57,623 research outputs found

    The applicability of the Internet of Things (IoT) between fundamental rights to health and to privacy

    Get PDF
    This work aims to study main insecurities and uncertainties regarding to IoT, verifying its impact to the exercise of the fundamental rights to healthcare and to privacy. Its specific objectives are: i) to present promises of IoT to healthcare and treatments; ii) to expose risks and uncertainties identified with IoT until the present moment; iii) to analyze ethical and legal principles (mainly in Brazil) concerning to IoT uses. Its main hypothesis is that healthcare can be revolutionarily improved with IoT, but despite of all of that revolution in good practices, good technologies of security, securitized by public policies and legal practices, have also to be implemented and improved by scholars, jurists and politicians. Methodology: hypothetical-deductive method of research, with a qualitative and transdisciplinar method of approach, and a bibliographical research technique. Results: IoT/IoMT presents a great potential of actualization of the fundamental right to health, but the security of the collection and storage of sensitive data should be the first concern in the development of systems involving such technologies, since there is an immense potential of disrespect to the fundamental right to the privacy of individuals from their use, not only by private third parties, but also, by the State

    Big Data Privacy Context: Literature Effects On Secure Informational Assets

    Get PDF
    This article's objective is the identification of research opportunities in the current big data privacy domain, evaluating literature effects on secure informational assets. Until now, no study has analyzed such relation. Its results can foster science, technologies and businesses. To achieve these objectives, a big data privacy Systematic Literature Review (SLR) is performed on the main scientific peer reviewed journals in Scopus database. Bibliometrics and text mining analysis complement the SLR. This study provides support to big data privacy researchers on: most and least researched themes, research novelty, most cited works and authors, themes evolution through time and many others. In addition, TOPSIS and VIKOR ranks were developed to evaluate literature effects versus informational assets indicators. Secure Internet Servers (SIS) was chosen as decision criteria. Results show that big data privacy literature is strongly focused on computational aspects. However, individuals, societies, organizations and governments face a technological change that has just started to be investigated, with growing concerns on law and regulation aspects. TOPSIS and VIKOR Ranks differed in several positions and the only consistent country between literature and SIS adoption is the United States. Countries in the lowest ranking positions represent future research opportunities.Comment: 21 pages, 9 figure

    New Technologies and the Impact on Personality Rights in Brazil

    Get PDF
    As technology continues to evolve at an exponentially increasing pace, it transforms our lives and societies, thus shaping our perceptions of reality with high speed and impacting the relationship between the individual and the society, including businesses and, as a result, the legal system. The young area of law is trying to explore the effects of new technologies in our relationships with it, as well as identify the best use of new technologies to reduce the gap among new technology, new societal behaviors and various legal systems. The purpose of this paper is to examine the current uses of wearable technologies in Brazil and the legal issues emerging from the various uses of these technologies and their impact on personality rights. So, to what extent do the Brazilian users of emerging technologies appreciate the terms and conditions agreed by themselves and their impact on personality rights? The authors used empirical quantitative data from a cross-section of Brazilian users to explore the level of awareness in regards to the terms and conditions associated with the use of emerging technologies and the impact on their personality rights. The authors found that the large majority of these users of technology are unaware of the adverse impact of the agreed terms and conditions on their personality rights. Furthermore, they are also unaware of the basics of how the technology operates and therefore are unable to enforce their rights. The research is based on data collected by using only one survey with a sample of 500 students from three universities in three Brazilian States with an age range between 18 and 40 years old. This paper extends the previous research on the impact of emerging technologies on personality rights and demonstrates with empirical data that there is a serious risk of erosion of such rights. Furthermore, this research provides a unique insight into the users of emerging technologies in the emerging Brazilian market and the impact on the Brazilian legal system

    The Blood of Going Green: Using Environmental Initiatives to Account for the Human Rights Violations of the Green Movement

    Get PDF
    Part I of this Note first illustrates the science of climate change and the push for biofuel development. Next, this Note uses human rights to define the problems associated with biofuel development in Brazil, Argentina and Paraguay, and introduces the environmental law framework that can address these human rights violation. Part II details the main human rights violations in Brazil, Argentina, and Paraguay occurring at the hands of the soy industry, and surveys the main existing certification proposals that attempt to mitigate social and environmental abuses. Finally, Part III proposes ways that developed countries can collectively mitigate the negative human rights and environmental implications from biofuel development beyond their borders by implementing a comprehensive certification scheme in climate change initiatives that contain emissions reduction requirements

    Cross Border Data Flows: Could Foreign Protectionism Hurt U.S. Jobs?: Hearing Before the Subcomm. On Commerce, Mfg. & Trade of the H. Comm. on Energy & Commerce, 113th Cong., Sept. 17, 2014 (Statement of Laura K. Donohue)

