LIS Links

First and Largest Academic Social Network of LIS Professionals in India

Latest Activity

CHETAN RAVAL updated their profile
8 hours ago
Bilal Rabbani is now friends with Millan Krushna Dutta and Mhuammad Rafiq Akhtar
yesterday
Vinod Kumar Jain posted a blog post
yesterday
neema shukla posted an event
Thumbnail

International Conference on Libraries and Emerging Technologies for Smart Knowledge Ecosystems (ICLET 2025), at Jaipur,Rajasthan

November 14, 2025 at 9am to November 15, 2025 at 6pm
yesterday
Rohidas Rathod posted an event
yesterday
Hemanta Kumar Biswal posted an event
Thumbnail

4th International Symposium on Knowledge Engineering for Digital Library Design (KEDLD-2025) at Indian Institute of Technology, Kharagpur

November 3, 2025 to November 5, 2025
yesterday
SHIVAKUMARA BC posted a discussion
yesterday
Swati replied to Jayant Deshpande's discussion Librarian are forced to teach a subject
Wednesday
OKE CHANDAN updated their profile
Wednesday
jai prakash kumar updated their profile
Tuesday
Rohidas Rathod updated their profile
Tuesday
Rohidas Bhimrao Rathod updated their profile
Tuesday
Rohidas Bhimrao Rathod updated their profile
Tuesday
Vinod Kumar Jain posted a status
"Required Library paid Intern @ 8000 PM for 6 Months for “Indexing Database”- in Delhi, 9818180051"
Monday
Vinod Kumar Jain posted a status
"Required Library Intern for “Indexing Database”- in Delhi"
Monday
Dr.Stephen.G commented on Dr.Stephen.G's event 'International Conference on Digital and Innovative Advancements for Sustainable Library Services'
Sunday
Dr.Stephen.G posted an event

International Conference on Digital and Innovative Advancements for Sustainable Library Services at Bharati Vidyapeeth’s Institute of Computer Applications & Management (BVICAM), New Delhi

August 29, 2025 at 10am to August 31, 2025 at 5pm
Sunday
Dr.Stephen.G posted a discussion
Sunday
Yogesh Kawale updated their profile
Jul 2
Peeyush Dwivedi posted a blog post
Jul 2
What is Trans Border Data Flow?

Views: 5377

Reply to This

Replies to This Forum

Friend,

I have seen fulltext article just on  this topic on Internet, Kindly refer same in attached file.

This question seems very tough in SET Exam Dec 2010.

Would

Attachments:

Transborder data flow deals with the movement of personally identifiable data from one country to another. Hence, "Trans-border
OR
Transborder data flows is the transmission over computer-communicational systems of automated data to be processed and stored in foreign data processing systems. A number of issues, including privacy protection and data security, arise in various transborder data flow (TDF) situations and are discussed in this paper, especially the potential effects on TDF of national privacy protection laws and pending international agreements. Sets of associated technical requirements are examined

 

Tans border data flow means the international flow of information. The term does not connotes any limitations of the method by which the information may be transmitted.
Technological innovation and globalization have facilitated a surge in trans-border
flows of information. The internet, in particular, has enabled information to be
moved around the world almost instantly. These developments have major
implications for the protection of informational privacy, and create significant
challenges for national information privacy laws. However , it is not simply the transmission, in and of itself , which concern as a general . To reflect this problem the international community given a term called Informatics , which is surrounded by computer and information science. So that the trans border data flow can concerned with bioinformatics, business informatics , ecoinformatics, environmental informatics, social informatics , etc.
Trans-border data flows are increasingly prevalent in modern commerce and government and individuals may frequently not even realise that their information is being sent overseas. Some examples of trans-border data flows are:
1. Businesses and governments are increasingly outsourcing activities, including the processing of personal information about their customers and citizens.
2. Technologies such as search engines, cloud computing and voice over internet protocol can all involve personal information being sent overseas.
3. A mirror image of all citizen’s passport data is stored in the centralized data base to facilitate the
advanced passenger processing system
4. Motivated by concerns about terrorism and national security, governments are demanding more
information about people entering their countries. The central investigation agency has sought access
to this centralized database for anti-terrorism purposes.
5. It will be evident that trans-border data flows can entail significant opportunities for agencies, but that there are corresponding privacy risks. Some countries where personal information about citizens/Nation is sent may not have laws in place to protect privacy to the standard that particular citizen/Nation expect. This could result in personal information being exposed.


The challenge, then, is to allow trans-border data flows to occur whilst also protecting privacy. A range of international and regional instruments have been developed in pursuit of the twin goals of facilitating free flows of information across borders and protecting privacy. Each seeks to establish consistent rules among countries so that inconsistent national laws do not impede trans-border data flows and economical , technical development.

A number of international privacy instruments have been developed since the 1980s, with the aim of setting privacy standards to facilitate consistent domestic laws. As yet, however, no international privacy treaty exists. The ultimate goal appears to be that all countries will have similar privacy standards, so barriers to trans-border data flows will no longer be necessary.

Dear Azam ji.

Nice explanations....

thanks

pvz

RSS

© 2025   Created by Dr. Badan Barman.   Powered by

Badges  |  Report an Issue  |  Terms of Service

Koha Workshop