Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
7 result(s) for "unlawful processing"
Sort by:
Processing Personal Data in the Context of AI Models: EDPB’s Opinion 28/2024
(Series Information) European Papers - A Journal on Law and Integration, 2024 9(3), 1497-1500 | European Forum Highlight of 27 February 2025 | (Abstract) This Highlight provides a concise overview of Opinion 28/2024 of the European Data Protection Board (EDPB), which outlines the EDPB’s position on the application of certain aspects of the General Data Protection Regulation (GDPR) to AI models. The Opinion constitutes a significant update on how to reconcile the protection of personal data under the GDPR with AI
The State of the Art Forensic Techniques in Mobile Cloud Environment: A Survey, Challenges and Current Trends
Smartphones have become popular in recent days due to the accessibility of a wide range of applications. These sophisticated applications demand more computing resources in a resource constraint smartphone. Cloud computing is the motivating factor for the progress of these applications. The emerging mobile cloud computing introduces a new architecture to offload smartphone and utilize cloud computing technology to solve resource requirements. The popularity of mobile cloud computing is an opportunity for misuse and unlawful activities. Therefore, it is a challenging platform for digital forensic investigations due to the non-availability of methodologies, tools and techniques. The aim of this work is to analyze the forensic tools and methodologies for crime investigation in a mobile cloud platform as it poses challenges in proving the evidence.
Investigations: understanding data privacy
Examines an often overlooked aspect of regulatory compliance in the transactional context, ie UK privacy laws. Looks at how they operate and reviews data privacy laws in the European Union: organisations, as \"data controllers\", have obligations to individuals as \"data subjects\", to disclose to them how data about them is being used. Discusses issues in compliance: notice and data disclosures, the legitimate grounds for data processing, data security, international data transfers, and registration of data processing activities. Concludes that data privacy, which was once thought a peripheral matter, now demands greater attention for all involved in prevention, detection and prosecution of financial crimes, as the performance of due diligence, construction of \"data rooms\" and other typical transactional tasks can all raise privacy issues.
EU investigates Facebook, Google tagging
European regulators are investigating photo and video tagging used by Facebook and on Google's YouTube for possible breach of data privacy laws. EU regulators argue that tagging without the consent of non-registered users violates European privacy laws. The inquiry, led by Swiss and German officials, also is looking into whether such action constitutes an unlawful processing or transfer of personal data under the EU Data Protection Directive. EU regulators are discussing whether social networking providers should be legally responsible for content posted by their members. Facebook and Google have said they will cooperate with EU regulators.
INTERNATIONAL CLAIMS LITIGATION II: A CASE STUDY ON THE UNCC
The UN Compensation Commission (UNCC) was formed in 1991 pursuant to Security Council Resolution 687, with a mandate to process claims and pay compensation for losses and damage suffered as a direct result of Iraq's unlawful invasion and occupation of Kuwait in 1990. The UNCC represents a new and important development of the international legal order that in many respects has worked extraordinarily well. Most of the first five years was spent concentrating on these humanitarian claims. This was partly because there was no real funds to operate beyond these categories. Until Iraq began oil sales in 1996, the UNCC used funds from voluntary member state contributions, the UN Working Capital Fund, and frozen proceeds of Iraqi oil sales. Funding for payment is important. It might benefit lawyers to establish a claims mechanism for mass claims -- it provides lots of work -- but what counts for the claimants is receiving payment on awards.
The dangers and limitations of mobile phone screening in asylum processes
Asylum seekers use mobile phones for various purposes, including staying connected with their loved ones, planning their journeys, navigating travel routes, and securing housing and jobs. However, the dependence on mobile technology has also made asylum seekers particularly vulnerable to government surveillance, as their devices hold information about their movements and activities. European authorities are increasingly using data from mobile phones to gather evidence that can be used in decisions over asylum claims and, in some countries, to collect intelligence on migration-related crime and terrorism. The practice of mobile phone screening has been severely criticized by civil society groups, including Gesellschaft für Freiheitsrechte and Privacy International. They argue that the practice is unlawful, invades privacy and lacks meaningful consent and safeguards to justify its necessity and proportionality. Moreover, the lack of transparency around data processing, the digital forensics software and the workings of algorithms used during the process could potentially undermine the fairness of the asylum procedure.