Results for 'Protection of Personal Information Act'

986 found
Order:
  1.  30
    Convention for protection of human rights and dignity of the human being with regard to the application of biology and biomedicine: Convention on human rights and biomedicine.Council of Europe - 1997 - Kennedy Institute of Ethics Journal 7 (3):277-290.
    In lieu of an abstract, here is a brief excerpt of the content:Convention for Protection of Human Rights and Dignity of the Human Being with Regard to the Application of Biology and Biomedicine: Convention on Human Rights and BiomedicineCouncil of EuropePreambleThe Member States of the Council of Europe, the other States and the European Community signatories hereto,Bearing in mind the Universal Declaration of Human Rights proclaimed by the General Assembly of the United Nations on 10 December 1948;Bearing in mind (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   101 citations  
  2.  22
    Socio‐cultural analysis of personal information leakage in Japan.Yohko Orito & Kiyoshi Murata - 2008 - Journal of Information, Communication and Ethics in Society 6 (2):161-171.
    PurposeThe purpose of this paper is to analyse incidents of personal information leakage in Japan based on Japanese socio‐cultural characteristics of information privacy and to consider how best to develop an effective personal information protection policy that conforms to Japanese situations as well as to the global requirement of personal information protection.Design/methodology/approachAfter describing recent incidents of personal information leakage in Japan, the paper examines the defects of the Act on (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  3. Access to Personal Information for Public Health Research: Transparency Should Always Be Mandatory.Louise Ringuette, Jean-Christophe Bélisle-Pipon, Victoria Doudenkova & Bryn Williams-Jones - 2018 - Canadian Journal of Bioethics/Revue canadienne de bioéthique 1 (2):94-98.
    In Québec, the Act Respecting Access to Documents Held by Public Bodies and the Protection of Personal Information provides an exception to transparency to most public institutions where public health research is conducted by allowing them to not disclose their uses of personal data. This exceptionalism is ethically problematic due to important concerns and we argue that all those who conduct research should be transparent and accountable for the work they do in the public interest.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  4.  14
    Broad consent for biobank research in South Africa - Towards an enabling ethico-legal framework.Mantombi Maseme, Jillian Gardner & Safia Mahomed - 2024 - Global Bioethics 35 (1).
    Broad consent is permitted by the South African National Department of Health Ethics Guidelines but appears to be prohibited by section 13(1) of the Protection of Personal Information Act 4 of 2013. Additionally, the Act mandates that all personal data (including biobank sample data) be collected for lawful, explicit, and clearly defined purposes. There is possibility for ambiguity in interpretation because of this discrepancy between the two instruments. Given the association between the transfer of samples and (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  5.  7
    Children as participants in health research in South Africa: A response to Labuschaigne, Mahomed and Dhai.Dusty-Lee Donnelly & Donrich W. Thaldar - forthcoming - Developing World Bioethics.
    A complex network of ethico‐legal rules makes it difficult for health researchers in South Africa to lawfully recruit adolescents to the kinds of sensitive studies where it may be ethically appropriate to proceed without notifying parents or obtaining parental consent. This article responds to a recent proposal to amend the blanket requirement for mandatory parental consent presently contained in section 71 the South African National Health Act 61 of 2003 [NHA]. The proposed amendment is intended to bring the NHA into (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  20
    Controversies between regulations of research ethics and protection of personal data: informed consent at a cross-road.Eugenijus Gefenas, J. Lekstutiene, V. Lukaseviciene, M. Hartlev, M. Mourby & K. Ó Cathaoir - 2021 - Medicine, Health Care and Philosophy 25 (1):23-30.
    This paper explores some key discrepancies between two sets of normative requirements applicable to the research use of personal data and human biological materials: the data protection regime which follows the application of the European Union General Data Protection Regulation, and the Declaration of Helsinki, CIOMS guidelines and other research ethics regulations. One source of this controversy is that the GDPR requires consent to process personal data to be clear, concise, specific and granular, freely given and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  7.  16
    Can dynamic consent facilitate the protection of biomedical big data in biobanking in Malaysia?Mohammad Firdaus Abdul Aziz & Aimi Nadia Mohd Yusof - 2019 - Asian Bioethics Review 11 (2):209-222.
