National Repository of Grey Literature 41 records found  beginprevious21 - 30nextend  jump to record: Search took 0.01 seconds. 
Protection of personal data
Nutilová, Helena
The primary aim of this dissertation thesis is to present a comprehensive analysis of the issue of personal data protection in the Czech Republic with regard to the regulation in the EU. The secondary goal of this work is to explore the historical genesis and material sources of the issue in question. The core information sources from which the thesis draws represent laws, judicial decisions, official documents and Czech/foreign expert literature. In order to achieve the objectives of the work, the methods that are generally applicable in the field of legal science were used. Therefore the method of description (including classification), analysis and synthesis is mostly applied. The dissertation consists of seven chapters. After a short introduction, it begins with a sociological treatise on the importance of the protection of personal data in the 21st century. Privacy is currently an important topic in the light of the rapid development of information and communication technologies which have been developing since the second half of the 20th century and burgeoned since the turn of the century. Technological innovations allow for the collection of personal data on a large scale. These privacy infringements can prove to be irreversible, hence the importance of this area of law. The personal data...
Employer monitoring of employees
Hlaváček, David ; Štefko, Martin (referee)
Employer monitoring of employees - Monitoring of Flexible Work Arrangements Abstract This thesis focuses on three areas of interconnected legal issues, institutes, and topics that all come together within the scope of labour law and the actual industrial relations. The first area covers the protection of privacy and integrity of the individual as stipulated by the constitutional standards, general legal regulations, European standards, and binding international treaties and conventions. The second area covers the industrial relations as such; however, special emphasis is put on the protection of privacy and integrity of employees. Finally, thethird area covers the employee monitoring by the employer - at theusual workplace as well as when working remotely, usually from the employee's home. In the introductory part, the above mentioned sources of law are analysed and the normative framework is described, setting the limits of legitimacy and legality of employee monitoring by the employer. Subsequently, various monitoring forms and methods are examined, applying descriptive and analytical methods to understand different aspects of employee monitoring in various environments and types of industrial relations. In this part of the thesis, the author analyses and predicts the impacts and consequences of each...
Free speech on the Internet and censorship as a way to protectusers' privacy
Brišová, Jana ; Moravec, Václav (advisor) ; Osvaldová, Barbora (referee)
The aim of this bachelor thesis is to provide a complex analysis of free speech on the internet, violation of this right and ways how to protect own privacy in cyberspace. It is based on a theoretical exploration of protection of free speech, right to privacy and collision of these rights. Based on this theoretical analysis this thesis seeks to provide a comprehensive analysis of the cyberspace as a space enabling free speech as well as violating the right to privacy. This thesis also explores the responsiveness of the Internet to the users' demands on privacy, violations of the right to freedom of expression, and censorship of the Internet, as demonstrated by the case studies of countries taking these steps. This is followed by a research of ways to circumvent Internet censorship, including the possibility of anonymity on the Internet. Anonymity is also discussed as a tool to protect privacy as well as source of dangers.
Privacy Protection on Mobile Devives
Aron, Lukáš ; Hudec,, Ladislav (referee) ; Drahanský, Martin (referee) ; Hanáček, Petr (advisor)
Tato práce analyzuje ochranu citlivých dat na mobilních zařízeních a představuje metodu pro ochranu těchto dat před možností úniku informaci ze zařízení. Ochrana se zaměřuje na využívání zařízení, jak pro osobní účely, tak i v pracovním prostředí. Koncept navrženého řešení je implementován ve formě prototypu. Model implementace je verifikován s modelem požadovaného chování. Součástí práce jsou experimenty s prototypem a experimenty zaměřené na verifikaci mezi danými modely.
Personal data protection and cookies
Svetlík, Adam ; Stupka, Václav (referee) ; Míšek, Jakub (advisor)
This thesis deals with an analysis of cookies, a specific field of personal data protection. In particular, the thesis examines the legal aspects of the technology, as well as their insufficiencies. Besides that, it provides an analysis of several examples of privacy violations caused by cookies.
