57,623 research outputs found
The applicability of the Internet of Things (IoT) between fundamental rights to health and to privacy
This work aims to study main insecurities and uncertainties regarding to IoT, verifying its impact to the exercise of the fundamental rights to healthcare and to privacy. Its specific objectives are: i) to present promises of IoT to healthcare and treatments; ii) to expose risks and uncertainties identified with IoT until the present moment; iii) to analyze ethical and legal principles (mainly in Brazil) concerning to IoT uses. Its main hypothesis is that healthcare can be revolutionarily improved with IoT, but despite of all of that revolution in good practices, good technologies of security, securitized by public policies and legal practices, have also to be implemented and improved by scholars, jurists and politicians. Methodology: hypothetical-deductive method of research, with a qualitative and transdisciplinar method of approach, and a bibliographical research technique. Results: IoT/IoMT presents a great potential of actualization of the fundamental right to health, but the security of the collection and storage of sensitive data should be the first concern in the development of systems involving such technologies, since there is an immense potential of disrespect to the fundamental right to the privacy of individuals from their use, not only by private third parties, but also, by the State
Big Data Privacy Context: Literature Effects On Secure Informational Assets
This article's objective is the identification of research opportunities in
the current big data privacy domain, evaluating literature effects on secure
informational assets. Until now, no study has analyzed such relation. Its
results can foster science, technologies and businesses. To achieve these
objectives, a big data privacy Systematic Literature Review (SLR) is performed
on the main scientific peer reviewed journals in Scopus database. Bibliometrics
and text mining analysis complement the SLR. This study provides support to big
data privacy researchers on: most and least researched themes, research
novelty, most cited works and authors, themes evolution through time and many
others. In addition, TOPSIS and VIKOR ranks were developed to evaluate
literature effects versus informational assets indicators. Secure Internet
Servers (SIS) was chosen as decision criteria. Results show that big data
privacy literature is strongly focused on computational aspects. However,
individuals, societies, organizations and governments face a technological
change that has just started to be investigated, with growing concerns on law
and regulation aspects. TOPSIS and VIKOR Ranks differed in several positions
and the only consistent country between literature and SIS adoption is the
United States. Countries in the lowest ranking positions represent future
research opportunities.Comment: 21 pages, 9 figure
New Technologies and the Impact on Personality Rights in Brazil
As technology continues to evolve at an exponentially increasing pace, it transforms our lives and societies, thus shaping our perceptions of reality with high speed and impacting the relationship between the individual and the society, including businesses and, as a result, the legal system. The young area of law is trying to explore the effects of new technologies in our relationships with it, as well as identify the best use of new technologies to reduce the gap among new technology, new societal behaviors and various legal systems. The purpose of this paper is to examine the current uses of wearable technologies in Brazil and the legal issues emerging from the various uses of these technologies and their impact on personality rights. So, to what extent do the Brazilian users of emerging technologies appreciate the terms and conditions agreed by themselves and their impact on personality rights? The authors used empirical quantitative data from a cross-section of Brazilian users to explore the level of awareness in regards to the terms and conditions associated with the use of emerging technologies and the impact on their personality rights. The authors found that the large majority of these users of technology are unaware of the adverse impact of the agreed terms and conditions on their personality rights. Furthermore, they are also unaware of the basics of how the technology operates and therefore are unable to enforce their rights. The research is based on data collected by using only one survey with a sample of 500 students from three universities in three Brazilian States with an age range between 18 and 40 years old. This paper extends the previous research on the impact of emerging technologies on personality rights and demonstrates with empirical data that there is a serious risk of erosion of such rights. Furthermore, this research provides a unique insight into the users of emerging technologies in the emerging Brazilian market and the impact on the Brazilian legal system
The Blood of Going Green: Using Environmental Initiatives to Account for the Human Rights Violations of the Green Movement
Part I of this Note first illustrates the science of climate change and the push for biofuel development. Next, this Note uses human rights to define the problems associated with biofuel development in Brazil, Argentina and Paraguay, and introduces the environmental law framework that can address these human rights violation. Part II details the main human rights violations in Brazil, Argentina, and Paraguay occurring at the hands of the soy industry, and surveys the main existing certification proposals that attempt to mitigate social and environmental abuses. Finally, Part III proposes ways that developed countries can collectively mitigate the negative human rights and environmental implications from biofuel development beyond their borders by implementing a comprehensive certification scheme in climate change initiatives that contain emissions reduction requirements
Cross Border Data Flows: Could Foreign Protectionism Hurt U.S. Jobs?: Hearing Before the Subcomm. On Commerce, Mfg. & Trade of the H. Comm. on Energy & Commerce, 113th Cong., Sept. 17, 2014 (Statement of Laura K. Donohue)
Documents released over the past year detailing the National Security Agencyâs telephony metadata collection program and interception of international content under the Foreign Intelligence Surveillance Act (FISA) directly implicated U.S. high technology companies in government surveillance. The result was an immediate, and detrimental, impact on U.S. firms, the economy, and U.S. national security.