    As with many other countries, Malaysia is also developing and promoting biomedical research to increase the understanding of human diseases and possible interventions. To facilitate this development, there is a significant growth of biobanks in the country to ensure continuous collection of biological samples for future research, which contain extremely important personal information and health data of the participants involved. Given the vast amount of samples and data accumulated by biobanks, they can be considered as reservoirs of precious (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  8.  14
    Allegations of misuse of African DNA in the UK: Will data protection legislation in South Africa be sufficient to prevent a recurrence?Keymanthri Moodley & Anita Kleinsmidt - 2021 - Developing World Bioethics 21 (3):125-130.
    Concerns have been raised around the alleged commercialisation of South African genetic material by various research institutes nationally and abroad. We consider whether the Protection of Personal Information Act in South Africa will conflict with or complement existing protections in health law and research ethics. The Act is not applicable to de‐identified samples that cannot be re‐identified but we question whether genetic samples can ever be truly de‐identified. The research participants in this matter provided consent for use (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  9. Information technology, privacy, and the protection of personal data.Jeroen Van Den Hoven - 2008 - In M. J. van den Joven & J. Weckert (eds.), Information Technology and Moral Philosophy. Cambridge University Press.
    Direct download  
     
    Export citation  
     
    Bookmark   15 citations  
  10.  11
    Catch-22: A patient’s right to informational determination and the rendering of accounts by medical schemes.M. Botes & E. A. Obasa - 2023 - South African Journal of Bioethics and Law 16 (2):67.
    Many people who have reached the age of majority still qualify as financial dependents of their parents, and may be registered as dependents on their parents’ medical schemes. This poses a practical conundrum, because major persons enjoy complete autonomy over their bodies to choose healthcare services as they please, including informational determination. However, their sensitive health information may end up being disclosed in the accounts rendered to their parents, as main members of medical schemes, thereby breaching their informational privacy, (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  11. Clarifying the legal requirement for cross-border sharing of health data in POPIA: Recommendations on the draft Code of Conduct for Research.L. Abdulrauf, A. Adaji & H. Ojibara - forthcoming - South African Journal of Bioethics and Law:e1696.
    The draft Code of Conduct for Research is an important initiative towards assisting the scientific community in complying with the provisions of the Protection of Personal Information Act 4 of 2013 (POPIA). However, its approach towards cross-border data sharing should be reconsidered to clarify the ambiguities inherent in the legal requirements for the cross-border sharing of health data in the POPIA. These ambiguities include the concept of ‘transfer of information’, the application of adequacy as a legal (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  10
    Issues Around the Protection or Revelation of Personal Information.Daniel Hillyard & Mark Gauen - 2007 - Knowledge, Technology & Policy 20 (2):121-124.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  13.  12
    Personal information as communicative acts.Jens-Erik Mai - 2016 - Ethics and Information Technology 18 (1):51-57.
    The paper extends previous accounts of informational privacy as a contextual notion. Where previous accounts have focused on interpretations of the privacy context itself as being contextual and open for negotiation and interpretation, this paper extends those analyses and shows that personal information itself is in fact best understood as contextual and situational—and as such open for interpretation. The paper reviews the notion of information as it has been applied in informational privacy and philosophy of information, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  14.  31
    Rethinking the concept of the right to information privacy: a Japanese perspective.Kiyoshi Murata & Yohko Orito - 2008 - Journal of Information, Communication and Ethics in Society 6 (3):233-245.
    PurposeThe purpose of this paper is to reconsider the concept of the right to information privacy and to propose, from a Japanese perspective, a revised conception of this right that is suitable for the modern information society.Design/methodology/approachFirst, the concept of privacy and personal information protection in the information society is briefly explained. After that, confused situations in Japan caused by the enforcement of Act on the Protection of Personal Information are described (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  15.  28
    Protecting Posted Genes: Social Networking and the Limits of GINA.Sandra Soo-Jin Lee & Emily Borgelt - 2014 - American Journal of Bioethics 14 (11):32-44.
