El archivero/a como DPD

Tábula ◽  
2021 ◽  
pp. 231-251
Author(s):  
Francesc Giménez Martín

¿Es el archivero/a realmente una opción para que las organizaciones piensen en él como delegado/a de protección de datos? ¿Está el archivero/a capacitado y listo para asumir ese cargo, llegado el momento? Estas cuestiones son las que se plantearán en el presente artículo, en un intento de esclarecer dudas de terceros y de la profesión, sobre la figura del archivero/a-DPD. Se incidirá en las funciones y competencias de ambos y, por último, se aportará un ejemplo práctico de elaboración de una herramienta fundamental tanto para la gestión documental como para el RGPD: el Registro de actividades de tratamiento. Is the archivist really an option for organizations to think of him/her as a Data Protection Officer? Is the archivist trained and ready to take on that role, when the time comes? These questions are those that will be raised in this article, in an attempt to clarify doubts, from third parties and from the profession, about the figure of the archivist-DPO. The functions and competencies of both will be emphasized and, finally, a practical example of the development of a fundamental tool for both document management and the RGPD will be provided: the Record of processing activities.

2020 ◽  
Vol 6 (1) ◽  
Author(s):  
Oksana Kulyk ◽  
Nina Gerber ◽  
Annika Hilt ◽  
Melanie Volkamer

  For many years, cookies have been widely used by websites, storing information about users’ behaviour. While enabling additional functionality and potentially improving user experience, cookies can be a threat to users’ privacy, especially cookies used by third parties for data analysis. Websites providers are legally required to inform users about cookie use by displaying a so-called cookie disclaimer. We conducted a survey study in 2017 to investigate how users perceive this disclaimer and whether it affects their actual behaviour. We found that while most participants had negative feelings towards the disclaimer, the disclaimer text had no significant effect on their decision to leave the website. Since the extensive media coverage of data protection issues that accompanied the EU General Data Protection Regulation (GDPR) entry into force in May 2018 may have sensitized users to privacy protection, we conducted a follow-up study in December 2018. Our results suggest that users did not change their attitude towards cookie use in favour of privacy protection, but got even more accustomed to the use of cookies, also by third parties. Moreover, many users seem to have misconceptions regarding cookie use. We discuss the implications of our results for the users’ right to make an informed decision about their privacy.


2017 ◽  
Vol 34 (1) ◽  
pp. 9-14
Author(s):  
Paul Pedley

The article considers privacy from the perspective of corporate libraries and their users, including the issues that the sector has in common with other types of library as well as those that are unique to the sector. The future of business information will include greater portability and personalization, both of which pose privacy challenges. Reliance on vendors and third parties in order to be able to deliver services as well as increasing usage of cloud computing also creates privacy risks which need to be carefully addressed. Corporate libraries aren’t immune from data breaches. These can sometimes be traced back to vendors. Library vendors serving the corporate sector can’t be expected to fully address customer privacy concerns if information professionals don’t make clear to them precisely what those concerns are. Argues that components of strategies to address privacy concerns include vendor management as well as a privacy/data protection audit.


Author(s):  
Ian J. Lloyd

The notion that data controllers should comply with a set of general data protection principles has been a feature of data protection statutes from the earliest days. As well as imposing obligations on controllers, the principles also confer rights – most notably relating to subject access on data subjects. This chapter will consider the scope and extent of the principles paying particular attention to the requirement that personal data be processed fairly and lawfully. A topic of more recent interest relates to the length of time for which data may be held and made available to third parties. Often referred to as involving the “right to be forgotten”, this is especially relevant to the operation of search engines which make it easy for users to find news stories what would have passed into obscurity in previous eras. The chapter considers also at the operation of the principle requiring users to adopt appropriate security measures against unauthorized access, a topic which is of particular relevance given recent and well publicised large-scale cyber-attacks.


