Protection of personal data in databases and computer programs

نویسندگان

چکیده

At the beginning of article describes what restrictions caused pandemic in 2020 by a new coronovirus infection COVID-19. The discusses legitimacy processing personal data using databases and programs, particular, problems building, transmitting database containing PD; storing PD «cloud bases»; protection after destruction. Comparative legal analysis this institution European American legislation is carried out. In conclusion, it should be noted that legislator understands need to protect therefore taking appropriate measures ensure proper technical level operators. end conclusions were drawn on topic study.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Price Protection in the Personal Computer Industry

Hau L. Lee • V. Padmanabhan • Terry A. Taylor • Seungjin Whang Graduate School of Business, Stanford University, Stanford, California 94305 Graduate School of Business, Stanford University, Stanford, California 94305 Department of Industrial Engineering and Engineering Management, Stanford University, Stanford, California 94305 Graduate School of Business, Stanford University, Stanford, Califor...

متن کامل

the clustering and classification data mining techniques in insurance fraud detection:the case of iranian car insurance

با توجه به گسترش روز افزون تقلب در حوزه بیمه به خصوص در بخش بیمه اتومبیل و تبعات منفی آن برای شرکت های بیمه، به کارگیری روش های مناسب و کارآمد به منظور شناسایی و کشف تقلب در این حوزه امری ضروری است. درک الگوی موجود در داده های مربوط به مطالبات گزارش شده گذشته می تواند در کشف واقعی یا غیرواقعی بودن ادعای خسارت، مفید باشد. یکی از متداول ترین و پرکاربردترین راه های کشف الگوی داده ها استفاده از ر...

data mining rules and classification methods in insurance: the case of collision insurance

assigning premium to the insurance contract in iran mostly has based on some old rules have been authorized by government, in such a situation predicting premium by analyzing database and it’s characteristics will be definitely such a big mistake. therefore the most beneficial information one can gathered from these data is the amount of loss happens during one contract to predicting insurance ...

15 صفحه اول

Inconspicuous Personal Computer Protection with Touch-Mouse

We present a hassle-free personal information protection design that continuously monitors user identity with a Microsoft touchmouse [1] under a windows-based computer environment. This is the first design which investigates the relationship between time-indexed pressure map trajectories extracted from a touch-mouse and user behavior patterns categorized by common mouse action primitives. This ...

متن کامل

Combined hardware and cryptographic user data protection in personal computer systems and networks

Some methods for combined hardware and cryptographic protection of user data in personal computer systems and networks are described and considered in the paper. It is given an overview of the main types of cryptography, described ways of key distribution and the most known cryptographical algorithms at the beginning of the paper. Then the paper presents and describes practically implemented sy...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: E3S web of conferences

سال: 2021

ISSN: ['2555-0403', '2267-1242']

DOI: https://doi.org/10.1051/e3sconf/202128404001