Nothing Special   »   [go: up one dir, main page]

Canedo et al., 2021 - Google Patents

Proposal of an Implementation Process for the Brazilian General Data Protection Law (LGPD).

Canedo et al., 2021

View PDF
Document ID
124771324506053888
Author
Canedo E
Cerqueira A
Gravina R
Ribeiro V
Camões R
dos Reis V
de Mendonça F
de Sousa Jr R
Publication year
Publication venue
ICEIS (1)

External Links

Snippet

The increasing number of online users yields to a correlated increase in the number of varied personal data collection devices. As a result, it became necessary to create and regulate new personal data policies which define the rights and duties of public and private …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/01Customer relationship, e.g. warranty
    • G06Q30/018Business or product certification or verification
    • G06Q30/0185Product, service or business identity fraud

Similar Documents

Publication Publication Date Title
Susanto et al. Information security management systems: a novel framework and software as a tool for compliance with information security standard
Ahmadian et al. Supporting privacy impact assessment by model-based privacy analysis
Canedo et al. Proposal of an Implementation Process for the Brazilian General Data Protection Law (LGPD).
Morali et al. Risk-based confidentiality requirements specification for outsourced it systems
Paquet Consumer security perceptions and the perceived influence on adopting cloud computing: A quantitative study using the technology acceptance model
Islam et al. Human factors in software security risk management
Chrun Model-based support for information technology security decision making
Shimels et al. Maturity of information systems' security in Ethiopian banks: case of selected private banks
Kolini et al. Exploring incentives and challenges for cybersecurity intelligence sharing (CIS) across organizations: A systematic review
Maingak et al. Information security assessment using ISO/IEC 27001: 2013 standard on government institution
Magura et al. A guiding framework for enhancing database security in state-owned universities in Zimbabwe
Machado de Sousa et al. Data Loss Prevention from a Malicious Insider
McLaurin A study on the efficacy of small business cybersecurity controls
Canedo et al. Evaluating and Evolving the Compliance to the Brazilian General Data Protection Law in a Federal Government Agency
Nikitin Achieving privacy and iso 27001 standard
Barbosa Privacy by evidence: a software development methodology to provide privacy assurance.
Almutiq An evaluation model for information security strategies in healthcare data systems.
Bridge A Quantitative Study of the Relationship of Data Quality Dimensions and User Satisfaction with Cyber Threat Intelligence
Wojcik Network cybersecurity indicators: Determining cybersecurity indicators that accurately reflect the state of cybersecurity of a network
Wafula Impact Assessment Methods for Risks in Data Privacy: a Case Study of Kenyan It-enabled Smes
Beugré Perceived behaviors and security compliance intention of employees processing big data: A correlational study
Ayugi Information Security Strategies and Patient Data Privacy Among Health Facilities in Nairobi
Rankin Federal Data Breach Prevention: A Phenomenological Study of Experts’ Strategies
Salnitri An Introduction to Privacy
Alexander Can the analytical hierarchy process model be effectively applied in the prioritization of information assurance defense in-depth measures?-a quantitative study