Canedo et al., 2021 - Google Patents
Proposal of an Implementation Process for the Brazilian General Data Protection Law (LGPD).Canedo et al., 2021
View PDF- Document ID
- 124771324506053888
- Author
- Canedo E
- Cerqueira A
- Gravina R
- Ribeiro V
- Camões R
- dos Reis V
- de Mendonça F
- de Sousa Jr R
- Publication year
- Publication venue
- ICEIS (1)
External Links
Snippet
The increasing number of online users yields to a correlated increase in the number of varied personal data collection devices. As a result, it became necessary to create and regulate new personal data policies which define the rights and duties of public and private …
- 238000000034 method 0 title abstract description 85
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/01—Customer relationship, e.g. warranty
- G06Q30/018—Business or product certification or verification
- G06Q30/0185—Product, service or business identity fraud
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Susanto et al. | Information security management systems: a novel framework and software as a tool for compliance with information security standard | |
Ahmadian et al. | Supporting privacy impact assessment by model-based privacy analysis | |
Canedo et al. | Proposal of an Implementation Process for the Brazilian General Data Protection Law (LGPD). | |
Morali et al. | Risk-based confidentiality requirements specification for outsourced it systems | |
Paquet | Consumer security perceptions and the perceived influence on adopting cloud computing: A quantitative study using the technology acceptance model | |
Islam et al. | Human factors in software security risk management | |
Chrun | Model-based support for information technology security decision making | |
Shimels et al. | Maturity of information systems' security in Ethiopian banks: case of selected private banks | |
Kolini et al. | Exploring incentives and challenges for cybersecurity intelligence sharing (CIS) across organizations: A systematic review | |
Maingak et al. | Information security assessment using ISO/IEC 27001: 2013 standard on government institution | |
Magura et al. | A guiding framework for enhancing database security in state-owned universities in Zimbabwe | |
Machado de Sousa et al. | Data Loss Prevention from a Malicious Insider | |
McLaurin | A study on the efficacy of small business cybersecurity controls | |
Canedo et al. | Evaluating and Evolving the Compliance to the Brazilian General Data Protection Law in a Federal Government Agency | |
Nikitin | Achieving privacy and iso 27001 standard | |
Barbosa | Privacy by evidence: a software development methodology to provide privacy assurance. | |
Almutiq | An evaluation model for information security strategies in healthcare data systems. | |
Bridge | A Quantitative Study of the Relationship of Data Quality Dimensions and User Satisfaction with Cyber Threat Intelligence | |
Wojcik | Network cybersecurity indicators: Determining cybersecurity indicators that accurately reflect the state of cybersecurity of a network | |
Wafula | Impact Assessment Methods for Risks in Data Privacy: a Case Study of Kenyan It-enabled Smes | |
Beugré | Perceived behaviors and security compliance intention of employees processing big data: A correlational study | |
Ayugi | Information Security Strategies and Patient Data Privacy Among Health Facilities in Nairobi | |
Rankin | Federal Data Breach Prevention: A Phenomenological Study of Experts’ Strategies | |
Salnitri | An Introduction to Privacy | |
Alexander | Can the analytical hierarchy process model be effectively applied in the prioritization of information assurance defense in-depth measures?-a quantitative study |