4
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Privacy and data protection: Legal aspects in the Republic of Macedonia

      1
      Academicus International Scientific Journal
      Academicus Journal

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          The purpose of this paper is to present a theoretical assessment of the existing Law on Personal Data Protection in the Republic of Macedonia. The paper aims to analyse whether there is a need for additional legal tools in order to achieve a balance between maintaining data integrity in the digital age and the use of modern technology. The paper discusses the meaning of “information privacy” in the age of big data, cyber threats and the domestic and international response to these issues. Special focus is dedicated to privacy policy enforcement in European Union Law. Having regard to the development of new technologies, prevailing data protection legislation may no longer be able to provide effective protection for individuals’ personal information. Therefore, existing laws should be continuously adapted to respond to new challenges and situations deriving from different online activities and communications.

          Related collections

          Most cited references5

          • Record: found
          • Abstract: not found
          • Article: not found

          The Right to Privacy

            Bookmark
            • Record: found
            • Abstract: found
            • Article: found
            Is Open Access

            New threats to health data privacy

            Background Along with the rapid digitalization of health data (e.g. Electronic Health Records), there is an increasing concern on maintaining data privacy while garnering the benefits, especially when the data are required to be published for secondary use. Most of the current research on protecting health data privacy is centered around data de-identification and data anonymization, which removes the identifiable information from the published health data to prevent an adversary from reasoning about the privacy of the patients. However, published health data is not the only source that the adversaries can count on: with a large amount of information that people voluntarily share on the Web, sophisticated attacks that join disparate information pieces from multiple sources against health data privacy become practical. Limited efforts have been devoted to studying these attacks yet. Results We study how patient privacy could be compromised with the help of today’s information technologies. In particular, we show that private healthcare information could be collected by aggregating and associating disparate pieces of information from multiple online data sources including online social networks, public records and search engine results. We demonstrate a real-world case study to show user identity and privacy are highly vulnerable to the attribution, inference and aggregation attacks. We also show that people are highly identifiable to adversaries even with inaccurate information pieces about the target, with real data analysis. Conclusion We claim that too much information has been made available electronic and available online that people are very vulnerable without effective privacy protection.
              Bookmark
              • Record: found
              • Abstract: found
              • Article: found
              Is Open Access

              Respect for privacy from the Strasbourg perspective

              Following a general overview of the EHCR case of law and some of its distinctive features, this article focuses on explaining the meaning of ‘privacy’, and guaranteed as a fundamental right in light of Article 8 of the European Convention for the Protection of Human Rights and Fundamental Freedoms, using as illustrations the verdicts of some cases judged by the institutions of Strasbourg. Certain paragraphs of the article address a series of issues, which according to the Court-referring to the images created by the Convention-cover a range , within which any individual may freely follow the development of their personality. The article also raises some questions, which the ECHR has often fully answered,or at least, indirectly implied. The author elaborates also on limits of privacy as foreseen by paragraph 2 of Article8, as well as on some obligations that the Convention assigns to its contracting State-Parties.
                Bookmark

                Author and article information

                Journal
                Academicus International Scientific Journal
                Academicus Journal
                20793715
                23091088
                July 2016
                July 2016
                : 14
                : 59-68
                Affiliations
                [1 ]Information Technology Law, Ss. Cyril and Methodius University, Skopje, North Macedonia
                Article
                10.7336/academicus.2016.14.04
                54bbfbfb-7443-48f5-b0c2-919cb8c99019
                © 2016

                https://creativecommons.org/licenses/by-nc-nd/4.0/

                History

                Comments

                Comment on this article