Atjaunināt sīkdatņu piekrišanu

E-grāmata: Cyber Security, Artificial Intelligence, Data Protection & the Law

  • Formāts: PDF+DRM
  • Izdošanas datums: 24-Aug-2021
  • Izdevniecība: Springer Verlag, Singapore
  • Valoda: eng
  • ISBN-13: 9789811616655
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 189,75 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Izdošanas datums: 24-Aug-2021
  • Izdevniecība: Springer Verlag, Singapore
  • Valoda: eng
  • ISBN-13: 9789811616655
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book provides a comparison and practical guide of the data protection laws of Canada, China (Hong Kong, Macau, Taiwan), Laos, Philippines, South Korea, United States and Vietnam. The book builds on the first book Data Protection Law. A Comparative Analysis of Asia-Pacific and European Approaches, Robert Walters, Leon Trakman, Bruno Zeller.





 





As the world comes to terms with Artificial Intelligence (AI), which now pervades the daily lives of everyone. For instance, our smart or Iphone, and smart home technology (robots, televisions, fridges and toys) access our personal data at an unprecedented level. Therefore, the security of that data is increasingly more vulnerable and can be compromised. This book examines the interface of cyber security, AI and data protection. It highlights and recommends that regulators and governments need to undertake wider research and law reform to ensure the most vulnerable in the community have their personal data protected adequately, while balancing the future benefits of the digital economy. 
Part I Cyber Security & Artificial Intelligence
1 Problem Definition, Structure and Methodology
3(1)
1.1 Introduction
4(6)
1.2 Structure and Methodology
10(4)
1.3 Limitation of this Research
14(1)
1.4
Chapters
15(4)
1.5 Conclusion
19(1)
References
20(1)
2 Cyber Security
21(18)
2.1 Introduction
22(3)
2.2 Interconnectedness of Cyber Security, Personal Data, and AI
25(2)
2.3 Security
27(6)
2.4 Cyber Security -- Theory
33(3)
2.5 Conclusion
36(1)
References
37(2)
3 Artificial Intelligence and Law
39(32)
3.1 Introduction
40(4)
3.2 Artificial Intelligence and Law
44(22)
3.2.1 Artificial Intelligence Facilitating Law
44(4)
3.2.2 Law to Regulate Artificial Intelligence
48(7)
3.2.3 Further Challenges for Law and Artificial Intelligence
55(11)
3.3 Conclusion
66(2)
References
68(3)
4 Data Protection
71(26)
4.1 Introduction
72(8)
4.2 Organisation for Economic Cooperation and Development
80(2)
4.3 Asia-Pacific Economic Cooperation
82(1)
4.4 Asia Pacific Privacy Authorities
83(1)
4.5 Association of South East Nations
84(2)
4.6 Internet Use
86(5)
4.7 Conclusion
91(2)
References
93(4)
Part II Data Protection Law -- Asia
5 South Korea
97(36)
5.1 Introduction
98(6)
5.2 Data Subject Rights
104(5)
5.2.1 Guarantee of Data Subject Rights
105(1)
5.2.2 Correction and Deletion of Personal Data
106(2)
5.2.3 Suspension of Personal Information
108(1)
5.2.4 Method of Exercising One's Rights
108(1)
5.3 Definition of Personal Information [ Data]
109(1)
5.4 Public and Private Application
109(1)
5.5 Data Protection Principles
110(1)
5.6 Processing of Personal Information and Consent
110(7)
5.6.1 Limitation to Processing
114(1)
5.6.2 Limitation to Processing [ Unique Identifier]
114(1)
5.6.3 Limitation on Visual Data Processing Devices
115(1)
5.6.4 Processing Limitation [ Consignment of Work]
116(1)
5.6.5 Limitation to Transfer Business Transfer
