COMPLIANCEdigital
  • Kontakt
  • |
  • Impressum
  • |
  • Datenschutz
  • |
  • AGB
  • |
  • Hilfe
Hilfe zur Suche
Ihr Warenkorb ist leer
Login | Registrieren
Sie sind Gast
  • Home
    • Nachrichten
    • Top Themen
    • Rechtsprechung
    • Neu auf
  • Inhalt
    • eJournals
    • eBooks
    • Rechtsprechung
    • Arbeitshilfen
  • Service
    • Infodienst
    • Kontakt
    • Stellenmarkt
    • Veranstaltungen
    • Literaturhinweise
    • Links
  • Bestellen
  • Über
    • Kurzporträt
    • Mediadaten
    • Benutzerhinweise

Suche verfeinern

Nutzen Sie die Filter, um Ihre Suchanfrage weiter zu verfeinern.

Ihre Auswahl

  • nach "2014"
    (Auswahl entfernen)

… nach Dokumenten-Typ

  • eBook-Kapitel (84)
  • eJournal-Artikel (79)
  • News (13)
Alle Filter entfernen

Am häufigsten gesucht

Praxis Unternehmen Ifrs Arbeitskreis Management Controlling Revision interne Corporate Prüfung Fraud deutschen deutsches Governance PS 980
Instagram LinkedIn X Xing YouTube

COMPLIANCEdigital

ist ein Angebot des

Erich Schmidt Verlag GmbH & Co. KG

Suchergebnisse

176 Treffer, Seite 1 von 18, sortieren nach: Relevanz Datum
  • Lean Six Sigma in IT Management

    …Lean Six Sigma in IT Management. Von Dr. Markus H. Dahm und Csaba Mohos, Erich Schmidt Verlag, Berlin 2013, 172 S., 29,95 Euro.Das englischsprachige…
  • Zusammenarbeit zwischen IT und Compliance verbessern

    …nachlesen.Hinweise, wie Sie wesentliche regulatorische Anforderungen an die IT identifizieren, priorisieren und deren Erfüllung einer effizienten Steuerung zuführen…
  • 10 Tipps für eine sichere und gesunde IT

  • eJournal-Artikel aus "PinG Privacy in Germany" Ausgabe 5/2014

    Aus Sicht der Stiftung Datenschutz – Privacy in the age of Big Data

    Frederick Richter
    …predicted that the worldwide amount of data would be 44 times larger in 2020 than it was in 2007. The report also forecasted that in 2012 and 2013 more… …digitized data were created than during the entire previous history of mankind. Whether this will prove true or not, it does give us an idea about the sheer… …Internet. Moreover, surveillance may have a ‘chilling effect’ on free speech, as it leads to individuals suspecting that a trace of everything said is kept… …identification to the point of temptations to discriminate against people. When it comes to law enforcement, Big Data applications open up entirely new methods of… …explains how it works: “If we see a large number of foreign phone cards and at the same time a large number of equally foreign transport vehicles, in an area… …as the predictions relate to the criminal act itself, as it allows law enforcement agencies to allocate resources more efficiently. When it comes to… …Big Data, however, the psychics will be replaced by algorithms. Big Data Kills Anonymity At least it has the potential. In the age of little data, it… …device has a specific energy loading pattern, it even can reveal involuntarily which application is used at any given time. If someone has access to this… …phone number, it will be very easy to guess how you spent last night, and with whom, what you had for dinner and which movie you watched. And if you had… …popcorn. Currently, it seems too early to assess or even fully understand possible threats Big Data poses to privacy. At the moment, most of them still seem…
    Alle Treffer im Inhalt anzeigen
  • eJournal-Artikel aus "PinG Privacy in Germany" Ausgabe 2/2014

    Contrasting Approaches to Data Protection in Ireland and Germany

    Philip Nolan, Oisin Tobin
    …in Ireland and Germany and highlights a number of differences between the regimes. First, it considers the requirements in relation to consent to data… …Irish rules on unsolicited direct marketing by email. Irish law does not adopt the “double opt-in” requirement, which sets it apart from its German… …permissible if the data subject has expressly consented to it in advance or if it is expressly permitted by the Federal Data Protection Act (the… …data processing in question is subject to the German Telemedia Act (the TMG). If consent is given alongside another declaration it must be… …German law it is regarded as one of a number of ways in which data processing may be legitimised. In contrast to German law, the DPA does not specify the… …form in which consent must be given. It need not be in writing, though, from an evidential perspective, it must be possible to prove that consent was… …For flexibility reasons, “written” consent has been kept out of the final text. It should be stressed that the Directive includes “any” indication of a… …12 or where it is necessary to protect legitimate interests of a data controller. 13 Like German law, Irish law distinguishes sensitive personal data… …from personal data and imposes special requirements in relation to it. 14 For this category of data, the DPA requires that explicit consent be provided… …Article 29 of Directive 95/46/EC. It is an independent European advisory body on data protection and privacy. Its tasks are set out in Article 30 of…
    Alle Treffer im Inhalt anzeigen
  • eJournal-Artikel aus "PinG Privacy in Germany" Ausgabe 5/2014

