Gutwirth / Poullet / De Hert | Reinventing Data Protection? | E-Book | www2.sack.de
E-Book

E-Book, Englisch, 342 Seiten

Gutwirth / Poullet / De Hert Reinventing Data Protection?


1. Auflage 2009
ISBN: 978-1-4020-9498-9
Verlag: Springer Netherlands
Format: PDF
Kopierschutz: 1 - PDF Watermark

E-Book, Englisch, 342 Seiten

ISBN: 978-1-4020-9498-9
Verlag: Springer Netherlands
Format: PDF
Kopierschutz: 1 - PDF Watermark



data. Furthermore, the European Union established clear basic principles for the collection, storage and use of personal data by governments, businesses and other organizations or individuals in Directive 95/46/EC and Directive 2002/58/EC on Privacy and Electronic communications. Nonetheless, the twenty-?rst century citizen - utilizing the full potential of what ICT-technology has to offer - seems to develop a digital persona that becomes increasingly part of his individual social identity. From this perspective, control over personal information is control over an aspect of the identity one projects in the world. The right to privacy is the freedom from unreasonable constraints on one's own identity. Transactiondata-bothtraf?candlocationdata-deserveourparticularattention. As we make phone calls, send e-mails or SMS messages, data trails are generated within public networks that we use for these communications. While traf?c data are necessary for the provision of communication services, they are also very sensitive data. They can give a complete picture of a person's contacts, habits, interests, act- ities and whereabouts. Location data, especially if very precise, can be used for the provision of services such as route guidance, location of stolen or missing property, tourist information, etc. In case of emergency, they can be helpful in dispatching assistance and rescue teams to the location of a person in distress. However, p- cessing location data in mobile communication networks also creates the possibility of permanent surveillance.

Gutwirth / Poullet / De Hert Reinventing Data Protection? jetzt bestellen!