117(1)
5.6.6 Processor Oversight [ Supervision]
117(1)
5.7 Notification and Destruction
117(2)
5.8 Consent
119(2)
5.9 Privacy Officer and Disclosure
121(3)
5.10 Regulator [ Commission]
124(1)
5.11 Impact Assessment
124(1)
5.12 Notification
125(2)
5.13 Data Localisation
127(1)
5.14 Imposing a Penalty [ Fine] -- Damages
128(1)
5.15 Cyber Security
129(1)
5.16 Conclusion
130(2)
References
132(1)
6 Hong Kong
133(38)
6.1 Introduction
134(8)
6.2 Definition of Personal Data
142(1)
6.3 Public and Private
143(1)
6.4 Matching and Transfer of Personal Data
144(2)
6.5 Transfer
146(3)
6.5.1 Repeated Collections
147(2)
6.6 Erasing Personal Data [ Right to Be Forgotten]
149(2)
6.6.1 Log Book
151(1)
6.7 Controller [ Data User]
151(1)
6.8 Data User Returns and Register of Data Users
152(2)
6.9 Access and Correction of Personal Data
154(2)
6.10 Consent and Direct Marketing
156(5)
6.10.1 Consent
156(2)
6.10.2 Direct Marketing
158(3)
6.11 Privacy Commissioner
161(3)
6.11.1 Codes of Practice
162(1)
6.11.2 Advisory Committee
163(1)
6.11.3 Standing Committee
164(1)
6.12 Enforcement
164(2)
6.12.1 International Enforcement
166(1)
6.13 Security [ Cyber]
166(1)
6.14 Conclusion
167(2)
References
169(2)
7 Macau
171(26)
7.1 Introduction
172(3)
7.2 Application and Scope
175(1)
7.3 Denning Personal Data
176(1)
7.4 Data Subject -- Rights
177(6)
7.4.1 Right to Erasure
178(5)
7.5 Processing, Access and Quality of Personal Data
183(2)
7.6 Controller and Processor
185(2)
7.6.1 Notification
186(1)
7.7 Transnational Transfer of Personal Data
187(4)
7.8 Codes of Conduct
191(1)
7.9 Regulator
192(1)
7.10 Crimes [ Cyber Security]
193(2)
7.11 Conclusion
195(1)
References
196(1)
8 The Philippines
197(24)
8.1 Introduction
198(3)
8.2 Rights
201(4)
8.2.1 Right to Be Forgotten and Deletion
203(2)
8.3 Definition Personal Information
205(2)
8.4 Application
207(1)
8.5 Controller
208(1)
8.6 Processing and Consent
209(2)
8.7 Transferring Personal Information
211(1)
8.7.1 Extraterritorial Reach
211(1)
8.8 Commission
211(2)
8.9 Data Impact Assessments
213(2)
8.10 Enforcement
215(1)
8.11 Cyber Security
216(2)
8.12 Conclusion
218(2)
References
220(1)
9 Taiwan
221(28)
9.1 Introduction
222(6)
9.2 Data Protection Law
228(2)
9.3 Definition of Personal Data
230(1)
9.4 Rights of Data Subjects
231(1)
9.4.1 Right to Be Forgotten
231(1)
9.5 Public and Private -- Applicable
231(1)
9.6 Collection and Processing
232(5)
9.6.1 Government Agency
233(1)
9.6.2 Non-government Agency
234(1)
9.6.3 Cross-Border Transfer of Personal Data
235(2)
9.7 Consent
237(2)
9.7.1 Inform
238(1)
9.7.2 Replying to a Data Subject
239(1)
9.8 Accuracy
239(2)
9.8.1 Stolen Data
240(1)
9.9 Regulator
241(4)
9.9.1 Penalties
241(2)
9.9.2 Damages and Class Action
243(2)
9.9.3 Cyber Security
245(1)
9.10 Conclusion
245(2)
References
247(2)
10 Lao
249(12)
10.1 Introduction
250(3)
10.2 Prevention of Cybercrime
253(1)
10.3 Definition of Personal Data
253(1)
10.4 Regulator
254(2)
10.4.1 Criminal Offences and Penalties
256(1)
10.5 Electronic Data Protection
256(2)
10.6 Consent
258(1)
10.7 Conclusion
259(1)
References
260(1)
11 Vietnam
261(26)
11.1 Introduction
262(4)
11.2 E-Transaction Law
266(3)
11.2.1 Defining Data
266(1)
11.2.2 Application
267(1)
11.2.3 Principles
267(1)
11.2.4 Prohibited Activities
268(1)
11.2.5 Data Message
268(1)
11.3 2007 Law on Information Technology
269(4)
11.3.1 Definition of Personal Data
271(1)
11.3.2 Consent
271(1)
11.3.3 Children
