741,639 research outputs found

    Privacy and Data Protection Act 2014

    Get PDF
    This report establishes a data security regime for all information held by the Victorian public sector. Authorised Version No. 001 - Privacy and Data Protection Act 2014 - No. 60 of 2014 Authorised Version incorporating amendments as at 17 September 2014 The Parliament of Victoria enacts: PART 1—PRELIMINARY 1 Purposes The purposes of this Act are— (a) to provide for responsible collection and handling of personal information in the Victorian public sector; and (b) to provide remedies for interferences with the information privacy of an individual; and (c) to establish a protective data security regime for the Victorian public sector; and (d) to establish a regime for monitoring and assuring public sector data security; and (e) to establish the Commissioner for Privacy and Data Protection; and (f) to repeal the Information Privacy Act 2000 and the Commissioner for Law Enforcement Data Security Act 2005 and make consequential amendments to other Acts

    Secret charing vs. encryption-based techniques for privacy preserving data mining

    Get PDF
    Privacy preserving querying and data publishing has been studied in the context of statistical databases and statistical disclosure control. Recently, large-scale data collection and integration efforts increased privacy concerns which motivated data mining researchers to investigate privacy implications of data mining and how data mining can be performed without violating privacy. In this paper, we first provide an overview of privacy preserving data mining focusing on distributed data sources, then we compare two technologies used in privacy preserving data mining. The first technology is encryption based, and it is used in earlier approaches. The second technology is secret-sharing which is recently being considered as a more efficient approach

    Privacy and Security of Data

    Get PDF

    Balancing smartness and privacy for the Ambient Intelligence

    Get PDF
    Ambient Intelligence (AmI) will introduce large privacy risks. Stored context histories are vulnerable for unauthorized disclosure, thus unlimited storing of privacy-sensitive context data is not desirable from the privacy viewpoint. However, high quality and quantity of data enable smartness for the AmI, while less and coarse data benefit privacy. This raises a very important problem to the AmI, that is, how to balance the smartness and privacy requirements in an ambient world. In this article, we propose to give to donors the control over the life cycle of their context data, so that users themselves can balance their needs and wishes in terms of smartness and privacy
    • …
    corecore