11 research outputs found
The data privacy matrix project: towards a global alignment of data privacy laws
Data privacy is an expected right of most citizens around the world but there are many legislative challenges within a boundary-less cloud computing and World Wide Web environment. Despite its importance, there is limited research around data privacy law gaps and alignment, and the legal side of the security ecosystem which seems to be in a constant effort to catch-up. There are already issues within recent history which show a lack of alignment causing a great deal of confusion, an example of this is the 'right to be forgotten' case which came up in 2014. This case involved a Spanish man against Google Spain. He requested the removal of a link to an article about an auction for his foreclosed home, for a debt that he had subsequently paid. However, misalignment of data privacy laws caused further complications to the case. This paper introduces the Waikato Data Privacy Matrix, our global project for alignment of data privacy laws by focusing on Asia Pacific data privacy laws and their relationships with the European Union and the USA. This will also suggest potential solutions to address some of the issues which may occur when a breach of data privacy occurs, in order to ensure an individual has their data privacy protected across the boundaries in the Web. With the increase in data processing and storage across different jurisdictions and regions (e.g. public cloud computing), the Waikato Data Privacy Matrix empowers businesses using or providing cloud services to understand the different data privacy requirements across the globe, paving the way for increased cloud adoption and usage
Recommended from our members
Historical volcanism and the state of stress in the East African Rift System
Crustal extension at the East African Rift System (EARS) should, as a tectonic ideal, involve a stress field in which the direction of minimum horizontal stress is perpendicular to the rift. A volcano in such a setting should produce dykes and fissures parallel to the rift. How closely do the volcanoes of the EARS follow this? We answer this question by studying the 21 volcanoes that have erupted historically (since about 1800) and find that 7 match the (approximate) geometrical ideal. At the other 14 volcanoes the orientation of the eruptive fissures/dykes and/or the axes of the host rift segments are oblique to the ideal values. To explain the eruptions at these volcanoes we invoke local (non-plate tectonic) variations of the stress field caused by: crustal heterogeneities and anisotropies (dominated by NW structures in the Protoerozoic basement), transfer zone tectonics at the ends of offset rift segments, gravitational loading by the volcanic edifice (typically those with 1-2 km relief) and magmatic pressure in central reservoirs. We find that the more oblique volcanoes tend to have large edifices, large eruptive volumes and evolved and mixed magmas capable of explosive behaviour. Nine of the volcanoes have calderas of varying ellipticity, 6 of which are large, reservoir-collapse types mainly elongated across rift (e.g. Kone) and 3 are smaller, elongated parallel to the rift and contain active lava lakes (e.g. Erta Ale), suggesting different mechanisms of formation and stress fields. Nyamuragira is the only EARS volcano with enough sufficiently well-documented eruptions to infer its long-term dynamic behaviour. Eruptions within 7 km of the volcano are of relatively short duration (<100 days), but eruptions with more distal fissures tend to have lesser obliquity and longer durations, indicating a changing stress field away from the volcano. There were major changes in long-term magma extrusion rates in 1977 (and perhaps in 2002) due to major along-rift dyking events that effectively changed the Nyamuragira stress field and the intrusion/extrusion ratios of eruptions
The Waikato Data Privacy Matrix
Data privacy is an expected right of most citizens around the world, but there are many legislative challenges within boundary-less cloud computing and World Wide Web environments. Despite its importance, there is limited research around data privacy law gaps and alignment; the legal side of the security ecosystem seems to be in a constant effort to catch-up. There are recent issues showing a lack of alignment that caused some confusion. An example of this is the `right to be forgotten' case in 2014 that involved a Spanish man and Google Spain. He requested the removal of a link to an article about an auction of his foreclosed home, for a debt that he had subsequently paid. However, misalignment of data privacy laws caused further complications to the case.