    The combination of decreased genotyping costs and prolific social media use is fueling a personal genetic testing industry in which consumers purchase and interact with genetic risk information online. Consumers and their genetic risk profiles are protected in some respects by the 2008 federal Genetic Information Nondiscrimination Act (GINA), which forbids the discriminatory use of genetic information by employers and health insurers; however, practical and technical limitations undermine its enforceability, given the everyday practices of online social (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  16.  11
    Reflections on Turkish Personal Data Protection Law and Genetic Data in Focus Group Discussions.Özlem Özkan, Melike Şahinol, Arsev Umur Aydinoglu & Yesim Aydin Son - 2022 - NanoEthics 16 (3):297-312.
    Since the 1970s and more rigorously since the 1990s, many countries have regulated data protection and privacy laws in order to ensure the safety and privacy of personal data. First, a comparison is made of different acts regarding genetic information that are in force in the EU, the USA, and China. In Turkey, changes were adopted only recently following intense debates. This study aims to explore the experts’ opinions on the regulations of the health information systems, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  17.  13
    Protection of information and the right to privacy - a new equilibrium?Luciano Floridi (ed.) - 2014 - Cham: Springer.
    This book presents the latest research on the challenges and solutions affecting the equilibrium between freedom of speech, freedom of information, information security, and the right to informational privacy. Given the complexity of the topics addressed, the book shows how old legal and ethical frameworks may need to be not only updated, but also supplemented and complemented by new conceptual solutions. Neither a conservative attitude (“more of the same”) nor a revolutionary zeal (“never seen before”) is likely to (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  45
    The Effect of Organization-Based Self-Esteem and Deindividuation in Protecting Personal Information Privacy.Meng-Hsiang Hsu & Feng-Yang Kuo - 2003 - Journal of Business Ethics 42 (4):305 - 320.
    In this research we apply the Theory of Planned Behavior (TPB) to study decisions related to information privacy protection. A TPB-based model was proposed to investigate whether organization-based self-esteem and perceived deindividuation can be employed to measure the strength of the perceived behavioral control construct. In addition, we examined if the addition of a causal path linking subjective norms to attitudes and another causal path linking organization-based self-esteem to subjective norms enhanced our research model's predicting power. Our study (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  19.  6
    The role of Data Transfer Agreements in ethically managing data sharing for research in South Africa.S. Mahomed, G. Loots & C. Staunton - forthcoming - South African Journal of Bioethics and Law:26-30.
    A multitude of legislation impacts the use of samples and data for research in South Africa. With the coming into effect of the Protection of Personal Information Act No. 4 of 2013 in July 2021, recent attention has been given to safeguarding research participants’ personal information. The protection of participants’ privacy in research is essential, but it is not the only risk at stake in the use and sharing of personal information. Other (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  20.  32
    Beware of the Virtual Doll: ISPs and the Protection of Personal Data of Minors. [REVIEW]Daniel Nagel - 2011 - Philosophy and Technology 24 (4):411-418.
    Once upon a time, they managed to bring Neverland into the bedrooms; they were seen as the heroes of a new era. However, as heroes always tend to walk a fine line between good and evil, it does not come as a surprise that a decade later the perception has dramatically changed; the fairy tale turned into a nightmare. Are Internet Service Providers (ISPs) no more than data-guzzling monsters that need to be tamed? In November, the European Commission published a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  21. Games of Partial Information and Predicates of Personal Taste.Mihai Hîncu - 2016 - Logos and Episteme 7 (1):7-29.
    A predicate of personal taste occurring in a sentence in which the perspectival information is not linguistically articulated by an experiencer phrase may have two different readings. In case the speaker of a bare sentence formed with a predicate of personal taste uses the subjective predicate encoding perspectival information in one way and the hearer interprets it in another way, the agents’ acts are not coordinated. In this paper I offer an answer to the question of (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  22. Claimed Identities, Personal Projects, and Relationship to Place: A Hermeneutic Interpretation of the Backcountry/Wilderness Experience at Rocky Mountain National Park.Jeffrey J. Brooks - 2003 - Dissertation, Colorado State University
    Captured in narrative textual form through open-ended and tape-recorded interview conversations, visitor experience was interpreted to construct a description of visitors' relationships to place while at the same time providing insights for those who manage the national park. Humans are conceived of as meaning-makers, and outdoor recreation is viewed as emergent experience that can enrich peoples' lives rather than a predictable outcome of processing information encountered in the setting. This process-oriented approach positions subjective well-being and positive experience in the (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  23.  23
    Developing registries of volunteers: key principles to manage issues regarding personal information protection.E. Levesque, D. Leclerc, J. Puymirat & B. M. Knoppers - 2010 - Journal of Medical Ethics 36 (11):712-714.
