Viewing Smart Contracts Through GDPR Lenses (Published)
The term ‘smart contracts’ is superficially misleading. It does not connote ‘contracts’ as we know them, rather it is a technical coinage which represents computer codes automated to execute and consummate agreements to the exclusion of third parties. This article examines the various definitions of smart contracts and its interplay with data protection as required under the EU General Data Protection Regulation (GDPR).
Citation: Olumide Babalola (2022) Viewing Smart Contracts Through GDPR Lenses, Global Journal of Politics and Law Research, Vol.10, No.4, pp.71-79
Keywords: Blockchain, Data protection, GDPR, Privacy, smart contracts
Arbitration is a private and confidential process only to some extent (Published)
This paper seeks to examine and analyse the levels of privacy and confidentiality of the arbitration process by exploring circumstances and legal provisions surrounding this process.
Keywords: Confidentiality, Privacy, arbitration process
Criminal Protection of the Personal Electronic Data Privacy (Published)
The right to privacy is one of the most important rights associated with the legal personality, and the protection, processing, maintaining and non-disclosure of personal data and information to others is one of the most important and greatest forms of privacy or the sanctity of private life. Maintaining human secrets is the essence and basis of guaranteeing freedom of privacy against violating others, and here the role of the legal rules that govern and regulate issues of this protection appears through the legislations that they enact to ensure that they are not infringed or disclosed, and by establishing the deterrent punishment against the perpetrators of these acts.As a result of relying on modern technology in various aspects of contemporary life and the increasing in the amount of data possessed by the state and private institutions, this matter leads the legislator to carefully consider how the data that contains information about individuals is collected and saved and the possibility of violating their privacy that may result through misuse it. Therefore, the urgent need has arisen to criminalize the illegal collecting of personal data, disclosure it, or unlawful transfer it.
Keywords: Disclosure, Privacy, Punishment, criminalization, personal data
The Man Who Ate a Goose and 1984: A Critical Study of Two Plays on Totalitarian Practices (Published)
This paper considers the investigation of totalitarian practices dealt with in two contemporary plays, The Man Who Ate a Goose (1985) and 1984 (2013). Written and staged in two different cultures, both plays present ongoing strategies and commands imposed on people depriving them of privacy and free will. Whatever the span of time between the two plays, characters depicted seem to share common features. This study seeks to explore how real and good are those characters in their strife to conform to the despotic tyranny. Bewildered by the question of the right action, both Saad and Winston learn to accommodate with the obligatory illogical commands. If not acquitted by the law, the individual is led into inconsistency of moral conduct. Restrictions on dream and thought are rendered through detention and torture. Goerge Orwell’s 1984 seems to open new paths for dramatists and theatre practitioners in the world then and now.
Keywords: Free Will, Morality, Privacy, Torture, Totalitarianism
DBMS Integration with Cloud Computing (Published)
A Cloud database management system is a distributed database that brings computing as a service beyond a product. A cloud computing system with database management system is the allocation of required resources, software and information between different devices over a network which is basically on the internet. It is to be expected that this number will arise incomparably in the future. According to the consequences, there is an emerging interest in outsourcing database management skills to third parties that can afford these tasks for cheap and best cost according to the direction of computation just like merging it into the cloud. In this paper, we focus the current tendency in database management system and the potentiality of creating this as one of the best service provider in the cloud. Furthermore we also designed architecture of database management system in the cloud.
Keywords: Cloud Computing, DBMS, Data Outsourcing, Database Management System, Privacy