    Get PDF
    Documents released over the past year detailing the National Security Agency’s telephony metadata collection program and interception of international content under the Foreign Intelligence Surveillance Act (FISA) directly implicated U.S. high technology companies in government surveillance. The result was an immediate, and detrimental, impact on U.S. firms, the economy, and U.S. national security. The first Snowden documents, printed June 5, 2013, revealed that the U.S. government had served orders on Verizon, directing the company to turn over telephony metadata under Section 215 of the USA PATRIOT Act. The following day, The Guardian published classified slides detailing how the NSA had intercepted international content under Section 702 of the FISA Amendments Act. The type of information obtained ranged from E-mail, video and voice chat, videos, photos, and stored data, to Voice over Internet Protocol, file transfers, video conferencing, notifications of target activity, and online social networking details. The companies involved read like a who’s who of U.S. Internet giants: Microsoft, Yahoo, Google, Facebook, PalTalk, YouTube, Skype, AOL, and Apple. More articles highlighting the extent to which the NSA had become embedded in the U.S. high tech industry followed. In September 2013 ProPublica and the New York Times revealed that the NSA had enjoyed considerable success in cracking commonly-used cryptography. The following month the Washington Post reported that the NSA, without the consent of the companies involved, had obtained millions of customers’ address book data: in one day alone, some 444,743 email addresses from Yahoo, 105,068 from Hotmail, 82,857 from Facebook, 33,697 from Gmail, and 22,881 from other providers. The extent of upstream collection stunned the public – as did slides demonstrating how the NSA had bypassed the companies’ encryption, intercepting data as it transferred between the public Internet and the Google cloud. Further documents suggested that the NSA had helped to promote encryption standards for which it already held the key or whose vulnerabilities the NSA understood but not taken steps to address. Beyond this, press reports indicated that the NSA had at times posed as U.S. companies—without their knowledge—in order to gain access to foreign targets. In November 2013 Der Spiegel reported that the NSA and the United Kingdom’s Government Communications Headquarters (GCHQ) had created bogus versions of Slashdot and LinkedIn, so that when employees from the telecommunications firm Belgacom tried to access the sites from corporate computers, their requests were diverted to the replica sites that then injected malware into their machines. As a result of growing public awareness of these programs, U.S. companies have lost revenues, even as non-U.S. firms have benefited. In addition, numerous countries, concerned about consumer privacy as well as the penetration of U.S. surveillance efforts in the political sphere, have accelerated localization initiatives, begun restricting U.S. companies’ access to local markets, and introduced new privacy protections—with implications for the future of Internet governance and U.S. economic growth. These effects raise attendant concerns about U.S. national security. Congress has an opportunity to redress the current situation in at least three ways. First, and most importantly, reform of the Foreign Intelligence Surveillance Act would provide for greater restrictions on NSA surveillance. Second, new domestic legislation could extend better protections to consumer privacy. These shifts would allow U.S. industry legitimately to claim a change in circumstance, which would help them to gain competitive ground. Third, the integration of economic concerns at a programmatic level within the national security infrastructure would help to ensure that economic matters remain central to national security determinations in the future

    Secure Cloud Storage with Client-Side Encryption Using a Trusted Execution Environment

    Full text link
    With the evolution of computer systems, the amount of sensitive data to be stored as well as the number of threats on these data grow up, making the data confidentiality increasingly important to computer users. Currently, with devices always connected to the Internet, the use of cloud data storage services has become practical and common, allowing quick access to such data wherever the user is. Such practicality brings with it a concern, precisely the confidentiality of the data which is delivered to third parties for storage. In the home environment, disk encryption tools have gained special attention from users, being used on personal computers and also having native options in some smartphone operating systems. The present work uses the data sealing, feature provided by the Intel Software Guard Extensions (Intel SGX) technology, for file encryption. A virtual file system is created in which applications can store their data, keeping the security guarantees provided by the Intel SGX technology, before send the data to a storage provider. This way, even if the storage provider is compromised, the data are safe. To validate the proposal, the Cryptomator software, which is a free client-side encryption tool for cloud files, was integrated with an Intel SGX application (enclave) for data sealing. The results demonstrate that the solution is feasible, in terms of performance and security, and can be expanded and refined for practical use and integration with cloud synchronization services

    The Global Employer: Showcasing New Developments for Multinational Employers

    Get PDF
    Baker & McKenzie’s Global Employment Practice Group is pleased to present its 54th issue of The Global Employerℱ entitled “Showcasing New Developments for Multinational Employers.” This issue contains a collection of articles on legal developments from nine jurisdictions that examine changes to employment and labour laws and practices and explore developments in compensation and benefits. Included, you will find information pertaining to a new collective redundancy procedure in France aimed at providing for a more secure labor market; new measures in Spain intended to promote employment among young people under 30; the codification of requirements for the negotiation of social plans in Switzerland; effects on UK redundancy laws in light of being found in breach of EU directives; emboldened labor agency agendas in the US; a discussion from Argentina on the rights of employees and employers when it comes to monitoring in the workplace; new developments for stock option plans in Brazil; changes to the calculation of payroll taxes in Colombia; and the promotion and protection of labor rights in Peru

    "Internet universality": Human rights and principles for the internet

    Get PDF
    This paper details proposals by UNESCO to manufacture and draft a concept of “Internet Universality” that adopts a human-rights framework as a basis for articulating a set of principles and rights for the Internet. The paper discusses various drafts of this concept before examining the Charter of Human Rights and Principles for the Internet put forward by The Internet Rights & Principles Dynamic Coalition based at the UN Internet Governance Forum, and the working law Marco Civil da Internet introduced by Brazil
    • 

    corecore