Privacy protection in cloud
Chernikau, Ivan ; Smékal, David (referee) ; Dzurenda, Petr (advisor)
In the Master’s thesis were described privacy protection problems while using cloud technologies. Some of the problems can be solved with help of homomorphic encryption, data splitting or searchable encryption. These techniques were described and compared by provided security, privacy protection and efficiency. The data splitting technique was chosen and implemented in the C language. Afterwards a performance of the implemented solution was compared to AES encryption/decryption performance. An application for secured data storing in cloud was designed and implemented. This application is using the implemented data splitting technique and third-party application CloudCross. The designed application provides command line interface (CLI) and graphical user interface (GUI). GUI extends the capabilities of CLI with an ability to register cloud and with an autodetection of registered clouds. The process of uploading/downloading the data to/from cloud storage is transparent and it does not overload the user with technical details of used data splitting technique.
Legal aspects of the current personal data protection developments
Tumpachová, Kateřina ; Pítrová, Lenka (advisor) ; Svoboda, Petr (referee)
This doctoral thesis is divided into ten chapters in which, together with the introduction and conclusion, it aims to describe and analyse the current development of legal regulation of personal data protection, especially from a substantive law perspective. The thesis analyses the existing legal regulations of the European Union, implemented in the legal frame of the Czech Republic compared to the new General Data Protection Regulation, which unifies the legal framework for the personal data protection in the whole European Union. The first chapter of the thesis describes in brief the development of the personal data protection legal framework, from the establishment of the right to personal data protection in human rights declarations to the gaining its independence from the right to privacy. Furthermore, the relevant OECD Guidelines and Convention 108, which plays a crucial role in the field of personal data protection, are described. The development of the legal regulation of personal data protection in the European Union, together with the development of legislation in the Czech Republic, which also meant the necessary implementation of EU regulations into the Czech legal order with the accession of the Czech Republic to the European Union, are described. The second chapter describes in detail...
The Impact of Online Marketing Practices on Perception of Privacy
Šimáková, Zuzana ; Rosenfeldová, Jana (advisor) ; Báča, Ladislav (referee)
This bachelor thesis deals with the impact of online marketing practices on perception of privacy. For this purpose, the theoretical part of this thesis first presents different conceptions of privacy, that are most repeated in the discourse. This chapter focuses on the position of privacy in the context of marketing communication. After that The Czech Privacy Policy as well as the European Union Privacy Policy are described. The last chapter of theoretical part presents different online marketing practises that use customer data. The emphasis is on online behavioral targeting and related remarketing. In the practical part, semi-structured individual interviews are conducted to find out whether users are familiar with these online marketing practices, what they think about them and mainly how do these practices affect their perception of privacy.
Anonymization of users when collecting network traffic
Hamár, Lukáš ; Blažek, Petr (referee) ; Sikora, Marek (advisor)
This thesis deals with anonymization of data, which could lead to disclosure of the identity of end users in network traffic. Work describes algorithms by which individual data parts are anonymized and also tools which use these techniques for network traffic anonymization. The next part of the thesis describes construction of a laboratory network, in which is the network traffic captured, containing pcap and NetFlow data. With using of the captured data, the anonymization tools are tested and the results are compared. In the last part of the thesis is created graphical interface for one of the tested anonymization softwares.
Privacy protection in cloud
Chernikau, Ivan ; Smékal, David (referee) ; Dzurenda, Petr (advisor)
In the Master’s thesis were described privacy protection problems while using cloud technologies. Some of the problems can be solved with help of homomorphic encryption, data splitting or searchable encryption. These techniques were described and compared by provided security, privacy protection and efficiency. The data splitting technique was chosen and implemented in the C language. Afterwards a performance of the implemented solution was compared to AES encryption/decryption performance. An application for secured data storing in cloud was designed and implemented. This application is using the implemented data splitting technique and third-party application CloudCross. The designed application provides command line interface (CLI) and graphical user interface (GUI). GUI extends the capabilities of CLI with an ability to register cloud and with an autodetection of registered clouds. The process of uploading/downloading the data to/from cloud storage is transparent and it does not overload the user with technical details of used data splitting technique.

National Repository of Grey Literature : 41 records found   beginprevious21 - 30nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.