Sylvia Mercado Kierkegaard | |
---|---|
Born | 1952 |
Died | 2015 |
Scientific career | |
Institutions | University of Southampton |
Website | www |
Sylvia Mercado Kierkegaard was a Philippine jurist who specialized in computer law.
Her research covered a wide range of topics, including comparative contract law, alternative dispute resolution, intellectual property rights, European Union law, privacy, electronic commerce, cybersecurity, computer law, and data protection. She wrote and edited books and journal articles.
She was the president of the International Association of IT Lawyers (IAITL), an association of IT lawyers and legal scholars specializing in computer law, privacy, and security. [1]
In 2003, she finished an International Masters in European Business and Law at Aarhus University with the highest grade. [2]
Kierkegaard was a professor at the Communications University of China, professor-research fellow at The Institute for Law and the Web (ILAWS; University of Southampton), and adjunct professor at Xi'an Jiaotong University. [3]
She was a frequent keynote speaker, invited expert, and panelist of various international workshops organised by international institutions, judiciary, European Union, television, and government bodies. [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17]
Kierkegaard served as chair of the Organizing Committee of the IAITL legal conference series [18] [19] [20] and is editor-in-chief of the Journal of International Commercial Law and Technology , International Journal of Private Law , and the International Journal of Public Law and Policy . [21] She serves also as associate editor of the International Journal of Intercultural Information Management , [22] and managing editor of the Journal of Legal Technology Risk and Management . [23]
Kierkegaard served as an expert adviser, [24] [25] [26] [27] [28] speaker, [29] [30] and member of various study groups and committees for the European Union and the Council of Europe, [31] which draft policies and proposals for legislative and regulatory policies on international level, [32] [33] [34] as well as international associations. [35] [36] [37]
Other activities included serving as a member of the Policy and Scientific Committee of the European Privacy Association. [38]
Computer security, cyber security, digital security or information technology security is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide.
Information privacy is the relationship between the collection and dissemination of data, technology, the public expectation of privacy, contextual information norms, and the legal and political issues surrounding them. It is also known as data privacy or data protection.
Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizations, such as organizations like the NSA, but it may also be carried out by corporations. Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies. It is the single most indicative distinguishing trait of totalitarian regimes. It is also often distinguished from targeted surveillance.
Cybercrime is a type of crime involving a computer or a computer network. The computer may have been used in committing the crime, or it may be the target. Cybercrime may harm someone's security or finances.
Privacy International (PI) is a UK-based registered charity that defends and promotes the right to privacy across the world. First formed in 1990, registered as a non-profit company in 2002 and as a charity in 2012, PI is based in London. Its current executive director, since 2012, is Dr Gus Hosein.
Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person.
IT security standards or cyber security standards are techniques generally outlined in published materials that attempt to protect the cyber environment of a user or organization. This environment includes users themselves, networks, devices, all software, processes, information in storage or transit, applications, services, and systems that can be connected directly or indirectly to networks.
A cybersecurity regulation comprises directives that safeguard information technology and computer systems with the purpose of forcing companies and organizations to protect their systems and information from cyberattacks like viruses, worms, Trojan horses, phishing, denial of service (DOS) attacks, unauthorized access and control system attacks. There are numerous measures available to prevent cyberattacks.
The International Association of Privacy Professionals (IAPP) is a nonprofit, non-advocacy membership association founded in 2000. It provides a forum for privacy professionals to share best practices, track trends, advance privacy management issues, standardize the designations for privacy professionals, provide education and guidance on career opportunities in the field of information privacy. The IAPP offers a full suite of educational and professional development services, including privacy training, certification programs, publications and annual conferences. It is headquartered in Portsmouth, New Hampshire.
Privacy law is the body of law that deals with the regulating, storing, and using of personally identifiable information, personal healthcare information, and financial information of individuals, which can be collected by governments, public or private organisations, or other individuals. It also applies in the commercial sector to things like trade secrets and the liability that directors, officers, and employees have when handing sensitive information.
Hugo Teufel III is an American lawyer and former government official.
European Digital Rights (EDRi) is an international advocacy group headquartered in Brussels, Belgium. EDRi is a network collective of non-profit organizations (NGO), experts, advocates and academics working to defend and advance digital rights across the continent. As of October 2022, EDRi is made of more than 40 NGOs, as well as experts, advocates and academics from all across Europe.
Howard Anthony Schmidt was a partner with Tom Ridge in Ridge Schmidt Cyber LLC, a consultancy company in the field of cybersecurity. He was the Cyber-Security Coordinator of the Obama Administration, operating in the Executive Office of the President of the United States. He announced his retirement from that position on May 17, 2012, effective at the end of the month.
The Anti-Counterfeiting Trade Agreement (ACTA) is a multilateral treaty for the purpose of establishing international standards for intellectual property rights enforcement that did not enter into force. The agreement aims to establish an international legal framework for targeting counterfeit goods, generic medicines and copyright infringement on the Internet, and would create a new governing body outside existing forums, such as the World Trade Organization, the World Intellectual Property Organization, and the United Nations.
A computer security conference is a convention for individuals involved in computer security. They generally serve as meeting places for system and network administrators, hackers, and computer security experts.
The General Data Protection Regulation is a Regulation in EU law on data protection and privacy in the EU and the European Economic Area (EEA). The GDPR is an important component of EU privacy law and of human rights law, in particular Article 8(1) of the Charter of Fundamental Rights of the European Union. It also addresses the transfer of personal data outside the EU and EEA areas. The GDPR's primary aim is to enhance individuals' control and rights over their personal data and to simplify the regulatory environment for international business. Superseding the Data Protection Directive 95/46/EC, the regulation contains provisions and requirements related to the processing of personal data of individuals, formally called "data subjects", who are located in the EEA, and applies to any enterprise—regardless of its location and the data subjects' citizenship or residence—that is processing the personal information of individuals inside the EEA.
William Johnston BuchananOBE FBCS CEng PFHEA is a Scottish computer scientist. Buchanan was born in Falkirk, Scotland in 1961. Buchanan is a professor in the School of Computing, Engineering and the Built Environment. He currently leads the Blockpass ID Lab and the Centre for Cybersecurity, IoT and Cyberphysical at Edinburgh Napier University.
Solange Ghernaouti is a professor at the University of Lausanne (UNIL) and an international expert on cybersecurity and cyberdefence. She regularly collaborates with various United Nations, European and government institutions as well as with private corporations.
Privacy engineering is an emerging field of engineering which aims to provide methodologies, tools, and techniques to ensure systems provide acceptable levels of privacy.
Sushil Jajodia is a computer scientist known for his work on cyber security and privacy, databases, and distributed systems.
{{cite magazine}}
: Missing or empty |title=
(help){{cite web}}
: Missing or empty |title=
(help)[ dead link ]