This thesis introduces the Waikato Data Privacy Matrix, our global project for alignment of data privacy laws, by focusing on Asia Pacific data privacy laws and its relationships with the European Union and the United States. While much alignment work is already done for the European Union and United States, there is a lack of research on Asia Pacific alignment within its region and across other regions. The Waikato Data Privacy Matrix also suggests potential solutions to address some of the issues that may occur when a breach of data privacy occurs, in order to ensure an individual has their data privacy protected across the boundaries within the Web. With the increase in data processing and storage across different jurisdictions and regions (e.g. cloud computing services with servers in several countries), the Waikato Data Privacy Matrix empowers businesses using or providing cloud services to understand the different data privacy requirements across the globe - paving the way for increased cloud adoption and usage
Towards one global privacy law
A unified, global data privacy framework is becoming essential for the unhindered development of business across borders. For researchers at the Data Privacy Foundation in New Zealand, this can only be achieved in Asia via a bottom-up approach
Returning control of data to users with a personal information crunch - a position paper
With the data universe expanding to uncontrollable limits, we are losing control of our personal information. From online purchases to movie streaming, we are giving vendors more and more information, such that our privacy is at stake. Hackers and third-parties can gain access to this information, putting us at risk to a number of attacks. The current model where every online vendor has personal information, such as name, addresses and date of birth should be reconsidered. A user needs to have full or at least more control over their personal data, and who has access to it. This paper presents alternatives to vendors having all of a users personal information and raises many concerns about the current state of play. A simple model is proposed where personal information is stored on the users mobile device, and requested by vendors when needed. Information can then be given in either a private or trusted manor, and encrypted responses can be cached by a relay service. Vendors should only use the data inflight, and never store personal information. This provides the user with data provenance and access control, while providing the vendor with accountability and enhanced security
Iron isotopic evolution during fractional crystallization of the uppermost Bushveld Complex layered mafic intrusion
We present Ī“56Fe (56Fe/54Fe relative to standard IRMMā014) data from whole rock and magnetite of the Upper and Upper Main Zones (UUMZ) of the Bushveld Complex. With it, we assess the role of fractional crystallization in controlling the Fe isotopic evolution of a mafic magma. The UUMZ evolved by fractional crystallization of a dry tholeiitic magma to produce gabbros and diorites with cumulus magnetite and fayalitic olivine. Despite previous experimental work indicating a potential for magnetite crystallization to drastically change magma Ī“56Fe, we observe no change in whole rock Ī“56Fe above and below magnetite saturation. We also observe no systematic change in whole rock Ī“56Fe with increasing stratigraphic height, and only a small variation in Ī“56Fe in magnetite separates above magnetite saturation. Whole rock Ī“56Fe (errors twice standard deviation, Ā±2Ļ) throughout the UUMZ ranges from ā0.01 Ā±0.03ā° to 0.21 Ā±0.09ā° (Ī“56FeaverageWRā=ā0.10 Ā±0.09ā°; nā=ā21, isotopically light outlier: Ī“56FeWRā=āā0.15ā°), and magnetites range from 0.28 Ā±0.04ā° to 0.86 Ā±0.07ā° (Ī“56FeaverageMgtā=ā0.50 Ā±0.15ā°; nā=ā20), similar to values previously reported for other layered intrusions. We compare our measured Ī“56FeWR to a model that incorporates the changing normative mineralogy, calculated temperatures, and published fractionation factors of Feābearing phases throughout the UUMZ and produces Ī“56FeWR values that evolve only in response to fractional crystallization. Our results show that the Fe isotopic composition of a multiply saturated (multiple phases on the liquidus) magma is unlikely to change significantly during fractional crystallization of magnetite due to the competing fractionation of other Feābearing cumulus phases.Key PointsWhole rock and magnetite separates from the uppermost portion of the Bushveld Complex were analyzed for their Fe isotope compositionsWe find no systematic variation in whole rock or magnetite Fe isotope ratios with stratigraphic height85% crystallization of a dry tholeiitic multiplyāsaturated magma does not significantly fractionate Fe isotopesPeer Reviewedhttps://deepblue.lib.umich.edu/bitstream/2027.42/136675/1/ggge21257_am.pdfhttps://deepblue.lib.umich.edu/bitstream/2027.42/136675/2/ggge21257.pd