Valoración del Usuario:  / 0
MaloBueno 
Escrito por In the last article we Topic 1 Safety Legal Technology - Definition, concept, characteristics and performance venues, try the basic definitions of this new matter in the legal field. This article will address Theme 2 "Legal Technology and Society". In to Categoría: Legal Technology
Fecha de Publicación Visitas: 1408
Imprimir

Seguridad Servidores

In the last article we Topic 1 Safety Legal Technology - Definition, concept, characteristics and performance venues, try the basic definitions of this new matter in the legal field. This article will address Theme 2 "Legal Technology and Society".

In today's society, a society controlled by active or passive technology, where everything is now taken control software constantly facilitala us life in all aspects, is increasingly emerging in doubt Where are the data that I request? How do you deal? Is it safe? We do not intend to cover only privacy but go a step further, where data is stored or on the road between us and the request arrival at the server or program where they are treated does that road is safe? and when they are there is it impossible to have an information leak?

These questions are intended to answer legal technology. Before boarding explicitly define which is a system of social control technological assets and liabilities. Social control technology can be referred to those systems under a legal obligation to provide data or trade of any kind and by various means, but at some point in their life will be processed electronically.

Can be called passive controls to those controls that indirectly, consciously or not individual personal data is captured, mobility, health, labor, social, political ... its incorrect treatment can be a detriment to privacy, liberty, or injury to any law.

Assets are those controls related to data arising directly linked to an activity related to the captured data communication requires a series of data, either itself or by third parties arising from administrative or private.

Data processing involves direct or indirect minimum legal protection to technological level. We do not mean only data protection but other more complex areas but they do not imply less importance. When chop with a bus pass, we pass the health card, put a claim, an administrative mail or in person, we enter a social network, you access the Internet via mobile, via foursquare checkins are performed or via google or any other system. All these gestures are reflected in a structure that stores data relating to persons directly or indirectly, but detailed agreements can be a total control of all movements of any person. That has to be shielded exceptionally and must have linked a number of mechanisms for monitoring, access, correction and certification of permanent destruction technology

Currently incorporate new gestures each day representing a new data traffic, that has to be controlled and that control in turn must have implemented security systems for anyone but the teacher may use the data but is without the consent the person concerned.

There are five basic premise that any system that collects data must meet.

    - Collection of data via encrypted
    - Data processing by controlled access
    - Systems - the databases full audited
    - Traceability in the deletion of data
    - Full access to telematic ways and face to any data collected by the applicant.

Society is a continuous flow of data in multiple ways, this involves implementing a set of standard basic data streams associated with different data types. But that we will address in item 3, in future deliveries.

This as all topics are subject to copyright and intellectual property


Powered by udjamaflip.com
| + - | RTL - LTR