11 research outputs found

    The data privacy matrix project: towards a global alignment of data privacy laws

    Get PDF
    Data privacy is an expected right of most citizens around the world but there are many legislative challenges within a boundary-less cloud computing and World Wide Web environment. Despite its importance, there is limited research around data privacy law gaps and alignment, and the legal side of the security ecosystem which seems to be in a constant effort to catch-up. There are already issues within recent history which show a lack of alignment causing a great deal of confusion, an example of this is the 'right to be forgotten' case which came up in 2014. This case involved a Spanish man against Google Spain. He requested the removal of a link to an article about an auction for his foreclosed home, for a debt that he had subsequently paid. However, misalignment of data privacy laws caused further complications to the case. This paper introduces the Waikato Data Privacy Matrix, our global project for alignment of data privacy laws by focusing on Asia Pacific data privacy laws and their relationships with the European Union and the USA. This will also suggest potential solutions to address some of the issues which may occur when a breach of data privacy occurs, in order to ensure an individual has their data privacy protected across the boundaries in the Web. With the increase in data processing and storage across different jurisdictions and regions (e.g. public cloud computing), the Waikato Data Privacy Matrix empowers businesses using or providing cloud services to understand the different data privacy requirements across the globe, paving the way for increased cloud adoption and usage

    The Waikato Data Privacy Matrix

    Get PDF
    Data privacy is an expected right of most citizens around the world, but there are many legislative challenges within boundary-less cloud computing and World Wide Web environments. Despite its importance, there is limited research around data privacy law gaps and alignment; the legal side of the security ecosystem seems to be in a constant effort to catch-up. There are recent issues showing a lack of alignment that caused some confusion. An example of this is the `right to be forgotten' case in 2014 that involved a Spanish man and Google Spain. He requested the removal of a link to an article about an auction of his foreclosed home, for a debt that he had subsequently paid. However, misalignment of data privacy laws caused further complications to the case. This thesis introduces the Waikato Data Privacy Matrix, our global project for alignment of data privacy laws, by focusing on Asia Pacific data privacy laws and its relationships with the European Union and the United States. While much alignment work is already done for the European Union and United States, there is a lack of research on Asia Pacific alignment within its region and across other regions. The Waikato Data Privacy Matrix also suggests potential solutions to address some of the issues that may occur when a breach of data privacy occurs, in order to ensure an individual has their data privacy protected across the boundaries within the Web. With the increase in data processing and storage across different jurisdictions and regions (e.g. cloud computing services with servers in several countries), the Waikato Data Privacy Matrix empowers businesses using or providing cloud services to understand the different data privacy requirements across the globe - paving the way for increased cloud adoption and usage

    The Waikato Data Privacy Matrix

    No full text

    Towards one global privacy law

    Get PDF
    A unified, global data privacy framework is becoming essential for the unhindered development of business across borders. For researchers at the Data Privacy Foundation in New Zealand, this can only be achieved in Asia via a bottom-up approach

    Returning control of data to users with a personal information crunch - a position paper

    No full text
    With the data universe expanding to uncontrollable limits, we are losing control of our personal information. From online purchases to movie streaming, we are giving vendors more and more information, such that our privacy is at stake. Hackers and third-parties can gain access to this information, putting us at risk to a number of attacks. The current model where every online vendor has personal information, such as name, addresses and date of birth should be reconsidered. A user needs to have full or at least more control over their personal data, and who has access to it. This paper presents alternatives to vendors having all of a users personal information and raises many concerns about the current state of play. A simple model is proposed where personal information is stored on the users mobile device, and requested by vendors when needed. Information can then be given in either a private or trusted manor, and encrypted responses can be cached by a relay service. Vendors should only use the data inflight, and never store personal information. This provides the user with data provenance and access control, while providing the vendor with accountability and enhanced security

    Iron isotopic evolution during fractional crystallization of the uppermost Bushveld Complex layered mafic intrusion

    Full text link
    We present Ī“56Fe (56Fe/54Fe relative to standard IRMMā€014) data from whole rock and magnetite of the Upper and Upper Main Zones (UUMZ) of the Bushveld Complex. With it, we assess the role of fractional crystallization in controlling the Fe isotopic evolution of a mafic magma. The UUMZ evolved by fractional crystallization of a dry tholeiitic magma to produce gabbros and diorites with cumulus magnetite and fayalitic olivine. Despite previous experimental work indicating a potential for magnetite crystallization to drastically change magma Ī“56Fe, we observe no change in whole rock Ī“56Fe above and below magnetite saturation. We also observe no systematic change in whole rock Ī“56Fe with increasing stratigraphic height, and only a small variation in Ī“56Fe in magnetite separates above magnetite saturation. Whole rock Ī“56Fe (errors twice standard deviation, Ā±2Ļƒ) throughout the UUMZ ranges from āˆ’0.01 Ā±0.03ā€° to 0.21 Ā±0.09ā€° (Ī“56FeaverageWRā€‰=ā€‰0.10 Ā±0.09ā€°; nā€‰=ā€‰21, isotopically light outlier: Ī“56FeWRā€‰=ā€‰āˆ’0.15ā€°), and magnetites range from 0.28 Ā±0.04ā€° to 0.86 Ā±0.07ā€° (Ī“56FeaverageMgtā€‰=ā€‰0.50 Ā±0.15ā€°; nā€‰=ā€‰20), similar to values previously reported for other layered intrusions. We compare our measured Ī“56FeWR to a model that incorporates the changing normative mineralogy, calculated temperatures, and published fractionation factors of Feā€bearing phases throughout the UUMZ and produces Ī“56FeWR values that evolve only in response to fractional crystallization. Our results show that the Fe isotopic composition of a multiply saturated (multiple phases on the liquidus) magma is unlikely to change significantly during fractional crystallization of magnetite due to the competing fractionation of other Feā€bearing cumulus phases.Key PointsWhole rock and magnetite separates from the uppermost portion of the Bushveld Complex were analyzed for their Fe isotope compositionsWe find no systematic variation in whole rock or magnetite Fe isotope ratios with stratigraphic height85% crystallization of a dry tholeiitic multiplyā€saturated magma does not significantly fractionate Fe isotopesPeer Reviewedhttps://deepblue.lib.umich.edu/bitstream/2027.42/136675/1/ggge21257_am.pdfhttps://deepblue.lib.umich.edu/bitstream/2027.42/136675/2/ggge21257.pd
    corecore