    Much biomedical research cannot be performed without recruiting human subjects. Increasingly, volunteer registries are being developed to assist researchers with this challenging task. Yet, volunteer registries raise confidentiality issues. Having recently developed a registry of volunteers, the authors searched for normative guidance on how to implement the principle of confidentiality. The authors found that the protection of confidentiality in registries are based on the 10 key elements which are elaborated in detail in the Canadian Standards Association Model Code. This (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  24.  12
    The Concept of “Person” in the Italian Legislation on Informed Consent and Advance Healthcare Directives.Matteo Cresti - 2022 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 35 (4):1351-1367.
    The aim of the paper is that of investigating the concept of “person” in the context of Italian law on informed consent and advance healthcare directives. The following paper will first consider the importance of the concept of “person” within bioethics; secondly it will exhibit how there are different levels of bioethics, and that on the discussion level of laws and regulations, concepts worthy of metaphysical and value references cannot be used, because they must be shared by everyone in a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  25.  7
    The evolving role of research ethics committees in the era of open data.S. Mahomed & M. L. Labuschaigne - 2023 - South African Journal of Bioethics and Law:80-83.
    While open science gains prominence in South Africa with the encouragement of open data sharing for research purposes, there are stricter laws and regulations around privacy – and specifically the use, management and transfer of personal information – to consider. The Protection of Personal Information Act No. 4 of 2013 (POPIA), which came into effect in 2021, established stringent requirements for the processing of personal information and has changed the regulatory landscape for the (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  26.  30
    Privacy as Protection of the Incomputable Self: From Agnostic to Agonistic Machine Learning.Mireille Hildebrandt - 2019 - Theoretical Inquiries in Law 20 (1):83-121.
    This Article takes the perspective of law and philosophy, integrating insights from computer science. First, I will argue that in the era of big data analytics we need an understanding of privacy that is capable of protecting what is uncountable, incalculable or incomputable about individual persons. To instigate this new dimension of the right to privacy, I expand previous work on the relational nature of privacy, and the productive indeterminacy of human identity it implies, into an ecological understanding of privacy, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   12 citations  
  27.  24
    Whence Social Determinants of Health?: Effective Personalized Medicine and the 2010 Patient Protection and Affordable Care Act.Priya Venkatesan Hays - 2013 - Journal of Clinical Research and Bioethics 4 (2).
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28. Search engines, personal information and the problem of privacy in public.Herman T. Tavani - 2005 - International Review of Information Ethics 3:39-45.
    The purpose of this paper is to show how certain uses of search-engine technology raise concerns for personal privacy. In particular, we examine some privacy implications involving the use of search engines to acquire information about persons. We consider both a hypothetical scenario and an actual case in which one or more search engines are used to find information about an individual. In analyzing these two cases, we note that both illustrate an existing problem that has been (...)
     
    Export citation  
     
    Bookmark   2 citations  
  29.  6
    Persons and Groups: Protection of Research Participants with Vulnerabilities as a Process.Paweł Łuków - 2022 - In Tomas Zima & David N. Weisstub (eds.), Medical Research Ethics: Challenges in the 21st Century. Springer Verlag. pp. 49-63.
    Conceptualisations of vulnerability of research participants in the international standards of ethics of research involving humans underwent a shift from a group-membership (categorical) to an individual-oriented (analytic) approach to vulnerability. However, the categorical view has not been jettisoned completely, and so its role needs to be examined or explained. It is argued in this chapter that a restricted use of the categorical approach can be justified if protection of vulnerable research participants is seen against the background of the dynamics (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  30.  44
    Freedom of Conscience and Health Care in the United States of America: The Conflict Between Public Health and Religious Liberty in the Patient Protection and Affordable Care Act.Peter West-Oram - 2013 - Health Care Analysis 21 (3):237-247.