The first Snowden documents, printed June 5, 2013, revealed that the U.S. government had served orders on Verizon, directing the company to turn over telephony metadata under Section 215 of the USA PATRIOT Act. The following day, The Guardian published classified slides detailing how the NSA had intercepted international content under Section 702 of the FISA Amendments Act. The type of information obtained ranged from E-mail, video and voice chat, videos, photos, and stored data, to Voice over Internet Protocol, file transfers, video conferencing, notifications of target activity, and online social networking details. The companies involved read like a whoâs who of U.S. Internet giants: Microsoft, Yahoo, Google, Facebook, PalTalk, YouTube, Skype, AOL, and Apple.
More articles highlighting the extent to which the NSA had become embedded in the U.S. high tech industry followed. In September 2013 ProPublica and the New York Times revealed that the NSA had enjoyed considerable success in cracking commonly-used cryptography. The following month the Washington Post reported that the NSA, without the consent of the companies involved, had obtained millions of customersâ address book data: in one day alone, some 444,743 email addresses from Yahoo, 105,068 from Hotmail, 82,857 from Facebook, 33,697 from Gmail, and 22,881 from other providers. The extent of upstream collection stunned the public â as did slides demonstrating how the NSA had bypassed the companiesâ encryption, intercepting data as it transferred between the public Internet and the Google cloud.
Further documents suggested that the NSA had helped to promote encryption standards for which it already held the key or whose vulnerabilities the NSA understood but not taken steps to address. Beyond this, press reports indicated that the NSA had at times posed as U.S. companiesâwithout their knowledgeâin order to gain access to foreign targets. In November 2013 Der Spiegel reported that the NSA and the United Kingdomâs Government Communications Headquarters (GCHQ) had created bogus versions of Slashdot and LinkedIn, so that when employees from the telecommunications firm Belgacom tried to access the sites from corporate computers, their requests were diverted to the replica sites that then injected malware into their machines.
As a result of growing public awareness of these programs, U.S. companies have lost revenues, even as non-U.S. firms have benefited. In addition, numerous countries, concerned about consumer privacy as well as the penetration of U.S. surveillance efforts in the political sphere, have accelerated localization initiatives, begun restricting U.S. companiesâ access to local markets, and introduced new privacy protectionsâwith implications for the future of Internet governance and U.S. economic growth. These effects raise attendant concerns about U.S. national security.
Congress has an opportunity to redress the current situation in at least three ways. First, and most importantly, reform of the Foreign Intelligence Surveillance Act would provide for greater restrictions on NSA surveillance. Second, new domestic legislation could extend better protections to consumer privacy. These shifts would allow U.S. industry legitimately to claim a change in circumstance, which would help them to gain competitive ground. Third, the integration of economic concerns at a programmatic level within the national security infrastructure would help to ensure that economic matters remain central to national security determinations in the future
Secure Cloud Storage with Client-Side Encryption Using a Trusted Execution Environment
With the evolution of computer systems, the amount of sensitive data to be
stored as well as the number of threats on these data grow up, making the data
confidentiality increasingly important to computer users. Currently, with
devices always connected to the Internet, the use of cloud data storage
services has become practical and common, allowing quick access to such data
wherever the user is. Such practicality brings with it a concern, precisely the
confidentiality of the data which is delivered to third parties for storage. In
the home environment, disk encryption tools have gained special attention from
users, being used on personal computers and also having native options in some
smartphone operating systems. The present work uses the data sealing, feature
provided by the Intel Software Guard Extensions (Intel SGX) technology, for
file encryption. A virtual file system is created in which applications can
store their data, keeping the security guarantees provided by the Intel SGX
technology, before send the data to a storage provider. This way, even if the
storage provider is compromised, the data are safe. To validate the proposal,
the Cryptomator software, which is a free client-side encryption tool for cloud
files, was integrated with an Intel SGX application (enclave) for data sealing.
The results demonstrate that the solution is feasible, in terms of performance
and security, and can be expanded and refined for practical use and integration
with cloud synchronization services
The Global Employer: Showcasing New Developments for Multinational Employers
Baker & McKenzieâs Global Employment Practice Group is pleased to present its 54th issue of The Global Employerâą entitled âShowcasing New Developments for Multinational Employers.â
This issue contains a collection of articles on legal developments from nine jurisdictions that examine changes to employment and labour laws and practices and explore developments in compensation and benefits.
Included, you will find information pertaining to a new collective redundancy procedure in France aimed at providing for a more secure labor market; new measures in Spain intended to promote employment among young people under 30; the codification of requirements for the negotiation of social plans in Switzerland; effects on UK redundancy laws in light of being found in breach of EU directives; emboldened labor agency agendas in the US; a discussion from Argentina on the rights of employees and employers when it comes to monitoring in the workplace; new developments for stock option plans in Brazil; changes to the calculation of payroll taxes in Colombia; and the promotion and protection of labor rights in Peru
"Internet universality": Human rights and principles for the internet
This paper details proposals by UNESCO to manufacture and draft a concept of âInternet Universalityâ that adopts a human-rights framework as a basis for articulating a set of principles and rights for the Internet. The paper discusses various drafts of this concept before examining the Charter of Human Rights and Principles for the Internet put forward by The Internet Rights & Principles Dynamic Coalition based at the UN Internet Governance Forum, and the working law Marco Civil da Internet introduced by Brazil
- âŠ