Showing 0-10 out of 693 results
This area presents the three core documents describing basic procedural rules to be followed by ISO committees, namely: ISO/IEC Directives, Part 1: Procedures for the technical work ISO/IEC Directives, Part 1: Consolidated ISO Supplement - Procedures specific ISO/IEC Directives, Part 2: Rules for the structure and drafting of International Standards Access is also given to the ISO Change Notifications, which describe the approved changes to the Directives and Supplement, as well as to copies of the Normative References quoted in these core documents (Note: viewing of the normative references is subject to access control - a username and password is required). The forms to be used in conjunction with the three core documents are available to download from www.iso.org/forms. ISO/IEC JTC 1 (Information technology) has also adopted ISO/IEC Directives, Part 1, together with the JTC 1 Supplement. The basic procedures are supplemented by procedures relating to other forms of standards development partnerships and agreements; those relating to the Agreement on technical cooperation between ISO and CEN (Vienna Agreement) are accessible from this area as well as directly via www.iso.org/va. Additional guidelines and special procedures complementing these documents may be found on the ISOTC Portal (www.iso.org/tc), in particular in the areas Development Procedures and Writing Standards.
The 2019 Ranking Digital Rights Corporate Accountability Index evaluated 24 of the world’s most powerful internet, mobile, and telecommunications companies on their disclosed commitments and policies affecting freedom of expression and privacy of internet users across the world.
2015 began and ended with the violent attacks that plunged France into mourning. There will definitely be a before and an after 2015. Each of us was deeply hurt by the physical violence of these attacks on our democratic values, on what unites us and binds us, and which is the cornerstone of our identity as French and European citizens. These humanistic values hold special meaning for the CNIL’s 200 staff members and 17 Commissioners. Since then, the cursor between security requirements and the defence of fundamental freedoms has unquestionably shifted. In this very particular context, underscored by intense emotion, the CNIL has maintained its course, seeking a delicate balance between disparate but not necessarily antagonistic requirements. Over and above their individual and collective impacts, these events have had a very direct impact on the CNIL’s activity. The Commission has had to issue opinions on 14 texts (implementing decrees and bills) related to coun-ter-terrorism measures or intelligence. While some of them were already planned, the attacks clearly hastened their implementation.
In this reading list, Data & Society Researcher Alexandra Mateescu and Postdoctoral Scholar Julia Ticona provide a pathway for deeper investigations into themes such as gender inequality and algorithmic visibility in the gig economy. “This list is meant for readers of Beyond Disruption who want to dig more deeply into some of the key areas explored in its pages. It isn’t meant to be exhaustive, but rather give readers a jumping off point for their own investigations.”
We are handing over more of our personal data than ever before to local authorities in exchange formore efficient and better targeted service. As part of this deal we expect that the information will be kept secure and those who have access to the information are properly trained. A Breach of Trust shows that between April 2011 and April 2014 there have been at least 4,236data breaches. These findings are part of a wider trend.Local Authority Data Loss, aprevious Big Brother Watch report into data loss by local authorities found that between July 2008 and July 2011 personal data had been lost 1,035 times.1The increase in four years is dramatic. It is not just the number of the breaches which raise concerns, but the lack of proper punishment. Despite more than 400instances of loss or theft, including197mobile phones, computers, tablets and USBs and600 cases where information was inappropriately shared,just a single person has faced criminal sanctions and only 50have been dismissed.