    The recent confirmation of the constitutionality of the Obama administration’s Patient Protection and Affordable Care Act (PPACA) by the US Supreme Court has brought to the fore long-standing debates over individual liberty and religious freedom. Advocates of personal liberty are often critical, particularly in the USA, of public health measures which they deem to be overly restrictive of personal choice. In addition to the alleged restrictions of individual freedom of choice when it comes to the question of (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  31.  36
    International Experience of Legal Regulation of Freedom of Speech in the Global Information Society.Yuriy Onishchyk, Liudmyla L. Golovko, Vasyl I. Ostapiak, Oleksandra V. Belichenko & Yurii O. Ulianchenko - 2023 - International Journal for the Semiotics of Law - Revue Internationale de Sémiotique Juridique 36 (3):1325-1339.
    The article presents the results of the analysis of international legal regulation of the protection of freedom of speech, the right to freedom of expression within the UN and the Council of Europe. A comparative analysis of the definition of the right to express views and beliefs in various international legal acts was made. The case law of the European Court of Human Rights in cases related to the exercise of the right to express one's views and beliefs on (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  44
    Trusting third-party storage providers for holding personal information. A context-based approach to protect identity-related data in untrusted domains.Giulio Galiero & Gabriele Giammatteo - 2009 - Identity in the Information Society 2 (2):99-114.
    The never ending growth of digital information and the availability of low-cost storage facilities and networks capacity is leading users towards moving their data to remote storage resources. Since users’ data often holds identity-related information, several privacy issues arise when data can be stored in untrusted domains. In addition digital identity management is becoming extremely complicated due to the identity replicas proliferation necessary to get authentication in different domains. GMail and Amazon Web Services, for instance, are two examples (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  33.  8
    Virtuality and Capabilities in a World of Ambient Intelligence: New Challenges to Privacy and Data Protection.Luiz Costa - 2016 - Cham: Imprint: Springer.
    This book is about power and freedoms in our technological world and has two main objectives. The first is to demonstrate that a theoretical exploration of the algorithmic governmentality hypothesis combined with the capability approach is useful for a better understanding of power and freedoms in Ambient Intelligence, a world where information and communication technologies are invisible, interconnected, context aware, personalized, adaptive to humans and act autonomously. The second is to argue that these theories are useful for a better (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  34.  8
    AI-informed acting: an Arendtian perspective.Daniil Koloskov - forthcoming - Phenomenology and the Cognitive Sciences:1-18.
    In this paper, I will investigate the possible impact of weak artificial intelligence (more specifically, I will concentrate on deep learning) on human capability of action. For this goal, I will first address Arendt’s philosophy of action, which seeks to emphasize the distinguishing elements of action that set it apart from other forms of human activity. According to Arendt, action should be conceived as _praxis_, an activity that has its goal in its own very performance. The authentic meaning of action (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  35.  33
    Public attitudes to the use in research of personal health information from general practitioners' records: a survey of the Irish general public.Brian S. Buckley, Andrew W. Murphy & Anne E. MacFarlane - 2011 - Journal of Medical Ethics 37 (1):50-55.
    Introduction Understanding the views of the public is essential if generally acceptable policies are to be devised that balance research access to general practice patient records with protection of patients' privacy. However, few large studies have been conducted about public attitudes to research access to personal health information. Methods A mixed methods study was performed. Informed by focus groups and literature review, a questionnaire was designed which assessed attitudes to research access to personal health information (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  36.  13
    Bridging the regulatory gaps created by Smart and Connected technologies in South Africa.M. Botes & B. Townsend - 2023 - South African Journal of Bioethics and Law 16 (2):36.
    The prevalence of technology-embedded products, services, and cities, described colloquially as ‘smart’ technologies and ‘smart’ cities, has seen a spate of unprecedented growth in recent years. South Africa (SA) has not been left behind, with smartphones, smart watches, and smart voice-controlled virtual personal assistants such as Amazon’s Alexa now frequently used. But while these technologies hold great promise to revolutionise homes, offices and cities, their adoption poses challenges to individual and collective interests and wellbeing. After demonstrating the legal and (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  37. What We Informationally Owe Each Other.Alan Rubel, Clinton Castro & Adam Pham - forthcoming - In Algorithms & Autonomy: The Ethics of Automated Decision Systems. Cambridge University Press: Cambridge University Press. pp. 21-42.
