Data Protection Laws
Data protection, data privacy, and information privacy are all terms defined as the process of protecting important data/information from corruption, scam, fraud, loss, or compromise. This includes the relationship between the data collection and technology, the public perception and expectation of...
| Main Authors: | , , |
|---|---|
| Other Authors: | |
| Format: | Book Chapter |
| Language: | English English |
| Published: |
The Institution of Engineering and Technology (IET)
2019
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/26260/ http://umpir.ump.edu.my/id/eprint/26260/1/71.%20Data%20protection%20laws.pdf http://umpir.ump.edu.my/id/eprint/26260/12/Chapter%2012Data%20Protection%20Laws.pdf |
| _version_ | 1848822489612812288 |
|---|---|
| author | Alginahi, Hiba Alginahi, Yasser M. Kabir, M. Nomani |
| author2 | Yasser, M. Alginahi |
| author_facet | Yasser, M. Alginahi Alginahi, Hiba Alginahi, Yasser M. Kabir, M. Nomani |
| author_sort | Alginahi, Hiba |
| building | UMP Institutional Repository |
| collection | Online Access |
| description | Data protection, data privacy, and information privacy are all terms defined as the process of protecting important data/information from corruption, scam, fraud, loss, or compromise. This includes the relationship between the data collection and technology, the public perception and expectation of privacy, and the political as well as legal roots surrounding that data. Therefore, data protection laws aim to provide a balance between the individual’s privacy rights and the proper use of data. |
| first_indexed | 2025-11-15T02:42:03Z |
| format | Book Chapter |
| id | ump-26260 |
| institution | Universiti Malaysia Pahang |
| institution_category | Local University |
| language | English English |
| last_indexed | 2025-11-15T02:42:03Z |
| publishDate | 2019 |
| publisher | The Institution of Engineering and Technology (IET) |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | ump-262602020-02-20T09:10:38Z http://umpir.ump.edu.my/id/eprint/26260/ Data Protection Laws Alginahi, Hiba Alginahi, Yasser M. Kabir, M. Nomani QA76 Computer software Data protection, data privacy, and information privacy are all terms defined as the process of protecting important data/information from corruption, scam, fraud, loss, or compromise. This includes the relationship between the data collection and technology, the public perception and expectation of privacy, and the political as well as legal roots surrounding that data. Therefore, data protection laws aim to provide a balance between the individual’s privacy rights and the proper use of data. The Institution of Engineering and Technology (IET) Yasser, M. Alginahi Kabir, M. Nomani 2019 Book Chapter PeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/26260/1/71.%20Data%20protection%20laws.pdf pdf en http://umpir.ump.edu.my/id/eprint/26260/12/Chapter%2012Data%20Protection%20Laws.pdf Alginahi, Hiba and Alginahi, Yasser M. and Kabir, M. Nomani (2019) Data Protection Laws. In: Authentication Technologies for Cloud Computing, IoT and Big Data. The Institution of Engineering and Technology (IET), London, United Kingdom, pp. 309-337. ISBN 978-1-78561-557-3 http://doi.org/10.1049/PBSE009E http://doi.org/10.1049/PBSE009E |
| spellingShingle | QA76 Computer software Alginahi, Hiba Alginahi, Yasser M. Kabir, M. Nomani Data Protection Laws |
| title | Data Protection Laws |
| title_full | Data Protection Laws |
| title_fullStr | Data Protection Laws |
| title_full_unstemmed | Data Protection Laws |
| title_short | Data Protection Laws |
| title_sort | data protection laws |
| topic | QA76 Computer software |
| url | http://umpir.ump.edu.my/id/eprint/26260/ http://umpir.ump.edu.my/id/eprint/26260/ http://umpir.ump.edu.my/id/eprint/26260/ http://umpir.ump.edu.my/id/eprint/26260/1/71.%20Data%20protection%20laws.pdf http://umpir.ump.edu.my/id/eprint/26260/12/Chapter%2012Data%20Protection%20Laws.pdf |