Résumé
Information privacy, data privacy or data protection laws provide a legal framework on how to obtain, use and store data of natural persons. The various laws around the world describe the rights of natural persons to control who is using its data. This includes usually the right to get details on which data is stored, for what purpose and to request the deletion in case the purpose is not given anymore. Over 80 countries and independent territories, including nearly every country in Europe and many in Latin America and the Caribbean, Asia, and Africa, have now adopted comprehensive data protection laws. The European Union has the General Data Protection Regulation (GDPR), in force since May 25, 2018. The United States is notable for not having adopted a comprehensive information privacy law, but rather having adopted limited sectoral laws in some areas like the California Consumer Privacy Act (CCPA). These laws are based on fair information practice guidelines developed by the U.S. Department for Health, Education and Welfare (HEW) (later renamed Department of Health & Human Services (HHS)), by a Special Advisory Committee on Automated Personal Data Systems, under the chairmanship of computer pioneer and privacy pioneer Willis H. Ware. The report submitted by the Chair to the HHS Secretary titled "Records, Computers and Rights of Citizens (07/01/1973)", proposes universal principles for the privacy and protection of consumer and citizen data: For all data collected, there should be a stated purpose. Information collected from an individual cannot be disclosed to other organizations or individuals unless specifically authorized by law or by consent of the individual. Records kept on an individual should be accurate and up to date. There should be mechanisms for individuals to review data about them, to ensure accuracy. This may include periodic reporting. Data should be deleted when it is no longer needed for the stated purpose. Transmission of personal information to locations where "equivalent" personal data protection cannot be assured is prohibited.
À propos de ce résultat
Cette page est générée automatiquement et peut contenir des informations qui ne sont pas correctes, complètes, à jour ou pertinentes par rapport à votre recherche. Il en va de même pour toutes les autres pages de ce site. Veillez à vérifier les informations auprès des sources officielles de l'EPFL.
Cours associés (7)
COM-402: Information security and privacy
This course provides an overview of information security and privacy topics. It introduces students to the knowledge and tools they will need to deal with the security/privacy challenges they are like
CS-523: Advanced topics on privacy enhancing technologies
This advanced course will provide students with the knowledge to tackle the design of privacy-preserving ICT systems. Students will learn about existing technologies to prect privacy, and how to evalu
COM-301: Computer security and privacy
This is an introductory course to computer security and privacy. Its goal is to provide students with means to reason about security and privacy problems, and provide them with tools to confront them.
Afficher plus
Séances de cours associées (72)
Confidentialité des données dans la recherche en cybersanté
Explore les défis et les perspectives en matière de protection des données dans la recherche sur la cybersanté, en mettant l'accent sur la conformité au RGPD, la gestion sensible des données de santé et les agents décentralisés.
Biométrie récente
Explore les bases, les avantages, les risques et l'impact mondial de la technologie biométrique récente.
Context Passing : Contextes d'exécution
Couvre le passage de contexte par rapport aux classes de type, les contextes d'exécution, l'inviolabilité et l'importance de la spécificité dans Scala.
Afficher plus