique feature and guarantees important new insights in the social, ethical and legal implications of these technologies for the individual and society as a whole. Its aim is to shed (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 1000