Saturday , 24 September 2022
Home » 2021

Yearly Archives: 2021

Assessment and implications of the GDPR for Moroccan service providers in 2021

In November 2017, a few months before its entry into force, LTE magazine explained to you what the new General Data Protection Regulation of the European Union implied at the level of Moroccan service providers [1]. The GDPR is now firmly in place but its results are mixed. After a brief reminder, we take a stock of the situation and ... Read More »

Interview with Mr. Omar Seghrouchni, president of the CNDP of MOROCCO

We would like to thank Mr. Omar Seghrouchni, President of the National Commission for the Protection of Personal Data in Morocco (CNDP), for accepting our invitation to come and talk about the protection of personal Data. 1-The protection of personal data has become, with the digital transformation, a topical subject in Morocco. Indeed, it allows companies, on the one hand, ... Read More »

EMC Enabling A Competitive Mobile Sector in Emerging Markets Through the Development of Tower compagnies

Read More »

The protection of individuals with regard to the processing of personal data in the light of Law 09-08

Preamble The surge in flows and exchanges of personal data on Moroccan territory has dictated the need to ensure the protection of human rights and fundamental freedoms, and in particular the right to privacy. This fundamental right and this concern for the preservation of the privacy of personal life find their legs in the Moroccan Constitution which solemnly states in ... Read More »

THE LONG TERM SACRIFICED BY THE PRESENT.

Defining exactly what is time is a difficult task in spite of the effort made in the field of science and of tools of observation and time measurement. Each of us would give the answer of the philosopher Saint AUGUSTIN concerning its meaning: “What is time then? If nobody asks me, I know; but if I were desirous to explain ... Read More »

Perspectives on Future of Data Privacy and Challenges

Introduction We live in an exciting era where business is transforming at an unprecedented rate that we have not fully come to grasp its impact on data privacy. Look at the statistics which are staggering. Globally, smartphone penetration is estimated to be 8 billion subscriptions worldwide. An average smart phone user has 80 applications on their phone and approximately 10 applications are ... Read More »

Excerpt from the interview with Mr. Bertrand Piccard who flew around the world with a solar plane.

Mr Piccard, before asking my first question, allow me to introduce you to our readers: You are a Swiss doctor and pilot. You traveled around the world aboard the “Solar Impulse” plane which landed for the first time in Africa at Rabat Salé airport on June 5, 2012. Previously, You achieved, with the British pilot Brian Jones, the first round-the-world ... Read More »

Digital and solar storms, a disaster risk!

In 2012, we have almost disappeared clueless of what would have become of our species or our planetary vessel, Earth. This apocalyptic scenario, already experienced but in a much lower magnitude in 1859 and which manifested itelf through a large aurora borealis, is the effect of a large solar flare. According to NASA, a solar storm, observed very precisely by ... Read More »

Information Society and Cybersecurity

How to ensure cybersecurity of information systems when the earth is meshed with multiple telecommunication networks increasingly open? This can be defined as a process, which encompasses all the means deployed upstream and downstream, to fight against intentional (such as intrusions) or unintentional (flaws for example) crimes, that can affect security of information systems. Cybersecurity is justified, more than ever, ... Read More »

Cybersecurity law in Morocco

The Internet is a virtual space that should normally be governed by prudential rules intended to protect computer networks, telecom networks and their users. This set of preventive rules, which can be likened to a cybersecurity law, is supposed to provide protection against cyber attacks. These usually have the objective of deliberately or unintentionally harming natural and legal persons and ... Read More »

louboutin pas cher louboutin pas cher louboutin pas cher louboutin pas cher louboutin pas cher louboutin pas cher pandora outlet pandora outlet pandora outlet pandora outlet pandora outlet pandora outlet stone island outlet stone island outlet stone island outlet stone island outlet peuterey outlet peuterey outlet peuterey outlet peuterey outlet woolrich outlet woolrich outlet woolrich outlet moncler outlet moncler outlet moncler outlet golden goose pas cher golden goose pas cher golden goose pas cher golden goose pas cher golden goose pas cher golden goose pas cher golden goose outlet golden goose outlet golden goose outlet golden goose outlet golden goose outlet golden goose outlet nike tn pas cher stone island outlet stone island uk stone island stone island outlet supreme outlet supreme outlet online
LTE.ma 2022 - ISSN : 2458-6293 Powered By NESSMATECH