    The Right to be Forgotten in the post-Snowden era

    Paul Bernal
    …Paul Bernal is a lecturer in IT, IP and Media Law at the UEA Law School, and the author of Internet Privacy Rights – Rights to Protect Autonomy (CUP… …. Though the information revealed relates primarily to government surveillance, the ramifications are far wider and far greater than that. It is hard to find… …changes, and those changes have an impact. The right to be forgotten is one of those issues: it may seem to have nothing to do with government surveillance… …forgotten, how the right to be forgotten is being implemented, and how we might find an appropriate future for it. 1. Data Protection reform The right to be… …forgotten has been the subject of much discussion since it was first mooted as a key part of the reform of the European data protection regime. The progress… …early arguments about it have been extreme – including suggestions from American academics that the right to be forgotten ‘represents the biggest threat… …to free speech on the Internet in the coming decade’ 1 or describing it as ‘[m]ore crap from the EU’. 2 1 Rosen, Stanford Law Review Online, available… …its name, to include the word ‘erasure’, it is still a crucial part of the proposed reform. In May 2014 another critical event happened that has made… …, a form of the right to be forgotten already exists at least in relation to search engines. It is at least possible that the outcome of the case was… …influenced by the attitude of courts to privacy in the post-Snowden era. 3 Fleischer makes it clear that the blogs represent his own views, not those of Google…
    Alle Treffer im Inhalt anzeigen
  • eJournal-Artikel aus "PinG Privacy in Germany" Ausgabe 5/2014

    MAPPING (Managing Alternatives for Privacy, Property and Internet Governance)

    Extraordinary General Assembly – Rome, May 20–21, 2014 Conference Minutes
    Henning Hofmann
    …Seventh Framework Programme for a period of four years. It aims at bringing together professionals, academics and other stakeholders to address the issues… …presentations, workshops, panel discussions and last but not least networking opportunities. It was the first of its kind and in the words of Joseph Cannataci… …Cybercrime. It is noteworthy that these rights apply online as well as offline. 206 PinG 05.14 Hofmann MAPPING Lastly he informed the audience about the… …the discussion about the issue of mass surveillance and it is not farfetched to say that without the revelations of Edward Snowden there would be no… …issues such as atomic and also chemical weapons. He concluded that he would actually concur with Mr. Berners- Lee in saying “it is not naïve to think we… …can have that, it is however naïve to think we can just sit back and get it”. The presentation then moved away from the subject of international… …distinct and autonomous, it does not necessarily have to be private. Actually it could be just as public and just as accessible as other parts of the… …. Fragmentation, according to Mr. Cannataci, can solve some issues, like proper jurisdiction, but it will certainly not solve all issues. The academic disquisition… …presentation was titled “The evolution of Cybercrime and Surveillance Models”. For the last 500 years the world has been subject to an information boom. It was… …somewhat misleading as it does not only cover Internet crime but also includes technological crime, most noteworthy of which is corporate espionage…
    Alle Treffer im Inhalt anzeigen
  • eJournal-Artikel aus "PinG Privacy in Germany" Ausgabe 3/2014

    The Australian Privacy law Reform – what has changed?

    Dr. Jonas Kahl
    …. It is the result of a reform discussion started in 2004 and makes a number of significant changes to the former Privacy Act 1988 (Privacy Act)… …it was based on eleven so called “Information Privacy Principles” (IPPs). These were based again on OECD guidelines and set out standards relating 1… …is the ­Privacy Amendment (Enhancing Privacy Protection) Act 2012 (Privacy Amendment Act) which commenced in March 2014. It introduced many significant… …questions of direct marketing and exceptions for it. 1. Law governing the sending of ­information overseas is the most ­significant change APP 8 governs cases… …of sharing personal information with third parties outside Australia. It regulates the ‘cross-border disclosure of personal information’ and is… …information to an overseas recipient for example, where it shares the personal information with an overseas recipient; reveals the personal information at an… …publishes the personal information on the internet, whether intentionally or not, and it is accessible to an overseas recipient. Remarkably, only cases of… …disclosure are meant, not covered is the ‘using’. An APP entity would ‘use’ personal information where it handles, or undertakes an activity with the personal… …a contractor located overseas to perform services on its behalf, it would be a disclosure. That means nearly all cases of overseas outsourcing of… …‘reasonable steps’ the entity has to take are also described in the guidelines. So it is generally expected that an entity will enter into an enforceable…
    Alle Treffer im Inhalt anzeigen
  • eJournal-Artikel aus "PinG Privacy in Germany" Ausgabe 1/2014

    General Data Protection Regulation: A framework fit for the 21st Century?

