Works matching DE "GOVERNMENT policy on privacy"
Results: 68
Researchers wrestle with a privacy problem.
- Published in:
- Nature, 2015, v. 525, n. 7570, p. 440, doi. 10.1038/525440a
- By:
- Publication type:
- Article
‘The right to privacy and the future of mass surveillance’.
- Published in:
- International Journal of Human Rights, 2017, v. 21, n. 7, p. 773, doi. 10.1080/13642987.2017.1298091
- By:
- Publication type:
- Article
Possible problems with privacy laws.
- Published in:
- 2003
- By:
- Publication type:
- Editorial
A tutela dos direitos da personalidade no direito brasileiro em perspectiva atual.
- Published in:
- Revista Derecho del Estado, 2013, p. 93
- By:
- Publication type:
- Article
Privacy policies and national culture on the internet.
- Published in:
- Information Systems Frontiers, 2013, v. 15, n. 2, p. 279, doi. 10.1007/s10796-011-9336-7
- By:
- Publication type:
- Article
PRIVACY AND RIGHT TO KNOW THE TRUTH IN SLOVAKIA.
- Published in:
- European Review of Public Law, 2016, v. 28, n. 3, p. 949
- By:
- Publication type:
- Article
PRIVACY CONCERNS OVER EMPLOYER ACCESS TO EMPLOYEE SOCIAL MEDIA.
- Published in:
- Monash University Law Review, 2017, v. 43, n. 3, p. 796
- By:
- Publication type:
- Article
PAGING DR. GOOGLE: PERSONAL HEALTH RECORDS AND PATIENT PRIVACY.
- Published in:
- William & Mary Law Review, 2010, v. 51, n. 6, p. 2243
- By:
- Publication type:
- Article
Privacy and the Integrity of Liberal Politics: The Case of Governmental Internet Searches.
- Published in:
- Journal of Social Philosophy, 2014, v. 45, n. 3, p. 369, doi. 10.1111/josp.12068
- By:
- Publication type:
- Article
Bad News for Bloggers.
- Published in:
- 2009
- By:
- Publication type:
- Opinion
Policy Legitimacy, Rhetorical Politics, and the Evaluation of City-Street Video Surveillance Monitoring Programs in Canada.
- Published in:
- Canadian Review of Sociology, 2012, v. 49, n. 4, p. 328, doi. 10.1111/j.1755-618X.2012.01298.x
- By:
- Publication type:
- Article
How Safe are Safe Harbors? The Difficulties of Self-Regulatory Children's Online Privacy Protection Act Programs.
- Published in:
- 2015
- By:
- Publication type:
- Opinion
THE DEATH OF THE PRIVACY POLICY?: EFFECTIVE PRIVACY DISCLOSURES AFTER IN RE SEARS.
- Published in:
- Berkeley Technology Law Journal, 2010, v. 25, n. 1, p. 671
- By:
- Publication type:
- Article
Toward a Legal Perspective on Crisis Information Management: Legal Values and Privacy-Sensitive Information at Odds?
- Published in:
- Journal of Homeland Security & Emergency Management, 2017, v. 14, n. 1, p. -1, doi. 10.1515/jhsem-2016-0060
- By:
- Publication type:
- Article
Privacy bill under fire from researchers.
- Published in:
- Nature, 1998, v. 392, n. 6671, p. 6, doi. 10.1038/32004
- By:
- Publication type:
- Article
The Economics of Privacy.
- Published in:
- Journal of Economic Literature, 2016, v. 54, n. 2, p. 442, doi. 10.1257/jel.54.2.442
- By:
- Publication type:
- Article
Technology-Driven Change and Public Administration: Establishing Essential Normative Principles.
- Published in:
- International Journal of Public Administration, 2007, v. 30, n. 3, p. 289, doi. 10.1080/01900690601117770
- By:
- Publication type:
- Article
Rethinking the Call for a US National Data Center in the 1960s: Privacy, Social Science Research and Data Fragmentation Viewed from the Perspective of Contemporary Archival Theory.
