LIS Links

First and Largest Academic Social Network of LIS Professionals in India

Latest Activity

Amit Thakur is now friends with kishore Basumatary and sudeep gupta
yesterday
LAITHANGBAM NEPOLEAN SINGH is attending neema shukla's event
Thumbnail

International Conference on Libraries and Emerging Technologies for Smart Knowledge Ecosystems (ICLET 2025) at Jaipur,Rajasthan

November 14, 2025 at 9am to November 15, 2025 at 6pm
Sunday
Akshay Kumar is attending Hemanta Kumar Biswal's event
Thumbnail

4th International Symposium on Knowledge Engineering for Digital Library Design (KEDLD-2025) at Indian Institute of Technology, Kharagpur

November 3, 2025 to November 5, 2025
Saturday
WANRIHUN SHANGPLIANG and Dr. Badan Barman are now friends
Friday
Dr Pradeep gupta and ashish jain are now friends
Friday
Veerendra A V updated their profile
Friday
Prangyasini Nayak updated their profile
Thursday
Samit Mondal updated their profile
Thursday
Dr. Badan Barman posted a blog post
Thursday
MANJULA T posted a discussion
Thursday
Sebastine Robert posted a discussion
Thursday
Dr. Bhakti Gala posted a discussion
Thursday
Sumit Chakraborty posted a discussion
Thursday
Dr. O Seshaiaih posted a discussion
Thursday
Dr. Badan Barman is now friends with Chavda Jitendra Kumar Ambalal and Poonam
Thursday
Nayana Nair posted an event
Thumbnail

One-day Workshop on Analog to Digital: The Transformation at French Institute of Pondicherry (IFP)

October 31, 2025 from 9:30am to 5:30pm
Thursday
Dr. Badan Barman updated an event
Thumbnail

International Conference on Libraries and Emerging Technologies for Smart Knowledge Ecosystems (ICLET 2025) at Jaipur,Rajasthan

November 14, 2025 at 9am to November 15, 2025 at 6pm
Thursday
Profile IconDINESH KUMAR, Kamlesh Das, Raman Kumar Sharma and 68 more joined LIS Links
Thursday
Pramod kumar updated their profile
Oct 6
Manmeet Kaur updated their profile
Oct 6
What is Trans Border Data Flow?

Views: 5410

Reply to This

Replies to This Forum

Friend,

I have seen fulltext article just on  this topic on Internet, Kindly refer same in attached file.

This question seems very tough in SET Exam Dec 2010.

Would

Attachments:

Transborder data flow deals with the movement of personally identifiable data from one country to another. Hence, "Trans-border
OR
Transborder data flows is the transmission over computer-communicational systems of automated data to be processed and stored in foreign data processing systems. A number of issues, including privacy protection and data security, arise in various transborder data flow (TDF) situations and are discussed in this paper, especially the potential effects on TDF of national privacy protection laws and pending international agreements. Sets of associated technical requirements are examined

 

Tans border data flow means the international flow of information. The term does not connotes any limitations of the method by which the information may be transmitted.
Technological innovation and globalization have facilitated a surge in trans-border
flows of information. The internet, in particular, has enabled information to be
moved around the world almost instantly. These developments have major
implications for the protection of informational privacy, and create significant
challenges for national information privacy laws. However , it is not simply the transmission, in and of itself , which concern as a general . To reflect this problem the international community given a term called Informatics , which is surrounded by computer and information science. So that the trans border data flow can concerned with bioinformatics, business informatics , ecoinformatics, environmental informatics, social informatics , etc.
Trans-border data flows are increasingly prevalent in modern commerce and government and individuals may frequently not even realise that their information is being sent overseas. Some examples of trans-border data flows are:
1. Businesses and governments are increasingly outsourcing activities, including the processing of personal information about their customers and citizens.
2. Technologies such as search engines, cloud computing and voice over internet protocol can all involve personal information being sent overseas.
3. A mirror image of all citizen’s passport data is stored in the centralized data base to facilitate the
advanced passenger processing system
4. Motivated by concerns about terrorism and national security, governments are demanding more
information about people entering their countries. The central investigation agency has sought access
to this centralized database for anti-terrorism purposes.
5. It will be evident that trans-border data flows can entail significant opportunities for agencies, but that there are corresponding privacy risks. Some countries where personal information about citizens/Nation is sent may not have laws in place to protect privacy to the standard that particular citizen/Nation expect. This could result in personal information being exposed.


The challenge, then, is to allow trans-border data flows to occur whilst also protecting privacy. A range of international and regional instruments have been developed in pursuit of the twin goals of facilitating free flows of information across borders and protecting privacy. Each seeks to establish consistent rules among countries so that inconsistent national laws do not impede trans-border data flows and economical , technical development.

A number of international privacy instruments have been developed since the 1980s, with the aim of setting privacy standards to facilitate consistent domestic laws. As yet, however, no international privacy treaty exists. The ultimate goal appears to be that all countries will have similar privacy standards, so barriers to trans-border data flows will no longer be necessary.

Dear Azam ji.

Nice explanations....

thanks

pvz

RSS

© 2025   Created by Dr. Badan Barman.   Powered by

Badges  |  Report an Issue  |  Terms of Service

Koha Workshop