    ABSTRACT: One important criticism of algorithmic systems is that they lack transparency. Such systems can be opaque because they are complex, protected by patent or trade secret, or deliberately obscure. In the EU, there is a debate about whether the General Data Protection Regulation (GDPR) contains a “right to explanation,” and if so what such a right entails. Our task in this chapter is to address this informational component of algorithmic systems. We argue that information access is integral (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38.  8
    Protection of Patient Autonomy via Consumer Protection Litigation: The Israeli Eltroxin Class Action as a Case Study.Tamar Gidron & Elad Schild - 2021 - Theoria 88 (6):1066-1085.
    The world famous Eltroxin saga of 2009–2011, which ignited heated public debates in Europe, Canada, and Australia, reveals the problematic nature of standalone autonomy protection cases. Eltroxin is a life-sustaining thyroid hormone replacement medicine used by millions worldwide; it was reformulated in 2008, and around 10% of patients were badly affected. Poor communication and lack of professional information triggered public hysteria as a global wave of complaints about harmful side effects, including hair loss, weight gain, extreme fatigue, headaches, (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  39.  48
    Protection of Children's Rights to Self-Determination in Research.Gary A. Walco & Cheryl M. Sterling - 2003 - Ethics and Behavior 13 (3):237-247.
    Federal guidelines require that informed consent be obtained from participants when they are enrolled in a research study. When conducting research with children, the guidelines utilize the term permission to describe parents' agreement to enroll their children in a study. The basic components of consent and permission are well described and identical, with the exception of the person for whom the decision to participate is being made. Beyond permission, when enrolling minor participants in research, affirmative agreement to participate in research (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  40.  27
    What is the ‘personal’ in ‘personal information’?Sille Obelitz Søe, Rikke Frank Jørgensen & Jens-Erik Mai - 2021 - Ethics and Information Technology 23 (4):625-633.
    Contemporary privacy theories and European discussions about data protection employ the notion of ‘personal information’ to designate their areas of concern. The notion of personal information is demarcated from non-personal information—or just information—indicating that we are dealing with a specific kind of information. However, within privacy scholarship the notion of personal information appears undertheorized, rendering the concept somewhat unclear. We argue that in an age of datafication, protection of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  41.  33
    Paid protection? Ethics of incentivised long-acting reversible contraception in adolescents with alcohol and other drug use.Tiana Won, Jennifer Blumenthal-Barby & Mariam Chacko - 2017 - Journal of Medical Ethics 43 (3):182-187.
    Pregnant adolescents have a higher risk of poor maternal and fetal outcomes, particularly in the setting of concomitant maternal alcohol and other drug (AOD) use. Despite numerous programmes aimed at reducing overall teen pregnancy rates and the recognition of AOD use as a risk factor for unintended pregnancy in adolescents, interventions targeting this specific group have been sparse. In adult drug-using women, financial incentives for contraception have been provided but are ethically controversial. This article explores whether a trial could ethically (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  42.  39
    Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse.Paul Benjamin Lowry, Clay Posey, Tom L. Roberts & Rebecca J. Bennett - 2014 - Journal of Business Ethics 121 (3):385-401.
    Computer abuse by employees is a critical concern for managers. Misuse of an organization’s information assets leads to costly damage to an organization’s reputation, decreases in sales, and impositions of fines. We use this opportunity to introduce and expand the theoretic framework proffered by Thong and Yap to better understand the factors that lead individuals to commit CA in organizations. The study uses a survey of 449 respondents from the banking, financial, and insurance industries. Our results indicate that individuals (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  43.  15
    From ‘Consent or Anonymise’ to ‘Share and Protect’: Facilitating Access to Surplus Tissue for Research Whilst Safeguarding Donor Interests.Catherine Blewett - 2021 - Health Care Analysis 29 (3):213-230.
    There is significant research value in the secondary use of surplus human tissue which has been removed during clinical care and is stored in diagnostic archives. However, this value is limited without access to information about the person from whom the tissue was removed. As the research value of surplus tissue is often not realised until after the patient’s episode of care, it is often the case that no consent has been given for any surplus tissue to be used (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44.  7
    The (Legal) Status of a Whistleblower in Poland. Selected Issues.Krystyna Ziółkowska - 2023 - Studies in Logic, Grammar and Rhetoric 68 (1):573-588.