2005 ◽  
Vol 69 (3) ◽  
pp. 264-276 ◽  
Author(s):  
Annabelle James ◽  
Chris Taylor

CCTV evidence is regularly employed in criminal cases, yet there has been relatively little consideration of the manner in which such evidence is collected and subsequently handled. The use of CCTV evidence raises issues of disclosure, data protection and human rights, all of which have a far-reaching impact not only on the accused but also on others who find themselves recorded by surveillance systems. In addition, much of the video evidence collected during criminal investigations comes from third parties, such as shops and commercial premises, which are outside the direct control of the police. This only serves to compound the difficulty of managing such material within the investigative and trial processes.


Security in cloud has become an important issue in day to day life. As consumers store all their important data in the cloud there should be a proper security available in cloud. The small sized and medium sized industries need a testing tool which is of high cost for testing their product. These companies utilize the cloud testing tools (Testing as a Service) by saving their product in the cloud which needs to be tested. The level of security is not much higher in cloud since the product information can be easily hacked by the third parties. In this paper, to overcome the issues in authentication and Data protection in Testing as a service –Taas, iris based authentication using cryptography has been proposed.


Author(s):  
Zuzana Papulova

This paper discusses the technical application of cloud computing based on the example of document management system (DMS). DMS is based on system to track, manage and store data. The cloud application is a logical continuation of the of development in DMS. However, cloud computing is still missing the wide recognition and satisfied implementation as a result of concerns in the area of data protection as an important issue. Especially in the area of documents management, companies could benefit a lot from the positive properties of using the backup and archival content storage. The paper contains the results of our research based on two studies. The first study was carried out on a sample of students with cloud solutions experiences. The second study contains views and opinions from companies. Based on the results, we sumarise the major problems and concerns of cloud technology application. Keywords: Document mangement system, cloud computing, cloud solutions.


Author(s):  
Proctor Charles

This chapter examines the nature and scope of the bank's duty of confidentiality, and the exceptions to it. It considers the difficulties which may confront a bank with branches in several countries and whose business may therefore be subjected to several different systems of law. The discussions cover the system of law applicable to the duty; the general nature and scope of the duty; disclosure under compulsion of law; disclosure in the interests of the bank itself; disclosure in the public interest; disclosure with the consent of the customer; damages for breach of the duty; the Data Protection Act 1998; wider duties of confidence; duties of confidentiality to third parties; and other duties of confidentiality.


2019 ◽  
Author(s):  
Arne Klaas

The major advantages of conducting internal investigations only come to light when the results can be disclosed to third parties. At the interface of data protection and criminal procedure law, the work explores how the group-internal transfer of the outcome and the cooperative disclosure to German and US authorities can be justified. The emphasis is placed on the suspect employee. Due to less strict investigation regulations under private law, the information transfer to authorities carries a potential risk of undermining his position as a suspect according to criminal procedure law. The contribution discusses if the new data protection law can adjust the structural imbalances and if it leads to a fairer approach to conducting internal investigations. Besides the highly relevant impact of disclosure orders from US authorities and Art. 48 DS-GVO as a “blocking statute”, the work also analyses the exclusion of gained evidence under criminal procedure law.


2016 ◽  
Vol 25 (4) ◽  
pp. 479-505
Author(s):  
Charles Leleux ◽  
C. William R. Webster

This article provides an assessment of the recent phenomenon in Scotland and the United Kingdom of selling edited electoral registers to third parties, and reflects on the implications of this practice for privacy, data protection and citizen-state relations. Drawing on the results of the National Survey of Electoral Registration Officers in Scotland, information is presented on the sale of edited registers, the types of organisation purchasing registers, revenues generated and the number of electors ‘opting out’ of the edited register. This is the first time such information has been collected nationally and therefore represents a unique Scottish ‘snapshot’. The article argues that the sale of edited registers is contentious. The collection of personal information contained within the register is critical for the successful functioning of elections and consequently our representative democratic system, yet the subsequent unrestricted sale of this information for commercial gain potentially undermines trust in democratic processes and alters the informational nature of citizen-state relations. This article offers a first opportunity to reflect on some of the consequences of this practice.


Sign in / Sign up

Export Citation Format

Share Document