Data Protection Laws
Data protection, data privacy, and information privacy are all terms defined as the process of protecting important data/information from corruption, scam, fraud, loss, or compromise. This includes the relationship between the data collection and technology, the public perception and expectation of...
Main Authors: | , , |
---|---|
Other Authors: | |
Format: | Book Section |
Language: | English English |
Published: |
The Institution of Engineering and Technology (IET)
2019
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/26260/ http://umpir.ump.edu.my/id/eprint/26260/ http://umpir.ump.edu.my/id/eprint/26260/ http://umpir.ump.edu.my/id/eprint/26260/1/71.%20Data%20protection%20laws.pdf http://umpir.ump.edu.my/id/eprint/26260/12/Chapter%2012Data%20Protection%20Laws.pdf |
id |
ump-26260 |
---|---|
recordtype |
eprints |
spelling |
ump-262602020-02-20T09:10:38Z http://umpir.ump.edu.my/id/eprint/26260/ Data Protection Laws Alginahi, Hiba Alginahi, Yasser M. Kabir, M. Nomani QA76 Computer software Data protection, data privacy, and information privacy are all terms defined as the process of protecting important data/information from corruption, scam, fraud, loss, or compromise. This includes the relationship between the data collection and technology, the public perception and expectation of privacy, and the political as well as legal roots surrounding that data. Therefore, data protection laws aim to provide a balance between the individual’s privacy rights and the proper use of data. The Institution of Engineering and Technology (IET) Yasser, M. Alginahi Kabir, M. Nomani 2019 Book Section PeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/26260/1/71.%20Data%20protection%20laws.pdf pdf en http://umpir.ump.edu.my/id/eprint/26260/12/Chapter%2012Data%20Protection%20Laws.pdf Alginahi, Hiba and Alginahi, Yasser M. and Kabir, M. Nomani (2019) Data Protection Laws. In: Authentication Technologies for Cloud Computing, IoT and Big Data. The Institution of Engineering and Technology (IET), London, United Kingdom, pp. 309-337. ISBN 978-1-78561-557-3 http://doi.org/10.1049/PBSE009E http://doi.org/10.1049/PBSE009E |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
Universiti Malaysia Pahang |
building |
UMP Institutional Repository |
collection |
Online Access |
language |
English English |
topic |
QA76 Computer software |
spellingShingle |
QA76 Computer software Alginahi, Hiba Alginahi, Yasser M. Kabir, M. Nomani Data Protection Laws |
description |
Data protection, data privacy, and information privacy are all terms defined as the process of protecting important data/information from corruption, scam, fraud, loss, or compromise. This includes the relationship between the data collection and technology, the public perception and expectation of privacy, and the political as well as legal roots surrounding that data. Therefore, data protection laws aim to provide a balance between the individual’s privacy rights and the proper use of data. |
author2 |
Yasser, M. Alginahi |
author_facet |
Yasser, M. Alginahi Alginahi, Hiba Alginahi, Yasser M. Kabir, M. Nomani |
format |
Book Section |
author |
Alginahi, Hiba Alginahi, Yasser M. Kabir, M. Nomani |
author_sort |
Alginahi, Hiba |
title |
Data Protection Laws |
title_short |
Data Protection Laws |
title_full |
Data Protection Laws |
title_fullStr |
Data Protection Laws |
title_full_unstemmed |
Data Protection Laws |
title_sort |
data protection laws |
publisher |
The Institution of Engineering and Technology (IET) |
publishDate |
2019 |
url |
http://umpir.ump.edu.my/id/eprint/26260/ http://umpir.ump.edu.my/id/eprint/26260/ http://umpir.ump.edu.my/id/eprint/26260/ http://umpir.ump.edu.my/id/eprint/26260/1/71.%20Data%20protection%20laws.pdf http://umpir.ump.edu.my/id/eprint/26260/12/Chapter%2012Data%20Protection%20Laws.pdf |
first_indexed |
2023-09-18T22:40:47Z |
last_indexed |
2023-09-18T22:40:47Z |
_version_ |
1777416900424237056 |