{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T21:38:33Z","timestamp":1649021913605},"reference-count":6,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2007,3,1]],"date-time":"2007-03-01T00:00:00Z","timestamp":1172707200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2007,3]]},"DOI":"10.1007\/s11623-007-0065-5","type":"journal-article","created":{"date-parts":[[2007,4,4]],"date-time":"2007-04-04T23:01:08Z","timestamp":1175727668000},"page":"171-175","source":"Crossref","is-referenced-by-count":1,"title":["Biometrie am Arbeitsplatz \u2014 Konkrete Ausgestaltung der Mitbestimmung"],"prefix":"10.1007","volume":"31","author":[{"given":"Astrid","family":"Albrecht","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"65_CR1","unstructured":"Astrid Albrecht: Biometrische Verfahren im Spannungsfeld von Authentizit\u00e4t im elektronischen Rechtsverkehr und Pers\u00f6nlichkeitsschutz, Dissertation, Hrsg.: ??Prof. Dr. Dr. h.c. Spiros Simitis, Nomos 2003"},{"key":"65_CR2","unstructured":"Arbeitsgericht Frankfurt a.M., Beschluss vom 18.2.2002 \u2014 15 BVGa 32\/02"},{"key":"65_CR3","unstructured":"Art.29-Arbeitsgruppe: Stellungnahme 8\/2001 zur Verarbeitung personenbezogener Daten von Besch\u00e4ftigten, Arbeitspapier 5062\/01\/DE (WP 48) vom 13.9.2001"},{"key":"65_CR4","unstructured":"H. B\u00e4umler: Biometrie datenschutzgerecht gestalten \/ Die Bedeutung von Technikgestaltung f\u00fcr den Datenschutz, in: Datenschutz und Datensicherheit 1999, Seite 128"},{"key":"65_CR5","unstructured":"K.-H. B\u00f6ker\/ H. K\u00fcbeck: Biometrische Systeme zur Zeiterfassung und Zutrittskontrolle, in CF 6\/04, ab Seite 8"},{"key":"65_CR6","unstructured":"G. Hornung\/ R. Steidle: Biometrie am Arbeitsplatz \u2014 sichere Kontrollverfahren versus ausuferndes Kontrollpotential, in Arbeit und Recht 2005, ab Seite 201"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-007-0065-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-007-0065-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-007-0065-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:08:22Z","timestamp":1559412502000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-007-0065-5"}},"subtitle":["Orientierungshilfe des TeleTrusT e.V. f\u00fcr eine Betriebsvereinbarung beim Einsatz biometrischer Systeme"],"short-title":[],"issued":{"date-parts":[[2007,3]]},"references-count":6,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2007,3]]}},"alternative-id":["65"],"URL":"https:\/\/doi.org\/10.1007\/s11623-007-0065-5","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,3]]}}}