    Jean Gonié
    …personal data management. As innovation increasingly depends on expanded uses of consumer data, it will be essential to unlock the value of this. The… …, directly undermines the development of cloud computing in Europe – with disproportionate effect on SMEs, who lead the way on many of such innovations. It is… …processing of data and what the requirements are. In light of the recent discussions in the EU Parliament over the Data Protection Regulation reform it is… …official “Microsoft’s position over the EU’s Proposed Data Protection Regulation”. Clear definitions It is essential in a cloud computing and Big Data era to… …authorities access to data regardless of contractual obligations to the controller. Microsoft has proposed that an organization should be a controller when it… …determines why personal data is processed (i. e. for what purposes) and a processor when it only determines how personal data is processed (i. e. the means and… …processor. In a cloud computing context, it is always important to recognize the possibility of standard contractual clauses between controllers and… …at the Carnegie Mellon University found that an average consumer would have to spend approximately 200 hours per year reading privacy notices. It is… …other legitimate basis laid down by law. Everyone has the right of access to data which has been collected concerning him or her, and the right to have it… …the same sanctions to deliberate, flagrant violations of the rules as it does to violations that are merely accidental. This means that a company that…
    Alle Treffer im Inhalt anzeigen
  • eJournal-Artikel aus "PinG Privacy in Germany" Ausgabe 3/2014

    Data protection professional certification in the age of big data

    Rita Di Antonio
    …regulated as such by EU legislation, but 2013 was the year that brought it to the forefront of the media and social debate. The “Snowden summer”, the… …2012-individuals.pdf. in the UK (88 % of the respondents being concerned about it), just after unemployment (89 %) and just before crime prevention (87 %). From tick-box… …term using clear and plain business language without legalese or IT lingo”. The role of professional certification – the IAPP experience A recent study… …protection professionals who deliver CIPP and CIPM training. “As the Chief Privacy Officer of an international operating group it is indispensable “As the… …regulations – the CIPM is the “how”: it demonstrates an understanding of privacy 4 https://www.privacyassociation.org/certification/… …European perspective embodied in the CIPP/E is even more relevant in light of the proposed EU data protection regulation: in the near future, it may become… …designing a new product, sales and marketing managers trying to sell it, or human resources professionals handling employee data. 7 A complete body of…
    Alle Treffer im Inhalt anzeigen
zurück 1 2 3 4 5 weiter ►
  • Kontakt
  • |
  • Impressum
  • |
  • Datenschutz
  • |
  • Cookie-Einstellung
  • |
  • AGB
  • |
  • Hilfe

Die Nutzung für das Text und Data Mining ist ausschließlich dem Erich Schmidt Verlag GmbH & Co. KG vorbehalten. Der Verlag untersagt eine Vervielfältigung gemäß §44b UrhG ausdrücklich.
The use for text and data mining is reserved exclusively for Erich Schmidt Verlag GmbH & Co. KG. The publisher expressly prohibits reproduction in accordance with Section 44b of the Copy Right Act.

© 2026 Erich Schmidt Verlag GmbH & Co. KG, Genthiner Straße 30 G, 10785 Berlin
Telefon: +49 30 25 00 85-0, Telefax: +49 30 25 00 85-305 E- Mail: ESV@ESVmedien.de
Erich Schmidt Verlag        Zeitschrift für Corporate Governance        Consultingbay        Zeitschrift Interne Revision        Risk, Fraud & Compliance

Wir verwenden Cookies.

Um Ihnen ein optimales Webseitenerlebnis zu bieten, verwenden wir Cookies. Mit dem Klick auf „Alle akzeptieren“ stimmen Sie der Verwendung von allen Cookies zu. Für detaillierte Informationen über die Nutzung und Verwaltung von Cookies klicken Sie bitte auf „Anpassen“. Mit dem Klick auf „Cookies ablehnen“ untersagen Sie die Verwendung von zustimmungspflichtigen Cookies. Sie haben die Möglichkeit, Ihre Einstellungen jederzeit individuell anzupassen. Weitere Informationen finden Sie in unserer Datenschutzerklärung.


Anpassen Cookies ablehnen Alle akzeptieren

Cookie-Einstellungen individuell konfigurieren

Bitte wählen Sie aus folgenden Optionen:




zurück