Protection of personal data in databases and computer programs
نویسندگان
چکیده
At the beginning of article describes what restrictions caused pandemic in 2020 by a new coronovirus infection COVID-19. The discusses legitimacy processing personal data using databases and programs, particular, problems building, transmitting database containing PD; storing PD «cloud bases»; protection after destruction. Comparative legal analysis this institution European American legislation is carried out. In conclusion, it should be noted that legislator understands need to protect therefore taking appropriate measures ensure proper technical level operators. end conclusions were drawn on topic study.
منابع مشابه
Price Protection in the Personal Computer Industry
Hau L. Lee • V. Padmanabhan • Terry A. Taylor • Seungjin Whang Graduate School of Business, Stanford University, Stanford, California 94305 Graduate School of Business, Stanford University, Stanford, California 94305 Department of Industrial Engineering and Engineering Management, Stanford University, Stanford, California 94305 Graduate School of Business, Stanford University, Stanford, Califor...
متن کاملthe clustering and classification data mining techniques in insurance fraud detection:the case of iranian car insurance
با توجه به گسترش روز افزون تقلب در حوزه بیمه به خصوص در بخش بیمه اتومبیل و تبعات منفی آن برای شرکت های بیمه، به کارگیری روش های مناسب و کارآمد به منظور شناسایی و کشف تقلب در این حوزه امری ضروری است. درک الگوی موجود در داده های مربوط به مطالبات گزارش شده گذشته می تواند در کشف واقعی یا غیرواقعی بودن ادعای خسارت، مفید باشد. یکی از متداول ترین و پرکاربردترین راه های کشف الگوی داده ها استفاده از ر...
data mining rules and classification methods in insurance: the case of collision insurance
assigning premium to the insurance contract in iran mostly has based on some old rules have been authorized by government, in such a situation predicting premium by analyzing database and it’s characteristics will be definitely such a big mistake. therefore the most beneficial information one can gathered from these data is the amount of loss happens during one contract to predicting insurance ...
15 صفحه اولInconspicuous Personal Computer Protection with Touch-Mouse
We present a hassle-free personal information protection design that continuously monitors user identity with a Microsoft touchmouse [1] under a windows-based computer environment. This is the first design which investigates the relationship between time-indexed pressure map trajectories extracted from a touch-mouse and user behavior patterns categorized by common mouse action primitives. This ...
متن کاملCombined hardware and cryptographic user data protection in personal computer systems and networks
Some methods for combined hardware and cryptographic protection of user data in personal computer systems and networks are described and considered in the paper. It is given an overview of the main types of cryptography, described ways of key distribution and the most known cryptographical algorithms at the beginning of the paper. Then the paper presents and describes practically implemented sy...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: E3S web of conferences
سال: 2021
ISSN: ['2555-0403', '2267-1242']
DOI: https://doi.org/10.1051/e3sconf/202128404001