Тёмный

Data Protection and Privacy 

UN Trade and Development
Подписаться 12 тыс.
Просмотров 112 тыс.
50% 1

Increasingly, an ever-wider range of economic, political and social activities are moving online, encompassing various kinds of information and communications technologies (ICTs). The evolving ICT use is having a transformational impact on the way business is done, and the way people interact among themselves, as well as with government, enterprises and other stakeholders. This new landscape gives rise to new business models and a wider scope for innovation. At the same time, it facilitates undesirable activities online, including cybercrime. Against this background, world leaders in 2015 underscored the importance of adopting relevant policy responses to harness the potential of ICTs for all seventeen Sustainable Development Goals (SDGs).
Creating trust online is a fundamental challenge to ensuring that the opportunities emerging in the information economy can be fully leveraged. The handling of data is a central component in this context. In today's digital world, personal data are the fuel that drives much commercial activity online, raising concerns of privacy and security of information. The present regulatory situation is far from ideal. Some countries lack rules altogether. Some national pieces of legislation are incompatible with each other. UNCTAD provides legal advise and build capacity of policy and law makers. It also serves as a valuable forum for a much-needed global dialogue geared to building consensus in a very important policy field such as data protection.
UNCTAD's work on Developing electronic commerce legislation: unctad.org/en/Pages/DTL/STI_an...

Опубликовано:

 

13 апр 2016

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 68   
@docshifter
@docshifter 7 лет назад
Good share! Thanks for this.
@gilbertopalma80
@gilbertopalma80 6 месяцев назад
Thank you for this presentation
@Bill0102
@Bill0102 3 месяца назад
I can't believe how great this is! I recently read a similar book, and it was absolutely incredible. "Game Theory and the Pursuit of Algorithmic Fairness" by Jack Frostwell
@Trusted-VPNcom
@Trusted-VPNcom 6 лет назад
You can protect your Data by hiding your IP-address. Therefore you can use a VPN.
@sorackee
@sorackee 6 лет назад
Trusted-VPN.com there are easy ways to block a VPN on a network of it isn't a high quality one
@One._.big._.bird.
@One._.big._.bird. 3 года назад
Yow people look in the comments
@joejoe2452
@joejoe2452 8 дней назад
8 years ago and it was already talking about 5g what in the what what
@jaimesalgadoakajaime_the_d7537
I condem anyone from using my personal sensitive information to bully my kindness in other words they need to pay me for my stress
@doriszini1179
@doriszini1179 6 лет назад
Name:ONG ZI NI ID:1171200799
@jingtingsu5271
@jingtingsu5271 6 лет назад
Name : Su Jing Ting ID:1171200742
@tingkiankeng334
@tingkiankeng334 6 лет назад
Name:Ting Kian Keng ID:1171200307
@elinelindazagovawintersong708
@elinelindazagovawintersong708 5 лет назад
We dont spy at anyone.. Gteat
@manojkumarsubramaniam7122
@manojkumarsubramaniam7122 6 лет назад
MANOJKUMAR 1171201047
@frisiahwl5705
@frisiahwl5705 6 лет назад
FRISIA 1171200005
@sehshengng1869
@sehshengng1869 6 лет назад
Ng seh sheng 1171201381
@user-jx5xy6xk9r
@user-jx5xy6xk9r 6 лет назад
Name:Ting kian kok ID:1171200306
@teckseng8179
@teckseng8179 6 лет назад
NAME: TOH TECK SENG ID: 1161204243
@ray495903314
@ray495903314 5 лет назад
why are you posting a name and student id?
@delsontms7063
@delsontms7063 6 лет назад
Teo Ming Sheng 1171201041
@yunweilow2004
@yunweilow2004 6 лет назад
NAME: LOW YUN WEI ID: 1171201272
@yueertan9196
@yueertan9196 6 лет назад
NAME:TAN YUE ERID:1171201689
@khchua6877
@khchua6877 6 лет назад
Chua Kim Hwee 1171201222
@gancheebin7786
@gancheebin7786 6 лет назад
Gan Chee Bin 1171201303
@KooMx
@KooMx 6 лет назад
Koo Ming Xuan 1171201117
@jinyuanseaw7378
@jinyuanseaw7378 6 лет назад
Seaw Jin Yuan 1171201027
@chloelee1930
@chloelee1930 6 лет назад
Lee Xin Yee 1171200612
@liangjia6213
@liangjia6213 6 лет назад
Choo Jia Liang 1171201577
@bingbing965
@bingbing965 6 лет назад
Chan Xiao Bing 1171200800
@deebanrao638
@deebanrao638 6 лет назад
Deeban Rao 1171201698
@tenghou1878
@tenghou1878 6 лет назад
Teng Jun Yue 1171201175
@chuawenbin731
@chuawenbin731 6 лет назад
CHUA WEN BIN 1171201330
@LLYY1
@LLYY1 6 лет назад
NAME :TAN LI YUN ID:1171201441
@user-zu9ge6fd2b
@user-zu9ge6fd2b 6 лет назад
Tan Joo Kian 1171201532
@sinyingpang153
@sinyingpang153 6 лет назад
PANG SIN YING 1171201393
@hauzanlim2288
@hauzanlim2288 6 лет назад
Lim Hau Zan 1171201427
@ganjiaying8619
@ganjiaying8619 6 лет назад
Gan Jia Ying 1171200424
@tanruien9700
@tanruien9700 6 лет назад
TAN RUI EN 1171200353
@panglixin7419
@panglixin7419 6 лет назад
PANG LI XIN 1171201176
@limchinchuan5397
@limchinchuan5397 6 лет назад
LIM CHIN CHUAN 1171200950
@jingyi3936
@jingyi3936 6 лет назад
Name:Chew Jing Yi ID:1171201016
@cjyi242
@cjyi242 6 лет назад
Name: Cheah Jin Yi ID:1171202172
@haekalizzat856
@haekalizzat856 6 лет назад
Haekal Izzat Merican 1171201644
Далее
Data Security vs Data Privacy
5:42
Просмотров 32 тыс.
What is IoT? Explained in a Minute #shorts #iot
0:56
Просмотров 171 тыс.
Super gymnastics 😍🫣
00:15
Просмотров 11 млн
Glenn Greenwald: Why privacy matters
20:42
Просмотров 876 тыс.
Data Privacy (Data Governance)
9:47
Просмотров 17 тыс.
Your Personal Data, Your Choice
1:34
Просмотров 24 тыс.
Containers vs VMs: What's the difference?
8:08
Просмотров 738 тыс.
4 Ways to Encrypt Your Data for MAXIMUM security
8:32
Privacy and data protection
10:44
Просмотров 281 тыс.