Weitere Infos & Material


1;Foreword by Karel De Gucht, Deputy Prime Minister and Minister of Foreign Affairs of Belgium;5
2;Preface;8
3;Contents;16
4;Contributors;19
5;Fundamental Concepts;28
5.1;Data Protection in the Case Law of Strasbourg and Luxemburg: Constitutionalisation in Action;29
5.1.1;1.1 Formal or Political Constitutionalisation;29
5.1.2;1.2 The Material Constitutionalisation of Data Protection;40
5.1.3;1.3 Conclusions;68
5.2;The Right to Informational Self-Determination and the Value of Self- Development: Reassessing the Importance of Privacy for Democracy;71
5.2.1;2.1 Introduction;71
5.2.2;2.2 Why Re-Anchoring the Rights to Privacy and Data Protection in the Fundamental Ethical and Political Values?;73
5.2.3;2.3 The Right to "Informational Self-Determination": The Subject as Object?;77
5.2.4;2.4 The German Federal Constitutional Court's "Census" Decision of 1983;78
5.2.5;2.5 "Dignity" and "Autonomy": A Few Words of Conceptual Clarification;84
5.2.6;2.6 The "Facets" of Privacy and How They Can Be Articulated to Protect and Promote Autonomous Self- Development;87
5.2.7;2.7 Conclusion: Privacy as a Bidirectional Principle Fostering the Autonomic Capabilities of Individuals;101
5.3;Data Protection as a Fundamental Right;103
5.4;Consent in Data Protection Law: Privacy, Fair Processing and Confidentiality;109
5.4.1;4.1 Introduction;109
5.4.2;4.2 The Centrality of Consent;113
5.4.3;4.3 Would a Duty of Confidentiality Serve Us Better?;125
5.4.4;4.4 Conclusion;134
5.4.5;References;135
5.5;The Concepts of Identity and Identifiablity: Legal and Technical Deadlocks for Protecting Human Beings in the Information Society?;137
5.5.1;5.1 The Protection of Data as Seen by Computer Science;137
5.5.2;5.2 TheWithdrawal of the PSN Number;140
5.5.3;5.3 Many Billions of Transclusive Hyperlinks Per Day by Google and Co are Widely Superceding the Echelon Monitoring Capacities;140
5.5.4;5.4 The Ontological Approach;142
5.5.5;5.5 When Non DP Laws Help to Fill the Gaps in Existing Data Protection Legislation to Enhance Privacy Protection;146
6;The Actors;149
6.1;Role of Trade Associations: Data Protection as a Negotiable Issue;150
6.1.1;6.1 Economic Interests Versus Fundamental Rights;150
6.1.2;6.2 Processing in the Context of Customer Relations;150
6.1.3;6.3 Chief Aim is Profit;151
6.1.4;6.4 Supporting Sectors;151
6.1.5;6.5 Consumer Protection;151
6.1.6;6.6 Standard Terms and Conditions;152
6.1.7;6.7 Balance of Interests;152
6.1.8;6.8 The Choices from the Past;152
6.1.9;6.9 Standard Terms and Conditions as Medium?;153
6.1.10;6.10 Standard Terms and Conditions as Information Instrument;154
6.1.11;6.11 Conclusion;154
6.2;The Role of Data Protection Authorities;155
6.2.1;7.1 Introduction;155
6.2.2;7.2 Historic Background;156
6.2.3;7.3 Further Analysis;157
6.2.4;7.4 Different Experience;158
6.2.5;7.5 More Effectiveness;160
6.3;The Role of Citizens: What Can Dutch, Flemish and English Students Teach Us About Privacy?;162
6.3.1;8.1 Introduction;162
6.3.2;8.2 Measuring Privacy Attitudes;163
6.3.3;8.3 Going into Details;166
6.3.4;8.4 Conclusions;174
6.3.5;References;175
7;Regulation;177
7.1;Consent, Proportionality and Collective Power;178
7.1.1;9.1 Introduction;178
7.1.2;9.2 Distribution of Decision-Making Competence;179
7.1.3;9.3 Role of Proportionality Principle in Data Protection Law;183
7.1.4;9.4 Interaction of Proportionality Principle and Consent;185
7.1.5;9.5 Relative Strength of Consent and Proportionality Principle in Promoting Data Protection;187
7.1.6;9.6 Organisation of Decisional Competence Regarding Data Protection;189
7.1.7;9.7 Collective Consent;190
7.1.8;9.8 Pros and Cons of Collective Consent;192
7.1.9;9.9 Conclusion;193
7.1.10;References;194
7.2;Is a Global Data Protection Regulatory Model Possible?;195
7.2.1;10.1 Introduction;195
7.2.2;10.2 Is There a Need of Global Harmonization of Data Protection Regimes Throughout the World?;196
7.2.3;10.3 Disparities Between Legal Data Protection Regimes;198
7.2.4;10.4 Disparities in the Ways of Considering Data Protection;200
7.2.5;10.5 A Universal Data Protection Model?;202
7.2.6;10.6 Conclusion;208
7.3;Technical Standards as Data Protection Regulation;210
7.3.1;11.1 Introduction;210
7.3.2;11.2 Standards and Regulation;211
7.3.3;11.3 Special Challenges of ICT Standards;214
7.3.4;11.4 Privacy-Enhancing Technologies;218
7.3.5;11.5 Better Regulation, Standards and Data Protection;220
7.3.6;11.6 Conclusion;223
7.3.7;References;223
7.4;Privacy Actors, Performances and the Future of Privacy Protection;226
7.4.1;12.1 Background;226
7.4.2;12.2 Mapping the Landscape of Actors;227
7.4.3;12.3 The 3D-Landscape: Multi-Level Governance?;232
7.4.4;12.4 How Does the Landscape Function?;233
7.4.5;12.5 Conclusion;239
7.4.6;References;240
8;Specific Issues;241
8.1;First Pillar and Third Pillar: Need for a Common Approach on Data Protection?;242
8.1.1;13.1 Introduction;242
8.1.2;13.2 Present Situation Regarding Data Protection in the Third Pillar Area: The Role of Council of Europe Convention 108;243
8.1.3;13.3 Is It Possible to Go Further than Convention 108 Does in the Third Pillar Area?;244
8.1.4;13.4 Would It Be Desirable to Put in Place an Instrument Regulating Data Protection in the Third Pillar Area Based on the Regime of Directive 95/ 46?;248
8.1.5;13.5 What Will the Future Bring: Data Protection After the Treaty of Lisbon;251
8.1.6;13.6 Conclusion: Common Approach?;252
8.2;Who is Profiling Who? Invisible Visibility;255
8.2.1;14.1 Why Protect Personal Data?;255
8.2.2;14.2 Invisible Visibility;256
8.2.3;14.3 The Legal Status of Profiles;263
8.2.4;14.4 Concluding Remarks;266
8.2.5;References;267
8.3;Challenges in Privacy Advocacy;269
8.3.1;15.1 Changes in Privacy Campaigning;271
8.3.2;15.2 Crossing Political Lines;272
8.3.3;15.3 A Proactive Agenda;274
8.3.4;15.4 A Fuel Crisis in Privacy Action;275
8.4;Developing an Adequate Legal Framework for International Data Transfers;278
8.4.1;16.1 Procedural Problems and the Mathematics of Adequacy;278
8.4.2;16.2 Substantive Problems with Adequacy;281
8.4.3;16.3 Possible Improvements to the Adequacy System;282
8.4.4;16.4 Accountability: An Alternative Standard for International Data Transfers;284
8.4.5;16.5 Conclusions;287
8.5;Towards a Common European Approach to Data Protection: A Critical Analysis of Data Protection Perspectives of the Council of Europe and the European Union;289
8.5.1;17.1 Introduction;289
8.5.2;17.2 Data Protection from an Economic Perspective;290
8.5.3;17.3 Data Protection from a Human Rights Perspective;293
8.5.4;17.4 Data Protection at National Level;296
8.5.5;17.5 Self-Regulation;298
8.5.6;17.6 Interesting Developments;299
8.5.7;17.7 Towards a Common Approach in Europe;300
8.5.8;17.8 Conclusion;305
8.6;Freedom of Information Versus Privacy: Friends or Foes?;307
8.6.1;18.1 On the Relationship Between the Two Concepts;307
8.6.2;18.2 Conflicting Areas;310
8.6.3;18.3 Evolution or Erosion?;316
8.6.4;18.4 Neighbouring Areas;323
8.6.5;18.5 Common Danger: Restrictions in the Post-9/11 Era;326
8.6.6;18.6 How to Restrict Informational Rights: The Need for a Checklist;328
8.6.7;References;329
8.7;Privacy Protection on the Internet: Risk Management and Networked Normativity;331
8.7.1;19.1 Introduction;331
8.7.2;19.2 Privacy on the Internet;332
8.7.3;19.3 Risk Management Through Networks;342
8.7.4;19.4 Conclusion;347
8.8;Towards a New Generation of Data Protection Legislation;349
8.8.1;Alienation;349
8.8.2;Constructive Responses and Their Chances;350
8.8.3;Structural Defects of Data Protection Legislation;352
8.8.4;The Essence of Data Protection Legislation?;353
8.8.5;Consequences;354
8.8.6;Conclusion;355



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.