Tópicos Sugeridos dentro de su búsqueda.
https://purl.org/pe-repo/ocde/ford#5.05.01 88 https://purl.org/pe-repo/ocde/ford#5.05.00 72 https://purl.org/pe-repo/ocde/ford#5.02.04 22 Protección de datos 21 Medidas de protección 19 Protección de datos personales 19 https://purl.org/pe-repo/ocde/ford#2.01.01 17 más ...
Mostrando 1 - 20 Resultados de 622 Para Buscar 'para data protection*', tiempo de consulta: 1.11s Limitar resultados
1
artículo
The present article refers to the implementation of the Protection of Testing Data forpharmaceutical products in the light of the implementation of the FTA signed by Peruand the United States of America and the application of the definitions given by theTRIPS for this figure. The national legislation and the applicable treaties are analyzedas well as the first cases of protection to the new chemical entities given by the regulatoryauthority. The successes and drawbacks of the new Testing Data legislation. Theirimpact on heath and research issues.
2
artículo
There is a great variety and amount of sensitive and valuable healthcare information that could be used to benefit people, but is not exploited due to limited access to data. This article aims to determine factors influencing data accessibility in private and public organizations through a literature review. Of the 300 related articles identified, 23 were included in this review. Among the resulting factors influencing information accessibility, the following stood out: open governments, health information systems, personal data protection laws, ethics in the use of medical information, and data lakes. Making health data more accessible would improve services and treatment plans, save state resources and promote education and research.
3
artículo
There is a great variety and amount of sensitive and valuable healthcare information that could be used to benefit people, but is not exploited due to limited access to data. This article aims to determine factors influencing data accessibility in private and public organizations through a literature review. Of the 300 related articles identified, 23 were included in this review. Among the resulting factors influencing information accessibility, the following stood out: open governments, health information systems, personal data protection laws, ethics in the use of medical information, and data lakes. Making health data more accessible would improve services and treatment plans, save state resources and promote education and research.
4
artículo
As a concept, the adequate level of protection for international data transfers remains to some extent unknown and, in the case of the European Union, with regard to Directive 95/46/EC, already repealed, its content has been specified by the General Data Protection Regulation (GDPR). Its origin is, in the pre-digital era, in international instruments on the protection of personal data and its most relevant development has occurred in the European Union, until reaching the case of the adequacy decision of Japan, which is the first adopted after 25 of May of 2018, which shows the practical application of the elements required under the GDPR. Other countries, particularly in Latin America, have also included the concept of adequate level in their data protection laws. Although the adequate level is only one of the instruments for international data transfers, the differences that may a...
5
artículo
The protection of personal data in health systems requires special measures and procedures to ensure that the privacy of the information is not violated. Advances in digital technology and access to real-time transmission of personal, family, clinical, and laboratory data of patients and/or study subjects may compromise the protection of this information. The privacy of personal data in health in times of pandemic has meant a greater challenge, that is why this unique contribution is presented, whose objective is to identify the ethical and regulatory safeguards in terms of data protection to guarantee full respect for the privacy rights of people and the confidentiality of their data, under the context of health care, especially in conditions of health crisis, such as the one experienced during the SARS-CoV-2 pandemic. It also proposes a legislative harmonization in Latin America, on pr...
6
artículo
Is there a correspondence or affinity between the juridicalprincipiological and factual-economical conceptions for the effective protection of the consent of the holder of personal data when hiring in a network?Under the mantle of the present question, it aims to analyze the contemporary contractual scenario under the perspective of the privacy policy and the Brazilian General Data Protection Law (LGPD). In this context, it is proposed a skeptical reflection on the principles and economic guidelines defended by law and doctrine to verify if the consent is an instrument of real effectiveness to the tutelage of the subjects in network. The first topic concerns the conceptual and conceptual analysis of consent in the LGPD and in the specialized doctrine. The second topic deals with the limited rationality of the users of the network services in understanding the dispositions in the pol...
7
artículo
Currently, there is a notable increase in data loss cases, which can result in great economic losses for organizations. Data loss is a frequent problem in different information systems and can occur due to various reasons, such as hardware failure, human error, malicious attack, and natural disaster, among others. This systematic review aims to identify the impact of Information Security Management on the prevention of data loss. To carry out this research, the PRISMA methodology was used and searches were carried out in 6 databases: Scopus, Scielo, Alicia, Google Scholar, Science Direct and Redalyc. A total of 59 documents were found, and applying the exclusion and inclusion criteria, 9 documents were chosen for analysis. Of the selected documents, it was found that the massive increase in information stored in database systems has led to an increase in security breach attempts by outsi...
8
tesis de grado
Actualmente, los sectores empresariales optimizan sus costos sin perder eficiencia productiva en Data Center Móviles tercer izando el servicio y adquiriendo esta tecnología ya que la infraestructura montada es de utilidad para todo ámbito empresarial. El presente proyecto trata sobre el servicio de implementación de un nuevo Data Center Contingente tipo Container, en adelante CPD, como consecuencia de las necesidades de mejora centro de los procesos de negocio. El diseño y dimensionamiento de los diferentes componentes cumplen los estándares requeridos en el mercado. Los Outdoor Enclosure Electric Shelter Prefabricados en sí y todos los equipamientos eléctricos utilizados en sus sistemas para la protección, control y supervisión, están construidos de acuerdo a las Normas vigentes de ANSI, NEMA, ASTM, IEEE, ISA, OSHA, los cuales además cuentan con Aprobaciones y Certificación...
9
artículo
Technology is constantly evolving and influencing all spheres in our life. Law and, in particular, labour law are not far from the technological revolutions as, increasingly, companies are incorporating algorithms as strategic partners for decision making.In this article, the authors seek to analyze and explain both the impact of the use of logarithms in employment relations, using concepts of big data and artificial intelligence and the protection off ered by labour law against this new trend.
