: Serge Gutwirth, Yves Poullet, Paul De Hert
: Serge Gutwirth, Yves Poullet, Paul de Hert
: Data Protection in a Profiled World
: Springer-Verlag
: 9789048188659
: 1
: CHF 87.10
:
: Internationales Recht, Ausländisches Recht
: English
: 343
: Wasserzeichen/DRM
: PC/MAC/eReader/Tablet
: PDF
One of the most challenging issues facing our current information society is the accelerating accumulation of data trails in transactional and communication systems, which may be used not only to profile the behaviour of individuals for commercial, marketing and law enforcement purposes, but also to locate and follow things and actions. Data mining, convergence, interoperability, ever- increasing computer capacities and the extreme miniaturisation of the hardware are all elements which contribute to a major contemporary challenge: the profiled world. This interdisciplinary volume offers twenty contributions that delve deeper into some of the complex but urgent questions that this profiled world addresses to data protection and privacy. The chapters of this volume were all presented at the second Conference on Privacy and Data Protection (CPDP2009) held in Brussels in January 2009 (www.cpdpconferences.org). The yearly CPDP conferences aim to become Europe's most important meeting where academics, practitioners, policy-makers and activists come together to exchange ideas and discuss emerging issues in information technology, privacy and data protection and law. This volume reflects the richness of the conference, containing chapters by leading lawyers, policymakers, computer, technology assessment and social scientists. The chapters cover generic themes such as the evolution of a new generation of data protection laws and the constitutionalisation of data protection and more specific issues like security breaches, unsolicited adjustments, social networks, surveillance and electronic voting. This book not only offers a very close and timely look on the state of data protection and privacy in our profiled world, but it also explores and invents ways to make sure this world remains a world we want to live in.
Foreword5
Contents7
Contributors15
Part I24
Chapter 125
About the E-Privacy Directive: Towards a Third Generation of Data Protection Legislation?25
1.1 Is Personal Data the Adequate Concept?31
1.1.1 New Kinds of Sensitive Data in Our Modern Networks: Identifiers and Contact Data33
1.1.2 IP Address, Cookies, Data Generated by RFID, Always “Personal Data”? Why Regulate Them Anyway?35
1.1.3 New Data to be Protected: The Profiles38
1.2 New Objects and New Actors to be Regulated?40
1.2.1 EU Commission’s Support to PETs42
1.2.2 Towards a Liability of Terminal Equipments Producers and Information System Designers: The RFID Case43
1.2.3 Terminal Equipment as a Virtual Home?45
1.2.4 Conclusions of Sect. 1.249
1.3 Final Conclusions50
Chapter 253
Some Caveats on Profiling53
2.1 Introduction53
2.2 What Is It with Profiling?53
2.3 From Measurement to Detection54
2.4 A Risky Dependence55
2.5 Privacy, Fairness (Non-discrimination) and Due Process56
2.6 Causality and (Criminal) Liability57
2.7 Who Owns My Data Who Authors the Profiles I Match with?
2.8 Transparency and Anticipation58
2.9 Privacy and Data Protection58
2.10 From Data Minimisation to Minimal Knowledge Asymmetries?60
2.11 AmLaw: From Privacy Enhancing Technologies to Transparency Enhancing Tools?61
2.12 Call for Attention61
References62
Chapter 364
Levelling up: Data Privacy and the European Court of Human Rights64
3.1 The Background64
3.2 Legality, Necessity, Secrecy67
3.3 Legality: The Liberty Case68
3.4 Necessity and Proportionality: The S. and Marper Case70
3.5 Where Does It Leave Us?72
Chapter 474
Responding to the Inevitable Outcomes of Profiling: Recent Lessons from Consumer Financial Markets, and Beyond74
4.1 Preface74
4.2 Rethinking the Regulation of Profiling: In a Nutshell76
4.2.1 A Brief Introduction to the Flow of Personal Information76
4.2.2 The Limits and Troubles of Regulating Data Collection78
4.2.3 The Limits and Troubles of Regulating Data Analysis78
4.2.4 Regulating Profiling by Addressing Uses: Possibilities, Factors and Limits79
4.3 A Tale of Four Data Miners82
4.4 Some Conclusions and Summing Up93
References94
Part II96
Chapter 597
The Emerging European Union Security Breach Legal Framework: The 2002/58 ePrivacy Directive and Beyond97
5.1 Introduction98
5.1.1 The EU Security Breach Legal Framework: The Background98
5.1.2 The Review of the ePrivacy Directive99
5.1.3 An Overview of the Security Breach Framework Under the Revised ePrivacy Directive100
5.2 Purposes and Existing Data Protection Princi-ples Underpinning the New EU Security Breach Framework101
5.2.1 Preventing and Minimising Adverse Effects for Individuals101
5.2.2 The Security Principle102
5.2.3 The Data Minimisation Principle104
5.2.4 The Information Principle104
5.2.5 The Accountability Principle105
5.3 Elements of the EU Security Breach Notification Framework106
5.4 Scope of the EU Security Breach Notification Framework106
5.4.1 Entities Obliged to Notify: Covered Entities106
5.4.2 The Application to Information Society Services and Beyond107
5.4.3 Definition of ‘Personal Data Breach’109
5.5 The Threshold Triggering the Obligation to Notify110
5.5.1 Description of the Threshold110
5.5.2 “Likely to Adversely Affect the Personal Data and Privacy”112
5.5.3 Exceptions Relating to Technological Protection Measures and Law Enforcement113
5.6 Means of Providing Notice, Timing and Content115
5.6.1 Means of Providing Notice