272(1)
11.4 Law on Protection of Consumer Rights [ LPCR]
273(2)
11.5 Law on Network Information Security [ LNIS]
275(1)
11.6 Consent
276(2)
11.7 2018 Law on Cybersecurity [ LoC]
278(6)
11.8 Additional Law that Governs the Use of Personal Data
284(1)
11.9 Conclusion
285(1)
References
286(1)
12 China
287(34)
12.1 Introduction
288(9)
12.2 Principles of Personal Information Security
297(2)
12.3 Definition Personal Data
299(2)
12.4 Protections
301(1)
12.5 Consent
302(1)
12.6 Agency, Organisation & Controller - Responsibilities
303(3)
12.6.1 Security Impact Assessments
305(1)
12.6.2 Industry Regulation
305(1)
12.7 Children
306(2)
12.8 Emergency Response
308(1)
12.9 Breaching the Law
309(3)
12.9.1 Network Operators
309(1)
12.9.2 Information Infrastructure Operators
310(1)
12.9.3 General
311(1)
12.10 End of 2019
312(1)
12.11 Proposed 2020 Law Reform
313(2)
12.12 Conclusion
315(2)
References
317(4)
Part III Data Protection Law -- North America
13 Canada
321(36)
13.1 Introduction
322(5)
13.2 Definition -- Personal Information
327(5)
13.3 Rights [ Access]
332(4)
13.4 Personal Information -- Index
336(1)
13.5 Consent
336(8)
13.5.1 Disclosure
342(2)
13.6 Commissioner
344(5)
13.6.1 PIPEDA
344(4)
13.6.2 P.A
348(1)
13.7 Electronic Documents
349(1)
13.8 Offences of an Organisation
350(3)
13.8.1 Tort
351(2)
13.9 Conclusion
353(2)
References
355(2)
14 The United States
357(48)
14.1 Introduction
358(11)
14.2 The Federal Trade Commission Act
369(10)
14.3 Health Insurance Portability and Accountability Act
379(1)
14.4 Definition Personal Data
380(1)
14.5 Consent
381(2)
14.6 Collection, Correction, Disclosure, Access and Deletion
383(1)
14.7 Controller and Processors
383(1)
14.8 Commission
384(4)
14.8.1 International Effect
385(1)
14.8.2 Enforcement
386(1)
14.8.3 Do Not Call Registry
387(1)
14.9 States of California and New York
388(9)
14.9.1 California's New Privacy Laws---2020
388(7)
14.9.2 New York
395(2)
14.10 Bilateral---Multilateral Approach
397(1)
14.11 Smart Appliances
398(2)
14.12 A New Decade and Cyber Security
400(1)
14.13 Conclusion
401(2)
References
403(2)
15 Comparison, Challenges and a Way Forward
405(50)
15.1 Introduction
406(3)
15.2 Application to Public and Private Sectors
409(2)
15.3 Definition Personal Data -- Information
411(7)
15.4 Consent
418(5)
15.5 Data Localisation
423(1)
15.6 Right to be Forgotten, Correction and Deletion
424(9)
15.7 Data Transfers
433(3)
15.8 Challenges and a Way Forward
436(16)
15.9 Conclusion
452(2)
References
454(1)
Index 455
Robert Walters LLB (Victoria), MPPM (Monash), Ph.D Law (Victoria), Dr. Walters is an Adjunct Professor of Law, European Faculty of Law, New University, Slovenia, Europe, and admitted to Practice law in Australia. He is a member of ASEAN Law Association Singapore, Executive Committee Member United Nations Commission on International Trade Law Coordination Committee for Australia, Asian Privacy Scholars Network.  Dr Walters has chaired Government Appointed Advisory Committee and represented government departments to Government Law Reform Committees, in Australia.





 





Marko Novak, Vice-Dean and Professor, European Faculty of Law, The New University, Slovenia Europe. Mr Novak holds a LL. D. (Doctor of Law) from Ljubljana University Law School. LL.M. (Master of Law in Common Law Studies), Georgetown University Law Center in Washington, D.C., U.S.A. LL.B. (Bachelor of Law), Ljubljana University Law School.