10
artículo
This article reviewed the use of cryptography and blockchain technologies in the Internet of Things (IoT) for data protection, focusing on decentralized technologies as a secure and efficient solution. The objective was to analyze how the combination of these technologies can enhance the security of IoT devices, ensuring data integrity and privacy. The methodology involved a comprehensive literature review of recent studies on cryptography, blockchain, and their implementation in IoT environments. Various approaches to data decentralization and the implementation of smart contracts in IoT networks were analyzed. The results showed that the application of blockchain and cryptographic techniques significantly strengthens data protection, reducing vulnerabilities in information transmission between connected devices. It was concluded that decentralized technologies, combined with cryptograp...
11
artículo
This article concerns the implementation of test data protection for pharmaceutical products in relation to the implementation of the Free Trade Agreement (FTA) between Peru and the United States of America and the application of definitions given by the TRIPS Agreement in this case. It analyses domestic legislation and applicable treaties as well as first cases of protection to new chemical entities given by the regulatory authority. The achievements and shortcomings of the new legislation of test data protection. It´s impact on health topics.
12
artículo
This article addresses the protection of medical data in health information systems, focusing on the growing adoption of electronic health records (EHRs). It recognises the security challenges inherent in centralised systems and advocates for the secure exchange of medical data. The methodology follows the principles of the PRISMA statement, using search engines such as SCOPUS, PUBMED and IEEE XPLORE to identify 20 relevant documents. These papers focus on key attributes of blockchain technology: access control, data privacy, data security and encryption. The results indicate that access control is the most recurring attribute, followed by data privacy, data security and encryption. The discussion highlights the practical applicability of these attributes, improving patient confidence and medical workflow efficiency. The conclusions affirm the relevance of the blockchain in medical data ...
13
artículo
The systematic review conducted focuses on identifying the main security measures to protect information and data in cloud computing environments. The objective was to highlight the importance of implementing robust security measures and explore their practical applicability. Relevant articles were selected and their results were analyzed through the PRISMA methodology. The findings emphasize the importance of strong password policies, access control, biometric and multifactor authentication, and the use of firewalls. In addition, specific solutions such as SSH key management in AWS and the adoption of CASB to strengthen cloud security were examined. Finally, it was determined that data encryption, access control, and biometric and multifactor authentication are crucial measures to protect information in the cloud. These measures prevent security breaches and ensure user privacy. Practic...
14
artículo
Technology is constantly evolving and influencing all spheres in our life. Law and, in particular, labour law are not far from the technological revolutions as, increasingly, companies are incorporating algorithms as strategic partners for decision making.In this article, the authors seek to analyze and explain both the impact of the use of logarithms in employment relations, using concepts of big data and artificial intelligence and the protection off ered by labour law against this new trend.
15
artículo
In this article, the author addresses the reform of the Consumer Protection and Defense Code carried out by Legislative Decree 1390, through which the Registry ‘Gracias No Insista’ was replaced by the rule of prior consent to receive mass communications with promotional purposes, which was aimed at harmonizing the consumer protection regulation with the one of personal data.In this regard, the author develops a complete analysis of the regulation of promotional communications, both from the perspective of consumer protection rights and personal data protection; to later emphasize the successes and failures of the current regulation, at a legal and practical level. Likewise, the text proposes points of improvement to the current regulation and ends with practical recommendations on this matter to suppliers and ...
16
artículo
The internet and social networks have revolutionized our lives, generating a greater dependence on social endeavors, generating a greater concern regarding cyber security and the proper treatment of personal data on the web, since that the misuse of this information could affect our personal privacy. However, in most cases, the privacy and personal data protection policies offered to users are unilateral and difficult to understand, and therefore are rarely read. On that account, the author will raise the new challenges for the application of the regulations to these technologies.
17
artículo
The internet and social networks have revolutionized our lives, generating a greater dependence on social endeavors, generating a greater concern regarding cyber security and the proper treatment of personal data on the web, since that the misuse of this information could affect our personal privacy. However, in most cases, the privacy and personal data protection policies offered to users are unilateral and difficult to understand, and therefore are rarely read. On that account, the author will raise the new challenges for the application of the regulations to these technologies.
18
artículo
The internet and social networks have revolutionized our lives, generating a greater dependence on social endeavors, generating a greater concern regarding cyber security and the proper treatment of personal data on the web, since that the misuse of this information could affect our personal privacy. However, in most cases, the privacy and personal data protection policies offered to users are unilateral and difficult to understand, and therefore are rarely read. On that account, the author will raise the new challenges for the application of the regulations to these technologies.
19
artículo
La Administración estatal debe servir al público, lo que legitima el ejercicio de poderes que el ordenamiento jurídico establece. Para ello utiliza herramientas, entre ellas las que hoy día provienen de las nuevas tecnologías de la información y la comunicación.En todo caso y como en toda materia procede el respeto de los derechos humanos, entre ellos el de protección de los datos personales.
20
artículo
This study tries to determine whether the principle of proactive liability, established in the European General Data Protection Regulation, can be easily transferred to the Latin American sphere despite the fact that Latin American regulations are excessively fragmented and, in any case, it does not include the principle of proactive responsibility as one to be taken into account in the protection of personal data. This investigation is of a bibliographic type and it approaches to the knowledge of the subject to identify what is known and what not about the object of study. Therefore, the objective is to carry out a synopsis that brings together different investigations, reports and articles that account for the current state of the phenomenon under study; however, such a review also implies making a critical assessment of the research and articles. In this sense, understanding each...