36,545 research outputs found
A First Look at the General Data Protection Regulation (GDPR) in Open-Source Software
This poster describes work on the General Data Protection Regulation (GDPR)
in open-source software. Although open-source software is commonly integrated
into regulated software, and thus must be engineered or adapted for compliance,
we do not know how such laws impact open-source software development.
We surveyed open-source developers (N=47) to understand their experiences and
perceptions of GDPR. We learned many engineering challenges, primarily
regarding the management of users' data and assessments of compliance. We call
for improved policy-related resources, especially tools to support data privacy
regulation implementation and compliance in open-source software.Comment: 2 page extended abstract for ICSE-Poster 202
Tracking Report 2009 PVH Corp, Dominican Republic 080219447H
This document is part of a digital collection provided by the Martin P. Catherwood Library, ILR School, Cornell University, pertaining to the effects of globalization on the workplace worldwide. Special emphasis is placed on labor rights, working conditions, labor market changes, and union organizing.FLA_2009_PVH_Corp_TR_Dominican_Republic_080219447H.pdf: 6 downloads, before Oct. 1, 2020
Independent External Monitoring Agricultural Report 2013 Nestle, Ivory Coast Kouamekro
This document is part of a digital collection provided by the Martin P. Catherwood Library, ILR School, Cornell University, pertaining to the effects of globalization on the workplace worldwide. Special emphasis is placed on labor rights, working conditions, labor market changes, and union organizing.FLA_2013_IEMAR_Ivory_Coast_Kouamekro.pdf: 37 downloads, before Oct. 1, 2020
Tracking Report 2009 Nordstrom, Dominican Republic 080219447H
This document is part of a digital collection provided by the Martin P. Catherwood Library, ILR School, Cornell University, pertaining to the effects of globalization on the workplace worldwide. Special emphasis is placed on labor rights, working conditions, labor market changes, and union organizing.FLA_2009_Nordstrom_TR_Dominican_Republic_080219447H.pdf: 18 downloads, before Oct. 1, 2020
The Therapist Can\u27t See You Now: How Paid Sick Leave Policy Can Accommodate Mental Illness in the Workplace
Restaurants have become the “poster child” for why employers should adopt paid sick leave. Advocates suggest that employees without access to paid sick leave often show up to work ill due to their inability to sacrifice pay. Clever protest signs read, “No Boogers in my Burger” and “No Coughing in my Coffee.” Any rational customer would not appreciate the thought of a flu-ridden chef assembling their main course. However, the benefits of paid leave legislation and policies go beyond protecting cheeseburgers from flu germs. Just as employees with the flu require time off for medical attention, employees with mental illness require time to attend appointments and engage in preventative care. A staggering one in five adults in the United States have a mental health condition, and the depression rates among young adults is worsening
Into the Breach: Using Electronic Resources Responsibly
Citation: Geuther, C. (2016). Into the Breach: Using Electronic Resources Responsibly. Poster was presented at the 2nd Joint Conference of Kansas Library Association College and University Libraries Section and the Nebraska College and University Section, Manhattan, KS.This poster will explain the conversation between technical and public services librarians at Kansas State University regarding data breaches of electronic resources and how to avoid them. After a recent surge of breaches by Kansas State faculty and students, a workshop was needed for the librarians to relay critical information about resources to the patrons who used them. This poster will include the protocol at Kansas State University as librarians and Information Technology Security staff are made aware of an issue, simple explanations of breach events, and suggestions for training patrons at the university level to avoid them. This poster was presented at the 2nd Joint Conference of Kansas Library Association College and University Libraries Section and the Nebraska College and University Section on April 22, 2016.
The Anonymous Poster: How to Protect Internet Users’ Privacy and Prevent Abuse
The threat of anonymous Internet posting to individual privacy has been met with congressional and judicial indecisiveness. Part of the problem stems from the inherent conflict between punishing those who disrespect one\u27s privacy by placing a burden on the individual websites and continuing to support the Internet\u27s development. Additionally, assigning traditional tort liability is problematic as the defendant enjoys an expectation of privacy as well, creating difficulty in securing the necessary information to proceed with legal action. One solution to resolving invasion of privacy disputes involves a uniform identification verification program that ensures user confidentiality while promoting accountability for malicious behavior
POSTERS PRESENTED, ANNUAL MEETING, SAEA, FORT WORTH, TEXAS, FEBRUARY 1991
Teaching/Communication/Extension/Profession,
- …