Datenschutz | nemačko - engleski prevod


muški rod

Mit der elektronischen Datenverarbeitung könnte der Alptraum vom totalen Überwachungsstaat Wirklichkeit werden. Datenschutz ist daher zu einer vordringlichen politischen Aufgabe geworden. 1977 wurde das Bundesdatenschutzgesetz (BDSG, 1.1.78 in Kraft) verabschiedet, das gemäß Art. 2,1 GG dem Datenmißbrauch und der Erfassung des Bürgers Grenzen setzen soll. Danach müssen personenbezogene Daten (Ausbildung, Einkommen, Schulden, Familienstand, Vorstrafen, Arbeitsverhältnis u.a.) vor Dritten geheimgehalten werden; die Verarbeitung dieser Daten bedarf der Einwilligung des Betroffenen, sofern das BDSG oder eine andere Rechtsvorschrift keine Ausnahme vorsehen; auf Wunsch des Bürgers ist ihm über die zu seiner Person gespeicherten Daten Auskunft zu geben, wobei er verlangen kann, daß diese gegebenenfalls korrigiert oder nach Erreichen des Speicherzwecks gelöscht oder gesperrt werden. Datenschutzbeauftragte des Bundes und der Länder, an die sich betroffene Personen direkt wenden können, überwachen die Einh

1. data privacy


2. data protection


The process of ensuring the preservation, integrity, and reliability of data. See also data integrity.
Safeguarding of information about individuals stored on computers, to protect privacy.

3. data security


In computing, precautions taken to prevent the loss or misuse of data, whether accidental or deliberate. These include measures that ensure that only authorized personnel can gain entry to a computer system or file, and regular procedures for storing and “backing up” data, which enable files to be retrieved or recreated in the event of loss, theft, or damage.
A number of verification and validation techniques may also be used to prevent data from being lost or corrupted by misprocessing.
Encryption involves the translation of data into a form that is meaningless to unauthorized users who do not have the necessary decoding software.
Passwords can be chosen by, or issued to, individual users. These secret words (or combinations of alphanumeric characters) may have to be entered each time a user logs on to a computer system or attempts to access a particular protected file.
Physical access to the computer facilities can be restricted by locking entry doors and storage cabinets.
Master files (files that are updated periodically) can be protected by storing successive versions, or generations, of these files and of the transaction files used to update them. The most recent version of the master file may then be recreated, if necessary, from a previous generation. It is common practice to store the three most recent versions of a master file (often called the grandfather, father, and son generations).
Direct-access files are protected by making regular dumps, or back-up copies. Because the individual records in direct-access files are constantly being accessed and updated, specific generations of these files cannot be said to exist. The files are therefore dumped at fixed time intervals onto a secure form of backing store. A record, or log, is also kept of all the changes made to a file between security dumps.
Fireproof safes are used to store file generations or sets of security dumps, so that the system can be restarted on a new computer in the event of a fire in the computer department.
Write-protect mechanisms on discs or tapes allow data to be read but not deleted, altered, or overwritten. For example, the protective case of a 3˝-inch floppy disc has a write-protect tab that can be slid back with the tip of a pencil or pen to protect the disc’s contents.

4. privacy


Sinonimi: privateness | secrecy | concealment | privateness | seclusion

1. The condition of being concealed or hidden; SYN. privateness, secrecy, concealment.
2. The quality of being secluded from the presence or view of others; SYN. privateness, seclusion.
The right of the individual to be free from secret surveillance (by scientific devices or other means) and from the disclosure to unauthorized persons of personal data, as accumulated in computer data banks. Always an issue complicated by considerations of state security, public welfare (in the case of criminal activity), and other factors, it has been rendered more complex by present-day technology.
Computer data
All Western countries now have computerized-data protection. In the us the Privacy Act 1974 requires that there should be no secret data banks and that agencies handling data must ensure their reliability and prevent misuse (information gained for one purpose must not be used for another). The public must be able to find out what is recorded and how it is used, and be able to correct it. Under the Freedom of Information Act 1967, citizens and organizations have the right to examine unclassified files.

Naši partneri

Škole stranih jezika | Sudski tumači/prevodioci