Autor: |
Lloret Mauri, Jaime, Martínez Nohalés, Javier, Boronat Seguí, Fernando |
Jazyk: |
angličtina |
Rok vydání: |
2003 |
Předmět: |
|
Zdroj: |
Lloret Mauri, Jaime and Martínez Nohalés, Javier and Boronat Seguí, Fernando La protección de datos en terminales y ordenadores de uso público., 2003 . In Contenidos y Aspectos Legales en la Sociedad de la Información (CALSI), Valencia (Spain), 23-24 October 2003. [Conference paper] |
Druh dokumentu: |
Conference paper |
Popis: |
In this work it is carried out an analysis, search of solutions and later use to introduce a security policy to guarantee users data protection in public terminals or computers with Internet connection. As an example of these there are, terminals placed in universities, cybercafes, Internet access in libraries, free access classrooms in universities, etc., some of them are very extended in Europe. To carry out this investigation, the directives 95/46/CE and 2002/58/EC of European Parliament and of the Council and the Organic Laws 10/1995 and 15/1999 of the Spanish Penal Code have been studied. This kind of environments does not have an explicit legislation with its all characteristics that assures the users privacy. For this development the inconveniences in a transmission medium has been analysed due to the unprotected users data circulation in the local network medium. Subsequently, a study of the deficiencies in the initial configuration in some terminals or computers operating systems, according to the request of being used by multiple users has been carried out. Likewise, the administrator configurations in this kind of environments have also been studied in order to develop some proposals and recommendations, in data privacy and protection. These proposals and recommendations should be adopted in organisms or companies with public terminals or computers to avoid harming this privacy, without the proprietor's consent. It is examined the directives 95/46/CE and 2002/58/CE of the European Parliament and of the Council, taking care of its repercussion in these kind of insecurities. Later, several implanted security policies are exposed to offer different adopted solutions. All of these solutions should be accomplished in every system independently of the hardware, the operating system or the used applications. Finally, it is elaborated some conclusions to indicate the necessity of a directive and laws to regulate the personal data protection in these environments. |
Databáze: |
E-LIS (Eprints in Library & Information Science) |
Externí odkaz: |
|