Open Access. Powered by Scholars. Published by Universities.®
- Discipline
Articles 1 - 3 of 3
Full-Text Articles in Law
The Information Era Threatens Privacy: A Comparative Study Of Electronic Money’S Privacy Policies And Privacy Laws, Guanru Liu
GUANRU LIU
This thesis consists of an analysis of electronic money (e-money), e-money’s privacy policies and relevant privacy laws. The value of information and the development of technology enhance the risk of privacy violations in the information era. Consumer privacy interests with respect to e-money are governed in part by the Personal Information Protection and Electronic Documents Act (PIPEDA) in Canada and by the European Union’s Data Protection Directive. The analysis is directed at whether the privacy policies of three kinds of e-money – Octopus Card, PayPal and MasterCard – comply with the spirit and letter of these laws. In light of …
Personal Data Protection In The Era Of Cloud Computing. New Challenges For European Regulators., Panagiotis Kitsos, Paraskevi Pappas
Personal Data Protection In The Era Of Cloud Computing. New Challenges For European Regulators., Panagiotis Kitsos, Paraskevi Pappas
Panagiotis Kitsos
It is widely aknowledged that we are entering in an era of revolutionary changes in the field of Information and Communication Technologies . The spread of broadband internet connections has led internet to function not only as a communications network but also as a platform for new computing applications. The most recent application is the so called "cloud computing", which permits the running of software applications or the storage of data to be performed at remote servers which are connected to our computers through the Internet. Examples of these applications are the web-based email services, online computer back up, data …
The Privacy Matrix, Corey A. Ciocchetti
The Privacy Matrix, Corey A. Ciocchetti
Corey A Ciocchetti
The twenty-first-century e-commerce environment is a scary place. Lurking within are technologically-sophisticated e-threats ready to compromise an individual’s personally identifying information (PII). At the same time, consumers submit vast amounts of PII into cyberspace without comprehending such dangers while businesses stumble to protect the information they collect and sell it on the open market. The United States legal system – currently a mixture of self-regulation and a patchwork of federal/state legislation – is ill-equipped to deal with these e-threats effectively. A new paradigm is needed. The Privacy Matrix paradigm categorizes the most prominent e-threats into three stages of the PII …