    The Republic of Poland is one of the European Union countries that have not yet implemented Directive (EU) 2019/1937 of the European Parliament and of the Council of 23 October 2019 on the protection of persons reporting breaches of EU law (Journal of Laws EC L 305/17 of November 26, 2019). Even though signalling illegal acts is a more and more common occurrence and the social perception of such behaviours is also changing, the “whistleblowers” are not under any legal (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45. Victoria's Powers of Attorney Act 2014: Promoting the rights of persons with impaired decision-making capacity.Emanuel Nicolas Cortes Simonet - 2016 - Chisholm Health Ethics Bulletin 21 (3):3.
    Simonet, Emanuel Nicolas Cortes Victoria's new Powers of Attorney Act 2014 came into operation on 1 September 2015. Following recommendations by the Victorian Parliament Law Reform Committee, changes have been introduced in the new Act to simplify the process of making an enduring power of attorney. Reforms include the addition of a section on capacity, the introduction of a supportive attorney role distinct from the enduring power of attorney role, and the enhancement of safeguards. This article analyses how the new (...)
     
    Export citation  
     
    Bookmark  
  46.  19
    DNA dataveillance: protecting the innocent?Anna Vartapetiance Salmasi & Lee Gillam - 2010 - Journal of Information, Communication and Ethics in Society 8 (3):270-288.
    PurposeThe purpose of this paper is to discuss the UK National DNA Database and some of the controversies surrounding it with reference to legal and ethical issues, focusing particularly on privacy and human rights. Governance of this database involves specific exemptions from the Data Protection Act, and this gives a rise to concerns regarding both the extent of surveillance on the UK population and the possibility for harm to all citizens. This is of wider importance since every current citizen, (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  47.  61
    The ethics of information technology and business.Richard T. De George - 2003 - Malden, MA: Blackwell.
    This is the first study of business ethics to take into consideration the plethora of issues raised by the Information Age. The first study of business ethics to take into consideration the plethora of issues raised by the Information Age. Explores a wide range of topics including marketing, privacy, and the protection of personal information; employees and communication privacy; intellectual property issues; the ethical issues of e-business; Internet-related business ethics problems; and the ethical dimension of (...)
    Direct download  
     
    Export citation  
     
    Bookmark   17 citations  
  48.  59
    The structure of rights in directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data. [REVIEW]Dag Elgesem - 1999 - Ethics and Information Technology 1 (4):283-293.
    The paper has three parts. First, a survey and analysis is given ofthe structure of individual rights in the recent EU Directive ondata protection. It is argued that at the core of this structure isan unexplicated notion of what the data subject can `reasonablyexpect' concerning the further processing of information about himor herself. In the second part of the paper it is argued thattheories of privacy popular among philosophers are not able to shed much light on the issues (...)
    Direct download (10 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  49.  33
    The Challenges of Research Informed Consent in Socio‐Economically Vulnerable Populations: A Viewpoint From the Democratic Republic of Congo.Marion Kalabuanga, Raffaella Ravinetto, Vivi Maketa, Hypolite Muhindo Mavoko, Blaise Fungula, Raquel Inocêncio da Luz, Jean-Pierre Van Geertruyden & Pascal Lutumba - 2015 - Developing World Bioethics 16 (2):64-69.
    In medical research, the ethical principle of respect for persons is operationalized into the process of informed consent. The consent tools should be contextualized and adapted to the different socio-cultural environment, especially when research crosses the traditional boundaries and reaches poor communities. We look at the challenges experienced in the malaria Quinact trial, conducted in the Democratic Republic of Congo, and describe some lessons learned, related to the definition of acceptable representative, the role of independent witness and the impact of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  50.  22
    Informed Consent: Is it Sacrosanct?Alison Assiter - 2005 - Research Ethics 1 (3):77-83.
    Following Alder Hey and the earlier and much more extreme practices at Nuremberg, legislation has been developed governing the practice of medical ethics and research involving human participants more generally. In the medical context, relevant legislation includes GMC guidance, which states that disclosure of identifiable patient information without consent, for research purposes, is not acceptable unless it is justified in the public interest. There is a presumption, in other words, in favour of the view that patient consent ought to (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 986