- Published in:
- Information & Culture, 2018, v. 53, n. 2, p. 203, doi. 10.7560/IC53204
- By:
- Publication type:
- Article
First Bellwether Test On NSA Snooping Set For August 5<sup>th</sup> in Missouri.
- Published in:
- Conflict Resolution & Negotiation Journal, 2014, v. 2014, n. 2, p. 110
- By:
- Publication type:
- Article
A comprehensive keyword analysis of online privacy policies.
- Published in:
- Information Security Journal: A Global Perspective, 2018, v. 27, n. 5/6, p. 260, doi. 10.1080/19393555.2019.1606368
- By:
- Publication type:
- Article
IOS FEAR THE GOVERNMENT: CLOSING THE BACK DOOR ON GOVERNMENTAL ACCESS.
- Published in:
- University of Toledo Law Review, 2017, v. 49, n. 1, p. 179
- By:
- Publication type:
- Article
Privacy-Privacy Tradeoffs.
- Published in:
- 2016
- By:
- Publication type:
- Essay
WHEN THE DEFAULT IS NO PENALTY: NEGOTIATING PRIVACY AT THE NTIA.
- Published in:
- Denver Law Review, 2016, v. 93, n. 4, p. 925
- By:
- Publication type:
- Article
The Right to Privacy: An Emerging Right in Chinese Law.
- Published in:
- Statute Law Review, 1997, v. 18, n. 3, p. 208, doi. 10.1093/slr/18.3.208
- By:
- Publication type:
- Article
REASONABLENESS AS PROPORTIONALITY: TOWARDS A BETTER CONSTRUCTIVE INTERPRETATION OF THE LAW ON SEARCHING COMPUTERS IN CANADA.
- Published in:
- Appeal: Review of Current Law & Law Reform, 2016, v. 21, p. 59
- By:
- Publication type:
- Article
A (Legal) Challenge to Privacy: On the Implementation of Smart Meters in the EU and the US.
- Published in:
- Renewable Energy Law & Policy Review (Claeys & Casteels BV), 2017, v. 8, n. 1, p. 19, doi. 10.4337/relp.2017.01.02
- By:
- Publication type:
- Article
Juvenile offenders in Vietnam and the right to defence.
- Published in:
- Youth Justice, 2016, v. 16, n. 1, p. 49, doi. 10.1177/1473225415587737
- By:
- Publication type:
- Article
govtech.com/extra.
- Published in:
- Government Technology, 2017, v. 30, n. 3, p. 8
- Publication type:
- Article
Employee drug testing: Are cities complying with the courts?
- Published in:
- Public Administration Review, 1996, v. 56, n. 1, p. 30, doi. 10.2307/3110051
- By:
- Publication type:
- Article
Digital privacy: theory, policies and technologies.
- Published in:
- 2011
- By:
- Publication type:
- Editorial
Commitment analysis to operationalize software requirements from privacy policies.
- Published in:
- Requirements Engineering, 2011, v. 16, n. 1, p. 33, doi. 10.1007/s00766-010-0108-6
- By:
- Publication type:
- Article
Corporate Privacy Policy Changes during PRISM and the Rise of Surveillance Capitalism.
- Published in:
- Media & Communication, 2017, v. 5, n. 1, p. 63, doi. 10.17645/mac.v5i1.813
- By:
- Publication type:
- Article
Opposition to law officers having unfettered access to medical records.
- Published in:
- JAMA: Journal of the American Medical Association, 1998, v. 279, n. 4, p. 257, doi. 10.1001/jama.279.4.257
- By:
- Publication type:
- Article
Increasing use of computerized recordkeeping leads to legislative proposals for medical privacy.
