Data Protection Laws

Data protection, data privacy, and information privacy are all terms defined as the process of protecting important data/information from corruption, scam, fraud, loss, or compromise. This includes the relationship between the data collection and technology, the public perception and expectation of...

Full description

Saved in:
Bibliographic Details
Main Authors: Alginahi, Hiba, Alginahi, Yasser M., Kabir, M. Nomani
Other Authors: Yasser, M. Alginahi
Format: Book Section
Language:English
English
Published: The Institution of Engineering and Technology (IET) 2019
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/26260/1/71.%20Data%20protection%20laws.pdf
http://umpir.ump.edu.my/id/eprint/26260/12/Chapter%2012Data%20Protection%20Laws.pdf
http://umpir.ump.edu.my/id/eprint/26260/
http://doi.org/10.1049/PBSE009E
http://doi.org/10.1049/PBSE009E
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Malaysia Pahang
Language: English
English
id my.ump.umpir.26260
record_format eprints
spelling my.ump.umpir.262602020-02-20T09:10:38Z http://umpir.ump.edu.my/id/eprint/26260/ Data Protection Laws Alginahi, Hiba Alginahi, Yasser M. Kabir, M. Nomani QA76 Computer software Data protection, data privacy, and information privacy are all terms defined as the process of protecting important data/information from corruption, scam, fraud, loss, or compromise. This includes the relationship between the data collection and technology, the public perception and expectation of privacy, and the political as well as legal roots surrounding that data. Therefore, data protection laws aim to provide a balance between the individual’s privacy rights and the proper use of data. The Institution of Engineering and Technology (IET) Yasser, M. Alginahi Kabir, M. Nomani 2019 Book Section PeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/26260/1/71.%20Data%20protection%20laws.pdf pdf en http://umpir.ump.edu.my/id/eprint/26260/12/Chapter%2012Data%20Protection%20Laws.pdf Alginahi, Hiba and Alginahi, Yasser M. and Kabir, M. Nomani (2019) Data Protection Laws. In: Authentication Technologies for Cloud Computing, IoT and Big Data. The Institution of Engineering and Technology (IET), London, United Kingdom, pp. 309-337. ISBN 978-1-78561-557-3 http://doi.org/10.1049/PBSE009E http://doi.org/10.1049/PBSE009E
institution Universiti Malaysia Pahang
building UMP Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Pahang
content_source UMP Institutional Repository
url_provider http://umpir.ump.edu.my/
language English
English
topic QA76 Computer software
spellingShingle QA76 Computer software
Alginahi, Hiba
Alginahi, Yasser M.
Kabir, M. Nomani
Data Protection Laws
description Data protection, data privacy, and information privacy are all terms defined as the process of protecting important data/information from corruption, scam, fraud, loss, or compromise. This includes the relationship between the data collection and technology, the public perception and expectation of privacy, and the political as well as legal roots surrounding that data. Therefore, data protection laws aim to provide a balance between the individual’s privacy rights and the proper use of data.
author2 Yasser, M. Alginahi
author_facet Yasser, M. Alginahi
Alginahi, Hiba
Alginahi, Yasser M.
Kabir, M. Nomani
format Book Section
author Alginahi, Hiba
Alginahi, Yasser M.
Kabir, M. Nomani
author_sort Alginahi, Hiba
title Data Protection Laws
title_short Data Protection Laws
title_full Data Protection Laws
title_fullStr Data Protection Laws
title_full_unstemmed Data Protection Laws
title_sort data protection laws
publisher The Institution of Engineering and Technology (IET)
publishDate 2019
url http://umpir.ump.edu.my/id/eprint/26260/1/71.%20Data%20protection%20laws.pdf
http://umpir.ump.edu.my/id/eprint/26260/12/Chapter%2012Data%20Protection%20Laws.pdf
http://umpir.ump.edu.my/id/eprint/26260/
http://doi.org/10.1049/PBSE009E
http://doi.org/10.1049/PBSE009E
_version_ 1662754729865773056