- Published in:
- JAMA: Journal of the American Medical Association, 1996, v. 276, n. 4, p. 270, doi. 10.1001/jama.1996.03540040014007
- By:
- Publication type:
- Article
Workplace privacy and the fourth amendment: An end to reasonable expectations?
- Published in:
- American Business Law Journal, 1992, v. 29, n. 4, p. 626, doi. 10.1111/j.1744-1714.1991.tb01527.x
- By:
- Publication type:
- Article
Exploring reidentification risk.
- Published in:
- International Journal of Market Research, 2016, v. 58, n. 1, p. 19, doi. 10.2501/IJMR-2016-004
- By:
- Publication type:
- Article
Privacy in the Shadow of Nanotechnology.
- Published in:
- NanoEthics, 2007, v. 1, n. 3, p. 211, doi. 10.1007/s11569-007-0023-6
- By:
- Publication type:
- Article
Disclosure Intention of Location-Related Information in Location-Based Social Network Services.
- Published in:
- International Journal of Electronic Commerce, 2012, v. 16, n. 4, p. 53, doi. 10.2753/JEC1086-4415160403
- By:
- Publication type:
- Article
Whither Privacy?
- Published in:
- Surveillance & Society, 2012, v. 10, n. 3/4, p. 344, doi. 10.24908/ss.v10i3/4.4528
- By:
- Publication type:
- Article
Privacy in the workplace: Organizations must find ways to accommodate employees' personal technology use while also meeting regulatory and other requirements.
- Published in:
- Internal Auditor, 2016, v. 73, n. 5, p. 42
- By:
- Publication type:
- Article
A Variable Weight Privacy-Preserving Algorithm for the Mobile Crowd Sensing Network.
- Published in:
- Journal of Electrical & Computer Engineering, 2017, p. 1, doi. 10.1155/2017/3053202
- By:
- Publication type:
- Article
WHY THE FEDERAL GOVERNMENT SHOULD HAVE A PRIVACY POLICY OFFICE.
- Published in:
- Journal on Telecommunications & High Technology Law, 2012, v. 10, n. 1, p. 41
- By:
- Publication type:
- Article
The Commission Proposal for a Regulation on ePrivacy: Why Do We Need a Regulation Dedicated to ePrivacy in the European Union?
- Published in:
- European Data Protection Law Review (EDPL), 2017, v. 3, n. 2, p. 155, doi. 10.21552/edpl/2017/2/5
- By:
- Publication type:
- Article
e-Privacy Regulation: Good Intentions but a Lot of Work to Do.
- Published in:
- European Data Protection Law Review (EDPL), 2017, v. 3, n. 2, p. 152, doi. 10.21552/edpl/2017/2/4
- By:
- Publication type:
- Article
Editorial.
- Published in:
- European Data Protection Law Review (EDPL), 2017, v. 3, n. 2, p. 147, doi. 10.21552/edpl/2017/2/3
- By:
- Publication type:
- Article
Privacy policies, cross-border health data and the GDPR.
- Published in:
- Information & Communications Technology Law, 2019, v. 28, n. 3, p. 261, doi. 10.1080/13600834.2019.1644068
- By:
- Publication type:
- Article
Unmanned Aircraft, Privacy, and the 4th Amendment.
- Published in:
- American Intelligence Journal, 2015, v. 32, n. 1, p. 160
- By:
- Publication type:
- Article
The Dysregulation of Human Subjects Research.
- Published in:
- 2007
- By:
- Publication type:
- Editorial
CARPE DIEM: PRIVACY PROTECTION IN EMPLOYMENT ACT.
- Published in:
- Akron Law Review, 2010, v. 43, n. 2, p. 331
- By:
- Publication type:
- Article
OPEN DATA, GREY DATA, AND STEWARDSHIP: UNIVERSITIES AT THE PRIVACY FRONTIER.
- Published in:
- Berkeley Technology Law Journal, 2018, v. 33, n. 2, p. 365, doi. 10.15779/Z38B56D489
- By:
- Publication type:
- Article